|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
|
|
package sun.security.ssl; |
|
|
|
import java.security.AccessController; |
|
import java.util.ArrayList; |
|
import java.util.Collections; |
|
import java.util.Enumeration; |
|
import java.util.Locale; |
|
import javax.net.ssl.SSLSession; |
|
import javax.net.ssl.SSLSessionContext; |
|
|
|
import sun.security.action.GetIntegerAction; |
|
import sun.security.util.Cache; |
|
|
|
|
|
final class SSLSessionContextImpl implements SSLSessionContext { |
|
private final static int DEFAULT_MAX_CACHE_SIZE = 20480; |
|
|
|
private final Cache<SessionId, SSLSessionImpl> sessionCache; |
|
|
|
private final Cache<String, SSLSessionImpl> sessionHostPortCache; |
|
// session cache, "host:port" as key |
|
private int cacheLimit; |
|
private int timeout; |
|
|
|
|
|
SSLSessionContextImpl() { |
|
cacheLimit = getDefaultCacheLimit(); |
|
timeout = 86400; |
|
|
|
|
|
sessionCache = Cache.newSoftMemoryCache(cacheLimit, timeout); |
|
sessionHostPortCache = Cache.newSoftMemoryCache(cacheLimit, timeout); |
|
} |
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public SSLSession getSession(byte[] sessionId) { |
|
if (sessionId == null) { |
|
throw new NullPointerException("session id cannot be null"); |
|
} |
|
|
|
SSLSessionImpl sess = sessionCache.get(new SessionId(sessionId)); |
|
if (!isTimedout(sess)) { |
|
return sess; |
|
} |
|
|
|
return null; |
|
} |
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public Enumeration<byte[]> getIds() { |
|
SessionCacheVisitor scVisitor = new SessionCacheVisitor(); |
|
sessionCache.accept(scVisitor); |
|
|
|
return scVisitor.getSessionIds(); |
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public void setSessionTimeout(int seconds) |
|
throws IllegalArgumentException { |
|
if (seconds < 0) { |
|
throw new IllegalArgumentException(); |
|
} |
|
|
|
if (timeout != seconds) { |
|
sessionCache.setTimeout(seconds); |
|
sessionHostPortCache.setTimeout(seconds); |
|
timeout = seconds; |
|
} |
|
} |
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public int getSessionTimeout() { |
|
return timeout; |
|
} |
|
|
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public void setSessionCacheSize(int size) |
|
throws IllegalArgumentException { |
|
if (size < 0) |
|
throw new IllegalArgumentException(); |
|
|
|
if (cacheLimit != size) { |
|
sessionCache.setCapacity(size); |
|
sessionHostPortCache.setCapacity(size); |
|
cacheLimit = size; |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
*/ |
|
@Override |
|
public int getSessionCacheSize() { |
|
return cacheLimit; |
|
} |
|
|
|
|
|
SSLSessionImpl get(byte[] id) { |
|
return (SSLSessionImpl)getSession(id); |
|
} |
|
|
|
|
|
SSLSessionImpl get(String hostname, int port) { |
|
|
|
|
|
|
|
*/ |
|
if (hostname == null && port == -1) { |
|
return null; |
|
} |
|
|
|
SSLSessionImpl sess = sessionHostPortCache.get(getKey(hostname, port)); |
|
if (!isTimedout(sess)) { |
|
return sess; |
|
} |
|
|
|
return null; |
|
} |
|
|
|
private static String getKey(String hostname, int port) { |
|
return (hostname + ":" + |
|
String.valueOf(port)).toLowerCase(Locale.ENGLISH); |
|
} |
|
|
|
// cache a SSLSession |
|
// |
|
// In SunJSSE implementation, a session is created while getting a |
|
// client hello or a server hello message, and cached while the |
|
// handshaking finished. |
|
// Here we time the session from the time it cached instead of the |
|
// time it created, which is a little longer than the expected. So |
|
|
|
void put(SSLSessionImpl s) { |
|
sessionCache.put(s.getSessionId(), s); |
|
|
|
|
|
if ((s.getPeerHost() != null) && (s.getPeerPort() != -1)) { |
|
sessionHostPortCache.put( |
|
getKey(s.getPeerHost(), s.getPeerPort()), s); |
|
} |
|
|
|
s.setContext(this); |
|
} |
|
|
|
|
|
void remove(SessionId key) { |
|
SSLSessionImpl s = sessionCache.get(key); |
|
if (s != null) { |
|
sessionCache.remove(key); |
|
sessionHostPortCache.remove( |
|
getKey(s.getPeerHost(), s.getPeerPort())); |
|
} |
|
} |
|
|
|
private static int getDefaultCacheLimit() { |
|
try { |
|
int defaultCacheLimit = AccessController.doPrivileged( |
|
new GetIntegerAction("javax.net.ssl.sessionCacheSize", |
|
DEFAULT_MAX_CACHE_SIZE)); |
|
if (defaultCacheLimit >= 0) { |
|
return defaultCacheLimit; |
|
} else if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { |
|
SSLLogger.warning( |
|
"invalid System Property javax.net.ssl.sessionCacheSize, " + |
|
"use the default session cache size (" + |
|
DEFAULT_MAX_CACHE_SIZE + ") instead"); |
|
} |
|
} catch (Exception e) { |
|
|
|
if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { |
|
SSLLogger.warning( |
|
"the System Property javax.net.ssl.sessionCacheSize is " + |
|
"not available, use the default value (" + |
|
DEFAULT_MAX_CACHE_SIZE + ") instead"); |
|
} |
|
} |
|
|
|
return DEFAULT_MAX_CACHE_SIZE; |
|
} |
|
|
|
private boolean isTimedout(SSLSession sess) { |
|
if (timeout == 0) { |
|
return false; |
|
} |
|
|
|
if ((sess != null) && ((sess.getCreationTime() + timeout * 1000L) |
|
<= (System.currentTimeMillis()))) { |
|
sess.invalidate(); |
|
return true; |
|
} |
|
|
|
return false; |
|
} |
|
|
|
private final class SessionCacheVisitor |
|
implements Cache.CacheVisitor<SessionId, SSLSessionImpl> { |
|
ArrayList<byte[]> ids = null; |
|
|
|
|
|
@Override |
|
public void visit(java.util.Map<SessionId, SSLSessionImpl> map) { |
|
ids = new ArrayList<>(map.size()); |
|
|
|
for (SessionId key : map.keySet()) { |
|
SSLSessionImpl value = map.get(key); |
|
if (!isTimedout(value)) { |
|
ids.add(key.getId()); |
|
} |
|
} |
|
} |
|
|
|
Enumeration<byte[]> getSessionIds() { |
|
return ids != null ? Collections.enumeration(ids) : |
|
Collections.emptyEnumeration(); |
|
} |
|
} |
|
} |