|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
|
|
package sun.security.ssl; |
|
|
|
import java.io.ByteArrayOutputStream; |
|
import java.io.IOException; |
|
import java.nio.ByteBuffer; |
|
import java.security.MessageDigest; |
|
import java.util.Arrays; |
|
import java.util.LinkedList; |
|
import javax.crypto.SecretKey; |
|
import sun.security.util.MessageDigestSpi2; |
|
|
|
final class HandshakeHash { |
|
private TranscriptHash transcriptHash; |
|
private LinkedList<byte[]> reserves; |
|
private boolean hasBeenUsed; |
|
|
|
HandshakeHash() { |
|
this.transcriptHash = new CacheOnlyHash(); |
|
this.reserves = new LinkedList<>(); |
|
this.hasBeenUsed = false; |
|
} |
|
|
|
|
|
void determine(ProtocolVersion protocolVersion, |
|
CipherSuite cipherSuite) { |
|
if (!(transcriptHash instanceof CacheOnlyHash)) { |
|
throw new IllegalStateException( |
|
"Not expected instance of transcript hash"); |
|
} |
|
|
|
CacheOnlyHash coh = (CacheOnlyHash)transcriptHash; |
|
if (protocolVersion.useTLS13PlusSpec()) { |
|
transcriptHash = new T13HandshakeHash(cipherSuite); |
|
} else if (protocolVersion.useTLS12PlusSpec()) { |
|
transcriptHash = new T12HandshakeHash(cipherSuite); |
|
} else if (protocolVersion.useTLS10PlusSpec()) { |
|
transcriptHash = new T10HandshakeHash(cipherSuite); |
|
} else { |
|
transcriptHash = new S30HandshakeHash(cipherSuite); |
|
} |
|
|
|
byte[] reserved = coh.baos.toByteArray(); |
|
if (reserved.length != 0) { |
|
transcriptHash.update(reserved, 0, reserved.length); |
|
} |
|
} |
|
|
|
HandshakeHash copy() { |
|
if (transcriptHash instanceof CacheOnlyHash) { |
|
HandshakeHash result = new HandshakeHash(); |
|
result.transcriptHash = ((CacheOnlyHash)transcriptHash).copy(); |
|
result.reserves = new LinkedList<>(reserves); |
|
result.hasBeenUsed = hasBeenUsed; |
|
return result; |
|
} else { |
|
throw new IllegalStateException("Hash does not support copying"); |
|
} |
|
} |
|
|
|
void receive(byte[] input) { |
|
reserves.add(Arrays.copyOf(input, input.length)); |
|
} |
|
|
|
void receive(ByteBuffer input, int length) { |
|
if (input.hasArray()) { |
|
int from = input.position() + input.arrayOffset(); |
|
int to = from + length; |
|
reserves.add(Arrays.copyOfRange(input.array(), from, to)); |
|
} else { |
|
int inPos = input.position(); |
|
byte[] holder = new byte[length]; |
|
input.get(holder); |
|
input.position(inPos); |
|
reserves.add(Arrays.copyOf(holder, holder.length)); |
|
} |
|
} |
|
void receive(ByteBuffer input) { |
|
receive(input, input.remaining()); |
|
} |
|
|
|
|
|
void push(byte[] input) { |
|
reserves.push(Arrays.copyOf(input, input.length)); |
|
} |
|
|
|
|
|
byte[] removeLastReceived() { |
|
return reserves.removeLast(); |
|
} |
|
|
|
void deliver(byte[] input) { |
|
update(); |
|
transcriptHash.update(input, 0, input.length); |
|
} |
|
|
|
void deliver(byte[] input, int offset, int length) { |
|
update(); |
|
transcriptHash.update(input, offset, length); |
|
} |
|
|
|
void deliver(ByteBuffer input) { |
|
update(); |
|
if (input.hasArray()) { |
|
transcriptHash.update(input.array(), |
|
input.position() + input.arrayOffset(), input.remaining()); |
|
} else { |
|
int inPos = input.position(); |
|
