1/*
2 * Copyright (c) 1997, 2012, Oracle and/or its affiliates. All rights reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.  Oracle designates this
8 * particular file as subject to the "Classpath" exception as provided
9 * by Oracle in the LICENSE file that accompanied this code.
10 *
11 * This code is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
14 * version 2 for more details (a copy is included in the LICENSE file that
15 * accompanied this code).
16 *
17 * You should have received a copy of the GNU General Public License version
18 * 2 along with this work; if not, write to the Free Software Foundation,
19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20 *
21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22 * or visit www.oracle.com if you need additional information or have any
23 * questions.
24 */
25
26
27package sun.security.ssl;
28
29import java.io.IOException;
30import java.io.PrintStream;
31import java.math.BigInteger;
32import javax.net.ssl.SSLHandshakeException;
33
34/*
35 * Message used by clients to send their Diffie-Hellman public
36 * keys to servers.
37 *
38 * @author David Brownell
39 */
40final class DHClientKeyExchange extends HandshakeMessage {
41
42    @Override
43    int messageType() {
44        return ht_client_key_exchange;
45    }
46
47    /*
48     * This value may be empty if it was included in the
49     * client's certificate ...
50     */
51    private byte[] dh_Yc;               // 1 to 2^16 -1 bytes
52
53    BigInteger getClientPublicKey() {
54        return dh_Yc == null ? null : new BigInteger(1, dh_Yc);
55    }
56
57    /*
58     * Either pass the client's public key explicitly (because it's
59     * using DHE or DH_anon), or implicitly (the public key was in the
60     * certificate).
61     */
62    DHClientKeyExchange(BigInteger publicKey) {
63        dh_Yc = toByteArray(publicKey);
64    }
65
66    DHClientKeyExchange() {
67        dh_Yc = null;
68    }
69
70    /*
71     * Get the client's public key either explicitly or implicitly.
72     * (It's ugly to have an empty record be sent in the latter case,
73     * but that's what the protocol spec requires.)
74     */
75    DHClientKeyExchange(HandshakeInStream input) throws IOException {
76        if (input.available() >= 2) {
77            dh_Yc = input.getBytes16();
78        } else {
79            // currently, we don't support cipher suites that requires
80            // implicit public key of client.
81            throw new SSLHandshakeException(
82                    "Unsupported implicit client DiffieHellman public key");
83        }
84    }
85
86    @Override
87    int messageLength() {
88        if (dh_Yc == null) {
89            return 0;
90        } else {
91            return dh_Yc.length + 2;
92        }
93    }
94
95    @Override
96    void send(HandshakeOutStream s) throws IOException {
97        if (dh_Yc != null && dh_Yc.length != 0) {
98            s.putBytes16(dh_Yc);
99        }
100    }
101
102    @Override
103    void print(PrintStream s) throws IOException {
104        s.println("*** ClientKeyExchange, DH");
105
106        if (debug != null && Debug.isOn("verbose")) {
107            Debug.println(s, "DH Public key", dh_Yc);
108        }
109    }
110}
111