0N/A/*
5690N/A * Copyright (c) 1997, 2012, Oracle and/or its affiliates. All rights reserved.
0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
0N/A *
0N/A * This code is free software; you can redistribute it and/or modify it
0N/A * under the terms of the GNU General Public License version 2 only, as
2362N/A * published by the Free Software Foundation. Oracle designates this
0N/A * particular file as subject to the "Classpath" exception as provided
2362N/A * by Oracle in the LICENSE file that accompanied this code.
0N/A *
0N/A * This code is distributed in the hope that it will be useful, but WITHOUT
0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
0N/A * version 2 for more details (a copy is included in the LICENSE file that
0N/A * accompanied this code).
0N/A *
0N/A * You should have received a copy of the GNU General Public License version
0N/A * 2 along with this work; if not, write to the Free Software Foundation,
0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
0N/A *
2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
2362N/A * or visit www.oracle.com if you need additional information or have any
2362N/A * questions.
0N/A */
0N/A
0N/A
0N/Apackage sun.security.ssl;
0N/A
0N/Aimport java.io.IOException;
0N/Aimport java.io.PrintStream;
0N/Aimport java.math.BigInteger;
5690N/Aimport javax.net.ssl.SSLHandshakeException;
0N/A
0N/A/*
0N/A * Message used by clients to send their Diffie-Hellman public
0N/A * keys to servers.
0N/A *
0N/A * @author David Brownell
0N/A */
0N/Afinal class DHClientKeyExchange extends HandshakeMessage {
0N/A
0N/A int messageType() {
0N/A return ht_client_key_exchange;
0N/A }
0N/A
0N/A /*
0N/A * This value may be empty if it was included in the
0N/A * client's certificate ...
0N/A */
0N/A private byte dh_Yc[]; // 1 to 2^16 -1 bytes
0N/A
0N/A BigInteger getClientPublicKey() {
5690N/A return dh_Yc == null ? null : new BigInteger(1, dh_Yc);
0N/A }
0N/A
0N/A /*
0N/A * Either pass the client's public key explicitly (because it's
0N/A * using DHE or DH_anon), or implicitly (the public key was in the
0N/A * certificate).
0N/A */
0N/A DHClientKeyExchange(BigInteger publicKey) {
0N/A dh_Yc = toByteArray(publicKey);
0N/A }
0N/A
0N/A DHClientKeyExchange() {
0N/A dh_Yc = null;
0N/A }
0N/A
0N/A /*
0N/A * Get the client's public key either explicitly or implicitly.
0N/A * (It's ugly to have an empty record be sent in the latter case,
0N/A * but that's what the protocol spec requires.)
0N/A */
0N/A DHClientKeyExchange(HandshakeInStream input) throws IOException {
5690N/A if (input.available() >= 2) {
5690N/A dh_Yc = input.getBytes16();
5690N/A } else {
5690N/A // currently, we don't support cipher suites that requires
5690N/A // implicit public key of client.
5690N/A throw new SSLHandshakeException(
5690N/A "Unsupported implicit client DiffieHellman public key");
5690N/A }
0N/A }
0N/A
0N/A int messageLength() {
0N/A if (dh_Yc == null) {
0N/A return 0;
0N/A } else {
0N/A return dh_Yc.length + 2;
0N/A }
0N/A }
0N/A
0N/A void send(HandshakeOutStream s) throws IOException {
5690N/A if (dh_Yc != null && dh_Yc.length != 0) {
5690N/A s.putBytes16(dh_Yc);
5690N/A }
0N/A }
0N/A
0N/A void print(PrintStream s) throws IOException {
0N/A s.println("*** ClientKeyExchange, DH");
0N/A
0N/A if (debug != null && Debug.isOn("verbose")) {
0N/A Debug.println(s, "DH Public key", dh_Yc);
0N/A }
0N/A }
0N/A}