byte[] holder = new byte[input.remaining()]; |
|
input.get(holder); |
|
input.position(inPos); |
|
transcriptHash.update(holder, 0, holder.length); |
|
} |
|
} |
|
|
|
|
|
void utilize() { |
|
if (hasBeenUsed) { |
|
return; |
|
} |
|
if (reserves.size() != 0) { |
|
byte[] holder = reserves.remove(); |
|
transcriptHash.update(holder, 0, holder.length); |
|
hasBeenUsed = true; |
|
} |
|
} |
|
|
|
|
|
void consume() { |
|
if (hasBeenUsed) { |
|
hasBeenUsed = false; |
|
return; |
|
} |
|
if (reserves.size() != 0) { |
|
byte[] holder = reserves.remove(); |
|
transcriptHash.update(holder, 0, holder.length); |
|
} |
|
} |
|
|
|
void update() { |
|
while (reserves.size() != 0) { |
|
byte[] holder = reserves.remove(); |
|
transcriptHash.update(holder, 0, holder.length); |
|
} |
|
hasBeenUsed = false; |
|
} |
|
|
|
byte[] digest() { |
|
// Note that the reserve handshake message may be not a part of |
|
|
|
return transcriptHash.digest(); |
|
} |
|
|
|
void finish() { |
|
this.transcriptHash = new CacheOnlyHash(); |
|
this.reserves = new LinkedList<>(); |
|
this.hasBeenUsed = false; |
|
} |
|
|
|
|
|
byte[] archived() { |
|
// Note that the reserve handshake message may be not a part of |
|
|
|
return transcriptHash.archived(); |
|
} |
|
|
|
|
|
byte[] digest(String algorithm) { |
|
T10HandshakeHash hh = (T10HandshakeHash)transcriptHash; |
|
return hh.digest(algorithm); |
|
} |
|
|
|
|
|
byte[] digest(String algorithm, SecretKey masterSecret) { |
|
S30HandshakeHash hh = (S30HandshakeHash)transcriptHash; |
|
return hh.digest(algorithm, masterSecret); |
|
} |
|
|
|
|
|
byte[] digest(boolean useClientLabel, SecretKey masterSecret) { |
|
S30HandshakeHash hh = (S30HandshakeHash)transcriptHash; |
|
return hh.digest(useClientLabel, masterSecret); |
|
} |
|
|
|
public boolean isHashable(byte handshakeType) { |
|
return handshakeType != SSLHandshake.HELLO_REQUEST.id && |
|
handshakeType != SSLHandshake.HELLO_VERIFY_REQUEST.id; |
|
} |
|
|
|
interface TranscriptHash { |
|
void update(byte[] input, int offset, int length); |
|
byte[] digest(); |
|
byte[] archived(); |
|
} |
|
|
|
|
|
private static final class CacheOnlyHash implements TranscriptHash { |
|
private final ByteArrayOutputStream baos; |
|
|
|
CacheOnlyHash() { |
|
this.baos = new ByteArrayOutputStream(); |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
baos.write(input, offset, length); |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
throw new IllegalStateException( |
|
"Not expected call to handshake hash digest"); |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
return baos.toByteArray(); |
|
} |
|
|
|
CacheOnlyHash copy() { |
|
CacheOnlyHash result = new CacheOnlyHash(); |
|
try { |
|
baos.writeTo(result.baos); |
|
} catch (IOException ex) { |
|
throw new RuntimeException("unable to to clone hash state"); |
|
} |
|
return result; |
|
} |
|
} |
|
|
|
static final class S30HandshakeHash implements TranscriptHash { |
|
static final byte[] MD5_pad1 = genPad(0x36, 48); |
|
static final byte[] MD5_pad2 = genPad(0x5c, 48); |
|
|
|
static final byte[] SHA_pad1 = genPad(0x36, 40); |
|
static final byte[] SHA_pad2 = genPad(0x5c, 40); |
|
|
|
private static final byte[] SSL_CLIENT = { 0x43, 0x4C, 0x4E, 0x54 }; |
