/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package javax.net.ssl; import java.io.IOException; import java.net.InetAddress; import java.net.Socket; import java.net.UnknownHostException; /** * The extension of {@code Socket} providing secure protocols like SSL (Secure * Sockets Layer) or TLS (Transport Layer Security). * *
{@code SSLSocket} instances obtained from default {@link SSLSocketFactory}, * {@link SSLServerSocketFactory}, and {@link SSLContext} are configured as follows: * * * *
Client socket: *
Protocol | *Supported (API Levels) | *Enabled by default (API Levels) | *
---|---|---|
SSLv3 | *1+ | *1+ | *
TLSv1 | *1+ | *1+ | *
TLSv1.1 | *16+ | *20+ | *
TLSv1.2 | *16+ | *20+ | *
Server socket: *
Protocol | *Supported (API Levels) | *Enabled by default (API Levels) | *
---|---|---|
SSLv3 | *1+ | *1+ | *
TLSv1 | *1+ | *1+ | *
TLSv1.1 | *16+ | *16+ | *
TLSv1.2 | *16+ | *16+ | *
Methods that operate with cipher suite names (for example, * {@link #getSupportedCipherSuites() getSupportedCipherSuites}, * {@link #setEnabledCipherSuites(String[]) setEnabledCipherSuites}) have used * standard names for cipher suites since API Level 9, as listed in the table * below. Prior to API Level 9, non-standard (OpenSSL) names had been used (see * the table following this table). *
Cipher suite | *Supported (API Levels) | *Enabled by default (API Levels) | *
---|---|---|
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA | *9–22 | *9–19 | *
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA | *9–22 | *9–19 | *
SSL_DHE_DSS_WITH_DES_CBC_SHA | *9–22 | *9–19 | *
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | *9–22 | *9–19 | *
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA | *9–22 | *9–19 | *
SSL_DHE_RSA_WITH_DES_CBC_SHA | *9–22 | *9–19 | *
SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA | *9–22 | ** |
SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 | *9–22 | ** |
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA | *9–22 | ** |
SSL_DH_anon_WITH_DES_CBC_SHA | *9–22 | ** |
SSL_DH_anon_WITH_RC4_128_MD5 | *9–22 | ** |
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA | *9–22 | *9–19 | *
SSL_RSA_EXPORT_WITH_RC4_40_MD5 | *9–22 | *9–19 | *
SSL_RSA_WITH_3DES_EDE_CBC_SHA | *9+ | *9–19 | *
SSL_RSA_WITH_DES_CBC_SHA | *9–22 | *9–19 | *
SSL_RSA_WITH_NULL_MD5 | *9–22 | ** |
SSL_RSA_WITH_NULL_SHA | *9–22 | ** |
SSL_RSA_WITH_RC4_128_MD5 | *9+ | *9–19 | *
SSL_RSA_WITH_RC4_128_SHA | *9+ | *9+ | *
TLS_DHE_DSS_WITH_AES_128_CBC_SHA | *9–22 | *9–22 | *
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 | *20–22 | ** |
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 | *20–22 | ** |
TLS_DHE_DSS_WITH_AES_256_CBC_SHA | *9–22 | *11–22 | *
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 | *20–22 | ** |
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 | *20–22 | ** |
TLS_DHE_RSA_WITH_AES_128_CBC_SHA | *9+ | *9+ | *
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 | *20+ | ** |
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | *20+ | *20+ | *
TLS_DHE_RSA_WITH_AES_256_CBC_SHA | *9+ | *11+ | *
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | *20+ | ** |
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | *20+ | *20+ | *
TLS_DH_anon_WITH_AES_128_CBC_SHA | *9–22 | ** |
TLS_DH_anon_WITH_AES_128_CBC_SHA256 | *20–22 | ** |
TLS_DH_anon_WITH_AES_128_GCM_SHA256 | *20–22 | ** |
TLS_DH_anon_WITH_AES_256_CBC_SHA | *9–22 | ** |
TLS_DH_anon_WITH_AES_256_CBC_SHA256 | *20–22 | ** |
TLS_DH_anon_WITH_AES_256_GCM_SHA384 | *20–22 | ** |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA | *11+ | *11+ | *
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 | *20+ | ** |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | *20+ | *20+ | *
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | *11+ | *11+ | *
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 | *20+ | ** |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | *20+ | *20+ | *
TLS_ECDHE_ECDSA_WITH_NULL_SHA | *11–22 | ** |
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA | *11+ | *11+ | *
TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA | *21+ | *21+ | *
TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA | *21+ | *21+ | *
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA | *11+ | *11+ | *
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | *20+ | ** |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | *20+ | *20+ | *
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | *11+ | *11+ | *
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | *20+ | ** |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | *20+ | *20+ | *
