package org.bouncycastle.crypto.tls; import java.io.IOException; import java.util.Hashtable; import org.bouncycastle.util.Arrays; public class SRPTlsClient extends AbstractTlsClient { protected TlsSRPGroupVerifier groupVerifier; protected byte[] identity; protected byte[] password; public SRPTlsClient(byte[] identity, byte[] password) { this(new DefaultTlsCipherFactory(), new DefaultTlsSRPGroupVerifier(), identity, password); } public SRPTlsClient(TlsCipherFactory cipherFactory, byte[] identity, byte[] password) { this(cipherFactory, new DefaultTlsSRPGroupVerifier(), identity, password); } public SRPTlsClient(TlsCipherFactory cipherFactory, TlsSRPGroupVerifier groupVerifier, byte[] identity, byte[] password) { super(cipherFactory); this.groupVerifier = groupVerifier; this.identity = Arrays.clone(identity); this.password = Arrays.clone(password); } protected boolean requireSRPServerExtension() { // No explicit guidance in RFC 5054; by default an (empty) extension from server is optional return false; } public int[] getCipherSuites() { return new int[] { CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA }; } public Hashtable getClientExtensions() throws IOException { Hashtable clientExtensions = TlsExtensionsUtils.ensureExtensionsInitialised(super.getClientExtensions()); TlsSRPUtils.addSRPExtension(clientExtensions, this.identity); return clientExtensions; } public void processServerExtensions(Hashtable serverExtensions) throws IOException { if (!TlsUtils.hasExpectedEmptyExtensionData(serverExtensions, TlsSRPUtils.EXT_SRP, AlertDescription.illegal_parameter)) { if (requireSRPServerExtension()) { throw new TlsFatalAlert(AlertDescription.illegal_parameter); } } super.processServerExtensions(serverExtensions); } public TlsKeyExchange getKeyExchange() throws IOException { int keyExchangeAlgorithm = TlsUtils.getKeyExchangeAlgorithm(selectedCipherSuite); switch (keyExchangeAlgorithm) { case KeyExchangeAlgorithm.SRP: case KeyExchangeAlgorithm.SRP_DSS: case KeyExchangeAlgorithm.SRP_RSA: return createSRPKeyExchange(keyExchangeAlgorithm); default: /* * Note: internal error here; the TlsProtocol implementation verifies that the * server-selected cipher suite was in the list of client-offered cipher suites, so if * we now can't produce an implementation, we shouldn't have offered it! */ throw new TlsFatalAlert(AlertDescription.internal_error); } } public TlsAuthentication getAuthentication() throws IOException { /* * Note: This method is not called unless a server certificate is sent, which may be the * case e.g. for SRP_DSS or SRP_RSA key exchange. */ throw new TlsFatalAlert(AlertDescription.internal_error); } protected TlsKeyExchange createSRPKeyExchange(int keyExchange) { return new TlsSRPKeyExchange(keyExchange, supportedSignatureAlgorithms, groupVerifier, identity, password); } }