|
private static final byte[] SSL_SERVER = { 0x53, 0x52, 0x56, 0x52 }; |
|
|
|
private final MessageDigest mdMD5; |
|
private final MessageDigest mdSHA; |
|
private final TranscriptHash md5; |
|
private final TranscriptHash sha; |
|
private final ByteArrayOutputStream baos; |
|
|
|
S30HandshakeHash(CipherSuite cipherSuite) { |
|
this.mdMD5 = JsseJce.getMessageDigest("MD5"); |
|
this.mdSHA = JsseJce.getMessageDigest("SHA"); |
|
|
|
boolean hasArchived = false; |
|
if (mdMD5 instanceof Cloneable) { |
|
md5 = new CloneableHash(mdMD5); |
|
} else { |
|
hasArchived = true; |
|
md5 = new NonCloneableHash(mdMD5); |
|
} |
|
if (mdSHA instanceof Cloneable) { |
|
sha = new CloneableHash(mdSHA); |
|
} else { |
|
hasArchived = true; |
|
sha = new NonCloneableHash(mdSHA); |
|
} |
|
|
|
if (hasArchived) { |
|
this.baos = null; |
|
} else { |
|
this.baos = new ByteArrayOutputStream(); |
|
} |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
md5.update(input, offset, length); |
|
sha.update(input, offset, length); |
|
if (baos != null) { |
|
baos.write(input, offset, length); |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
byte[] digest = new byte[36]; |
|
System.arraycopy(md5.digest(), 0, digest, 0, 16); |
|
System.arraycopy(sha.digest(), 0, digest, 16, 20); |
|
|
|
return digest; |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
if (baos != null) { |
|
return baos.toByteArray(); |
|
} else if (md5 instanceof NonCloneableHash) { |
|
return md5.archived(); |
|
} else { |
|
return sha.archived(); |
|
} |
|
} |
|
|
|
byte[] digest(boolean useClientLabel, SecretKey masterSecret) { |
|
MessageDigest md5Clone = cloneMd5(); |
|
MessageDigest shaClone = cloneSha(); |
|
|
|
if (useClientLabel) { |
|
md5Clone.update(SSL_CLIENT); |
|
shaClone.update(SSL_CLIENT); |
|
} else { |
|
md5Clone.update(SSL_SERVER); |
|
shaClone.update(SSL_SERVER); |
|
} |
|
|
|
updateDigest(md5Clone, MD5_pad1, MD5_pad2, masterSecret); |
|
updateDigest(shaClone, SHA_pad1, SHA_pad2, masterSecret); |
|
|
|
byte[] digest = new byte[36]; |
|
System.arraycopy(md5Clone.digest(), 0, digest, 0, 16); |
|
System.arraycopy(shaClone.digest(), 0, digest, 16, 20); |
|
|
|
return digest; |
|
} |
|
|
|
byte[] digest(String algorithm, SecretKey masterSecret) { |
|
if ("RSA".equalsIgnoreCase(algorithm)) { |
|
MessageDigest md5Clone = cloneMd5(); |
|
MessageDigest shaClone = cloneSha(); |
|
updateDigest(md5Clone, MD5_pad1, MD5_pad2, masterSecret); |
|
updateDigest(shaClone, SHA_pad1, SHA_pad2, masterSecret); |
|
|
|
byte[] digest = new byte[36]; |
|
System.arraycopy(md5Clone.digest(), 0, digest, 0, 16); |
|
System.arraycopy(shaClone.digest(), 0, digest, 16, 20); |
|
|
|
return digest; |
|
} else { |
|
MessageDigest shaClone = cloneSha(); |
|
updateDigest(shaClone, SHA_pad1, SHA_pad2, masterSecret); |
|
return shaClone.digest(); |
|
} |
|
} |
|
|
|
private static byte[] genPad(int b, int count) { |
|
byte[] padding = new byte[count]; |
|
Arrays.fill(padding, (byte)b); |
|
return padding; |
|
} |
|
|
|
private MessageDigest cloneMd5() { |
|
MessageDigest md5Clone; |
|
if (mdMD5 instanceof Cloneable) { |
|
try { |
|
md5Clone = (MessageDigest)mdMD5.clone(); |
|
} catch (CloneNotSupportedException ex) { |