TLS_ECDHE_RSA_WITH_NULL_SHA | *11–22 | ** |
TLS_ECDHE_RSA_WITH_RC4_128_SHA | *11+ | *11+ | *
TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 | *20–22 | ** |
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 | *20–22 | ** |
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 | *20–22 | ** |
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 | *20–22 | ** |
TLS_ECDH_ECDSA_WITH_NULL_SHA | *11–22 | ** |
TLS_ECDH_ECDSA_WITH_RC4_128_SHA | *11–22 | *11–19 | *
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 | *20–22 | ** |
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 | *20–22 | ** |
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA | *11–22 | *11–19 | *
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 | *20–22 | ** |
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 | *20–22 | ** |
TLS_ECDH_RSA_WITH_NULL_SHA | *11–22 | ** |
TLS_ECDH_RSA_WITH_RC4_128_SHA | *11–22 | *11–19 | *
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA | *11–22 | ** |
TLS_ECDH_anon_WITH_AES_128_CBC_SHA | *11–22 | ** |
TLS_ECDH_anon_WITH_AES_256_CBC_SHA | *11–22 | ** |
TLS_ECDH_anon_WITH_NULL_SHA | *11–22 | ** |
TLS_ECDH_anon_WITH_RC4_128_SHA | *11–22 | ** |
TLS_EMPTY_RENEGOTIATION_INFO_SCSV | *11+ | *11+ | *
TLS_FALLBACK_SCSV | *21+ | ** |
TLS_PSK_WITH_3DES_EDE_CBC_SHA | *21–22 | ** |
TLS_PSK_WITH_AES_128_CBC_SHA | *21+ | *21+ | *
TLS_PSK_WITH_AES_256_CBC_SHA | *21+ | *21+ | *
TLS_PSK_WITH_RC4_128_SHA | *21+ | ** |
TLS_RSA_WITH_AES_128_CBC_SHA | *9+ | *9+ | *
TLS_RSA_WITH_AES_128_CBC_SHA256 | *20+ | ** |
TLS_RSA_WITH_AES_128_GCM_SHA256 | *20+ | *20+ | *
TLS_RSA_WITH_AES_256_CBC_SHA | *9+ | *11+ | *
TLS_RSA_WITH_AES_256_CBC_SHA256 | *20+ | ** |
TLS_RSA_WITH_AES_256_GCM_SHA384 | *20+ | *20+ | *
TLS_RSA_WITH_NULL_SHA256 | *20–22 | ** |
NOTE: PSK cipher suites are enabled by default only if the {@code SSLContext} through * which the socket was created has been initialized with a {@code PSKKeyManager}. * *
API Levels 1 to 8 use OpenSSL names for cipher suites. The table below * lists these OpenSSL names and their corresponding standard names used in API * Levels 9 and newer. *
OpenSSL cipher suite | *Standard cipher suite | *Supported (API Levels) | *Enabled by default (API Levels) | *
---|---|---|---|
AES128-SHA | *TLS_RSA_WITH_AES_128_CBC_SHA | *1+ | *1+ | *
AES256-SHA | *TLS_RSA_WITH_AES_256_CBC_SHA | *1+ | *1–8, 11+ | *
DES-CBC-MD5 | *SSL_CK_DES_64_CBC_WITH_MD5 | *1–8 | *1–8 | *
DES-CBC-SHA | *SSL_RSA_WITH_DES_CBC_SHA | *1–22 | *1–19 | *
DES-CBC3-MD5 | *SSL_CK_DES_192_EDE3_CBC_WITH_MD5 | *1–8 | *1–8 | *
DES-CBC3-SHA | *SSL_RSA_WITH_3DES_EDE_CBC_SHA | *1+ | *1–19 | *
DHE-DSS-AES128-SHA | *TLS_DHE_DSS_WITH_AES_128_CBC_SHA | *1–22 | *1–22 | *
DHE-DSS-AES256-SHA | *TLS_DHE_DSS_WITH_AES_256_CBC_SHA | *1–22 | *1–8, 11–22 | *
DHE-RSA-AES128-SHA | *TLS_DHE_RSA_WITH_AES_128_CBC_SHA | *1+ | *1+ | *
DHE-RSA-AES256-SHA | *TLS_DHE_RSA_WITH_AES_256_CBC_SHA | *1+ | *1–8, 11+ | *
EDH-DSS-DES-CBC-SHA | *SSL_DHE_DSS_WITH_DES_CBC_SHA | *1–22 | *1–19 | *
EDH-DSS-DES-CBC3-SHA | *SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA | *1–22 | *1–19 | *
EDH-RSA-DES-CBC-SHA | *SSL_DHE_RSA_WITH_DES_CBC_SHA | *1–22 | *1–19 | *
EDH-RSA-DES-CBC3-SHA | *SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA | *1–22 | *1–19 | *
EXP-DES-CBC-SHA | *SSL_RSA_EXPORT_WITH_DES40_CBC_SHA | *1–22 | *1–19 | *
EXP-EDH-DSS-DES-CBC-SHA | *SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA | *1–22 | *1–19 | *
EXP-EDH-RSA-DES-CBC-SHA | *SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | *1–22 | *1–19 | *
EXP-RC2-CBC-MD5 | *SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 | *1–8 | *1–8 | *
EXP-RC4-MD5 | *SSL_RSA_EXPORT_WITH_RC4_40_MD5 | *1–22 | *1–19 | *
RC2-CBC-MD5 | *SSL_CK_RC2_128_CBC_WITH_MD5 | *1–8 | *1–8 | *
RC4-MD5 | *SSL_RSA_WITH_RC4_128_MD5 | *1+ | *1–19 | *
RC4-SHA | *SSL_RSA_WITH_RC4_128_SHA | *1+ | *1+ | *
* Creates a TCP socket. */ protected SSLSocket() { } /** * Only to be used by subclasses. *
* Creates a TCP socket connection to the specified host at the specified * port. * * @param host * the host name to connect to. * @param port * the port number to connect to. * @throws IOException * if creating the socket fails. * @throws UnknownHostException * if the specified host is not known. */ protected SSLSocket(String host, int port) throws IOException, UnknownHostException { super(host, port); } /** * Only to be used by subclasses. *
* Creates a TCP socket connection to the specified address at the specified * port. * * @param address * the address to connect to. * @param port * the port number to connect to. * @throws IOException * if creating the socket fails. */ protected SSLSocket(InetAddress address, int port) throws IOException { super(address, port); } /** * Only to be used by subclasses. *
