1 /* 2 * Copyright (c) 1997, 2012, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 27 package sun.security.ssl; 28 29 import java.io.IOException; 30 import java.io.PrintStream; 31 import java.math.BigInteger; 32 import javax.net.ssl.SSLHandshakeException; 33 34 /* 35 * Message used by clients to send their Diffie-Hellman public 36 * keys to servers. 37 * 38 * @author David Brownell 39 */ 40 final class DHClientKeyExchange extends HandshakeMessage { 41 42 @Override 43 int messageType() { 44 return ht_client_key_exchange; 45 } 46 47 /* 48 * This value may be empty if it was included in the 49 * client's certificate ... 50 */ 51 private byte[] dh_Yc; // 1 to 2^16 -1 bytes 52 53 BigInteger getClientPublicKey() { 54 return dh_Yc == null ? null : new BigInteger(1, dh_Yc); 55 } 56 57 /* 58 * Either pass the client's public key explicitly (because it's 59 * using DHE or DH_anon), or implicitly (the public key was in the 60 * certificate). 61 */ 62 DHClientKeyExchange(BigInteger publicKey) { 63 dh_Yc = toByteArray(publicKey); 64 } 65 66 DHClientKeyExchange() { 67 dh_Yc = null; 68 } 69 70 /* 71 * Get the client's public key either explicitly or implicitly. 72 * (It's ugly to have an empty record be sent in the latter case, 73 * but that's what the protocol spec requires.) 74 */ 75 DHClientKeyExchange(HandshakeInStream input) throws IOException { 76 if (input.available() >= 2) { 77 dh_Yc = input.getBytes16(); 78 } else { 79 // currently, we don't support cipher suites that requires 80 // implicit public key of client. 81 throw new SSLHandshakeException( 82 "Unsupported implicit client DiffieHellman public key"); 83 } 84 } 85 86 @Override 87 int messageLength() { 88 if (dh_Yc == null) { 89 return 0; 90 } else { 91 return dh_Yc.length + 2; 92 } 93 } 94 95 @Override 96 void send(HandshakeOutStream s) throws IOException { 97 if (dh_Yc != null && dh_Yc.length != 0) { 98 s.putBytes16(dh_Yc); 99 } 100 } 101 102 @Override 103 void print(PrintStream s) throws IOException { 104 s.println("*** ClientKeyExchange, DH"); 105 106 if (debug != null && Debug.isOn("verbose")) { 107 Debug.println(s, "DH Public key", dh_Yc); 108 } 109 } 110 }