|
throw new RuntimeException( |
|
"MessageDigest does no support clone operation"); |
|
} |
|
} else { |
|
md5Clone = JsseJce.getMessageDigest("MD5"); |
|
md5Clone.update(md5.archived()); |
|
} |
|
|
|
return md5Clone; |
|
} |
|
|
|
private MessageDigest cloneSha() { |
|
MessageDigest shaClone; |
|
if (mdSHA instanceof Cloneable) { |
|
try { |
|
shaClone = (MessageDigest)mdSHA.clone(); |
|
} catch (CloneNotSupportedException ex) { |
|
throw new RuntimeException( |
|
"MessageDigest does no support clone operation"); |
|
} |
|
} else { |
|
shaClone = JsseJce.getMessageDigest("SHA"); |
|
shaClone.update(sha.archived()); |
|
} |
|
|
|
return shaClone; |
|
} |
|
|
|
private static void updateDigest(MessageDigest md, |
|
byte[] pad1, byte[] pad2, SecretKey masterSecret) { |
|
byte[] keyBytes = "RAW".equals(masterSecret.getFormat()) |
|
? masterSecret.getEncoded() : null; |
|
if (keyBytes != null) { |
|
md.update(keyBytes); |
|
} else { |
|
digestKey(md, masterSecret); |
|
} |
|
md.update(pad1); |
|
byte[] temp = md.digest(); |
|
|
|
if (keyBytes != null) { |
|
md.update(keyBytes); |
|
} else { |
|
digestKey(md, masterSecret); |
|
} |
|
md.update(pad2); |
|
md.update(temp); |
|
} |
|
|
|
private static void digestKey(MessageDigest md, SecretKey key) { |
|
try { |
|
if (md instanceof MessageDigestSpi2) { |
|
((MessageDigestSpi2)md).engineUpdate(key); |
|
} else { |
|
throw new Exception( |
|
"Digest does not support implUpdate(SecretKey)"); |
|
} |
|
} catch (Exception e) { |
|
throw new RuntimeException( |
|
"Could not obtain encoded key and " |
|
+ "MessageDigest cannot digest key", e); |
|
} |
|
} |
|
} |
|
|
|
|
|
static final class T10HandshakeHash implements TranscriptHash { |
|
private final TranscriptHash md5; |
|
private final TranscriptHash sha; |
|
private final ByteArrayOutputStream baos; |
|
|
|
T10HandshakeHash(CipherSuite cipherSuite) { |
|
MessageDigest mdMD5 = JsseJce.getMessageDigest("MD5"); |
|
MessageDigest mdSHA = JsseJce.getMessageDigest("SHA"); |
|
|
|
boolean hasArchived = false; |
|
if (mdMD5 instanceof Cloneable) { |
|
md5 = new CloneableHash(mdMD5); |
|
} else { |
|
hasArchived = true; |
|
md5 = new NonCloneableHash(mdMD5); |
|
} |
|
if (mdSHA instanceof Cloneable) { |
|
sha = new CloneableHash(mdSHA); |
|
} else { |
|
hasArchived = true; |
|
sha = new NonCloneableHash(mdSHA); |
|
} |
|
|
|
if (hasArchived) { |
|
this.baos = null; |
|
} else { |
|
this.baos = new ByteArrayOutputStream(); |
|
} |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
md5.update(input, offset, length); |
|
sha.update(input, offset, length); |
|
if (baos != null) { |
|
baos.write(input, offset, length); |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
byte[] digest = new byte[36]; |
|
System.arraycopy(md5.digest(), 0, digest, 0, 16); |
|
System.arraycopy(sha.digest(), 0, digest, 16, 20); |
|
|
|
return digest; |
|
} |
|
|
|
byte[] digest(String algorithm) { |
|
if ("RSA".equalsIgnoreCase(algorithm)) { |
|
return digest(); |
|
} else { |
|
return sha.digest(); |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
if (baos != null) { |
|
return baos.toByteArray(); |
|
} else if (md5 instanceof NonCloneableHash) { |
|
return md5.archived(); |