* Creates a TCP socket connection to the specified host at the specified * port with the client side bound to the specified address and port. * * @param host * the host name to connect to. * @param port * the port number to connect to. * @param clientAddress * the client address to bind to * @param clientPort * the client port number to bind to. * @throws IOException * if creating the socket fails. * @throws UnknownHostException * if the specified host is not known. */ protected SSLSocket(String host, int port, InetAddress clientAddress, int clientPort) throws IOException, UnknownHostException { super(host, port, clientAddress, clientPort); } /** * Only to be used by subclasses. *
* Creates a TCP socket connection to the specified address at the specified * port with the client side bound to the specified address and port. * * @param address * the address to connect to. * @param port * the port number to connect to. * @param clientAddress * the client address to bind to. * @param clientPort * the client port number to bind to. * @throws IOException * if creating the socket fails. */ protected SSLSocket(InetAddress address, int port, InetAddress clientAddress, int clientPort) throws IOException { super(address, port, clientAddress, clientPort); } /** * Unsupported for SSL because reading from an SSL socket may require * writing to the network. */ @Override public void shutdownInput() throws IOException { throw new UnsupportedOperationException(); } /** * Unsupported for SSL because writing to an SSL socket may require reading * from the network. */ @Override public void shutdownOutput() throws IOException { throw new UnsupportedOperationException(); } /** * Returns the names of the supported cipher suites. */ public abstract String[] getSupportedCipherSuites(); /** * Returns the names of the enabled cipher suites. */ public abstract String[] getEnabledCipherSuites(); /** * Sets the names of the cipher suites to be enabled. * Only cipher suites returned by {@link #getSupportedCipherSuites()} are * allowed. * * @param suites * the names of the to be enabled cipher suites. * @throws IllegalArgumentException * if one of the cipher suite names is not supported. */ public abstract void setEnabledCipherSuites(String[] suites); /** * Returns the names of the supported protocols. */ public abstract String[] getSupportedProtocols(); /** * Returns the names of the enabled protocols. */ public abstract String[] getEnabledProtocols(); /** * Sets the names of the protocols to be enabled. Only * protocols returned by {@link #getSupportedProtocols()} are allowed. * * @param protocols * the names of the to be enabled protocols. * @throws IllegalArgumentException * if one of the protocols is not supported. */ public abstract void setEnabledProtocols(String[] protocols); /** * Returns the {@code SSLSession} for this connection. If necessary, a * handshake will be initiated, in which case this method will block until the handshake * has been established. If the handshake fails, an invalid session object * will be returned. * * @return the session object. */ public abstract SSLSession getSession(); /** * Registers the specified listener to receive notification on completion of * a handshake on this connection. * * @param listener the listener to register. * @throws IllegalArgumentException if {@code listener} is {@code null}. */ public abstract void addHandshakeCompletedListener(HandshakeCompletedListener listener); /** * Removes the specified handshake completion listener. * * @param listener * the listener to remove. * @throws IllegalArgumentException * if the specified listener is not registered or {@code null}. */ public abstract void removeHandshakeCompletedListener(HandshakeCompletedListener listener); /** * Starts a new SSL handshake on this connection. * * @throws IOException * if an error occurs. */ public abstract void startHandshake() throws IOException; /** * Sets whether this connection should act in client mode when handshaking. * * @param mode * {@code true} if this connection should act in client mode, * {@code false} if not. */ public abstract void setUseClientMode(boolean mode); /** * Returns true if this connection will act in client mode when handshaking. */ public abstract boolean getUseClientMode(); /** * Sets whether the server should require client authentication. This * does not apply to sockets in {@link #getUseClientMode() client mode}. * Client authentication is one of the following: *