|
} else { |
|
return sha.archived(); |
|
} |
|
} |
|
} |
|
|
|
static final class T12HandshakeHash implements TranscriptHash { |
|
private final TranscriptHash transcriptHash; |
|
private final ByteArrayOutputStream baos; |
|
|
|
T12HandshakeHash(CipherSuite cipherSuite) { |
|
MessageDigest md = |
|
JsseJce.getMessageDigest(cipherSuite.hashAlg.name); |
|
if (md instanceof Cloneable) { |
|
transcriptHash = new CloneableHash(md); |
|
this.baos = null; |
|
} else { |
|
transcriptHash = new NonCloneableHash(md); |
|
this.baos = new ByteArrayOutputStream(); |
|
} |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
transcriptHash.update(input, offset, length); |
|
if (baos != null) { |
|
baos.write(input, offset, length); |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
return transcriptHash.digest(); |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
if (baos != null) { |
|
return baos.toByteArray(); |
|
} else { |
|
return transcriptHash.archived(); |
|
} |
|
} |
|
} |
|
|
|
static final class T13HandshakeHash implements TranscriptHash { |
|
private final TranscriptHash transcriptHash; |
|
private final ByteArrayOutputStream baos; |
|
|
|
T13HandshakeHash(CipherSuite cipherSuite) { |
|
MessageDigest md = |
|
JsseJce.getMessageDigest(cipherSuite.hashAlg.name); |
|
if (md instanceof Cloneable) { |
|
transcriptHash = new CloneableHash(md); |
|
this.baos = null; |
|
} else { |
|
transcriptHash = new NonCloneableHash(md); |
|
this.baos = new ByteArrayOutputStream(); |
|
} |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
transcriptHash.update(input, offset, length); |
|
if (baos != null) { |
|
baos.write(input, offset, length); |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
return transcriptHash.digest(); |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
if (baos != null) { |
|
return baos.toByteArray(); |
|
} else { |
|
return transcriptHash.archived(); |
|
} |
|
|
|
// throw new UnsupportedOperationException("Not supported yet."); |
|
} |
|
} |
|
|
|
static final class CloneableHash implements TranscriptHash { |
|
private final MessageDigest md; |
|
|
|
CloneableHash(MessageDigest md) { |
|
this.md = md; |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
md.update(input, offset, length); |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
try { |
|
return ((MessageDigest)md.clone()).digest(); |
|
} catch (CloneNotSupportedException ex) { |
|
|
|
return new byte[0]; |
|
} |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
throw new UnsupportedOperationException("Not supported yet."); |
|
} |
|
} |
|
|
|
static final class NonCloneableHash implements TranscriptHash { |
|
private final MessageDigest md; |
|
private final ByteArrayOutputStream baos = new ByteArrayOutputStream(); |
|
|
|
NonCloneableHash(MessageDigest md) { |
|
this.md = md; |
|
} |
|
|
|
@Override |
|
public void update(byte[] input, int offset, int length) { |
|
baos.write(input, offset, length); |
|
} |
|
|
|
@Override |
|
public byte[] digest() { |
|
byte[] bytes = baos.toByteArray(); |
|
md.reset(); |
|
return md.digest(bytes); |
|
} |
|
|
|
@Override |
|
public byte[] archived() { |
|
return baos.toByteArray(); |
|
} |
|
} |
|
} |