OpenSSLSocketImpl.java 44.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
/*
 * Copyright (C) 2007 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

Kenny Root's avatar
Kenny Root committed
17
package org.conscrypt;
18

Kenny Root's avatar
Kenny Root committed
19
import org.conscrypt.util.ArrayUtils;
20
import dalvik.system.BlockGuard;
21
import dalvik.system.CloseGuard;
22
import java.io.FileDescriptor;
23 24 25 26 27 28
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.net.InetAddress;
import java.net.Socket;
import java.net.SocketException;
29
import java.security.InvalidKeyException;
30 31
import java.security.PrivateKey;
import java.security.SecureRandom;
32
import java.security.cert.CertificateEncodingException;
33
import java.security.cert.CertificateException;
34 35
import java.security.interfaces.ECKey;
import java.security.spec.ECParameterSpec;
36
import java.util.ArrayList;
Alex Klyubin's avatar
Alex Klyubin committed
37
import javax.crypto.SecretKey;
38 39 40
import javax.net.ssl.HandshakeCompletedEvent;
import javax.net.ssl.HandshakeCompletedListener;
import javax.net.ssl.SSLException;
41
import javax.net.ssl.SSLHandshakeException;
42
import javax.net.ssl.SSLProtocolException;
43
import javax.net.ssl.SSLSession;
44
import javax.net.ssl.X509KeyManager;
45
import javax.net.ssl.X509TrustManager;
46
import javax.security.auth.x500.X500Principal;
47

48
/**
49 50 51 52 53 54 55 56
 * Implementation of the class OpenSSLSocketImpl based on OpenSSL.
 * <p>
 * Extensions to SSLSocket include:
 * <ul>
 * <li>handshake timeout
 * <li>session tickets
 * <li>Server Name Indication
 * </ul>
57
 */
58 59
public class OpenSSLSocketImpl
        extends javax.net.ssl.SSLSocket
Alex Klyubin's avatar
Alex Klyubin committed
60 61
        implements NativeCrypto.SSLHandshakeCallbacks, SSLParametersImpl.AliasChooser,
        SSLParametersImpl.PSKCallbacks {
62

63 64
    private static final boolean DBG_STATE = false;

65 66 67
    /**
     * Protects handshakeStarted and handshakeCompleted.
     */
68
    private final Object stateLock = new Object();
69 70

    /**
71 72
     * The {@link OpenSSLSocketImpl} object is constructed, but {@link #startHandshake()}
     * has not yet been called.
73
     */
74
    private static final int STATE_NEW = 0;
75 76

    /**
77
     * {@link #startHandshake()} has been called at least once.
78
     */
79
    private static final int STATE_HANDSHAKE_STARTED = 1;
80 81

    /**
82 83
     * {@link #handshakeCompleted()} has been called, but {@link #startHandshake()} hasn't
     * returned yet.
84
     */
85 86 87 88 89 90 91 92
    private static final int STATE_HANDSHAKE_COMPLETED = 2;

    /**
     * {@link #startHandshake()} has completed but {@link #handshakeCompleted()} hasn't
     * been called. This is expected behaviour in cut-through mode, where SSL_do_handshake
     * returns before the handshake is complete. We can now start writing data to the socket.
     */
    private static final int STATE_READY_HANDSHAKE_CUT_THROUGH = 3;
93 94

    /**
95 96
     * {@link #startHandshake()} has completed and {@link #handshakeCompleted()} has been
     * called.
97
     */
98
    private static final int STATE_READY = 4;
99 100

    /**
101
     * {@link #close()} has been called at least once.
102
     */
103 104 105 106
    private static final int STATE_CLOSED = 5;

    // @GuardedBy("stateLock");
    private int state = STATE_NEW;
107 108

    /**
109 110
     * Protected by synchronizing on stateLock. Starts as 0, set by
     * startHandshake, reset to 0 on close.
111
     */
112 113
    // @GuardedBy("stateLock");
    private long sslNativePointer;
114 115

    /**
116 117
     * Protected by synchronizing on stateLock. Starts as null, set by
     * getInputStream.
118
     */
119 120 121 122 123 124 125 126 127
    // @GuardedBy("stateLock");
    private SSLInputStream is;

    /**
     * Protected by synchronizing on stateLock. Starts as null, set by
     * getInputStream.
     */
    // @GuardedBy("stateLock");
    private SSLOutputStream os;
128 129 130

    private final Socket socket;
    private final boolean autoClose;
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148

    /**
     * The peer's DNS hostname if it was supplied during creation.
     */
    private String peerHostname;

    /**
     * The DNS hostname from reverse lookup on the socket. Should never be used
     * for Server Name Indication (SNI).
     */
    private String resolvedHostname;

    /**
     * The peer's port if it was supplied during creation. Should only be set if
     * {@link #peerHostname} is also set.
     */
    private final int peerPort;

149 150 151
    private final SSLParametersImpl sslParameters;
    private final CloseGuard guard = CloseGuard.get();

Kenny Root's avatar
Kenny Root committed
152
    private ArrayList<HandshakeCompletedListener> listeners;
153 154

    /**
Kenny Root's avatar
Kenny Root committed
155 156
     * Private key for the TLS Channel ID extension. This field is client-side
     * only. Set during startHandshake.
157
     */
Kenny Root's avatar
Kenny Root committed
158
    OpenSSLKey channelIdPrivateKey;
159 160 161

    /** Set during startHandshake. */
    private OpenSSLSessionImpl sslSession;
162

163 164 165
    /** Used during handshake callbacks. */
    private OpenSSLSessionImpl handshakeSession;

166 167 168 169 170 171
    /**
     * Local cache of timeout to avoid getsockopt on every read and
     * write for non-wrapped sockets. Note that
     * OpenSSLSocketImplWrapper overrides setSoTimeout and
     * getSoTimeout to delegate to the wrapped socket.
     */
172 173
    private int readTimeoutMilliseconds = 0;
    private int writeTimeoutMilliseconds = 0;
174 175

    private int handshakeTimeoutMilliseconds = -1;  // -1 = same as timeout; 0 = infinite
176

177
    protected OpenSSLSocketImpl(SSLParametersImpl sslParameters) throws IOException {
178
        this.socket = this;
179 180
        this.peerHostname = null;
        this.peerPort = -1;
181 182
        this.autoClose = false;
        this.sslParameters = sslParameters;
183 184
    }

185
    protected OpenSSLSocketImpl(String hostname, int port, SSLParametersImpl sslParameters)
186
            throws IOException {
187
        super(hostname, port);
188
        this.socket = this;
189 190
        this.peerHostname = hostname;
        this.peerPort = port;
191 192
        this.autoClose = false;
        this.sslParameters = sslParameters;
193 194
    }

195
    protected OpenSSLSocketImpl(InetAddress address, int port, SSLParametersImpl sslParameters)
196
            throws IOException {
197
        super(address, port);
198
        this.socket = this;
199 200
        this.peerHostname = null;
        this.peerPort = -1;
201 202
        this.autoClose = false;
        this.sslParameters = sslParameters;
203 204 205
    }


206
    protected OpenSSLSocketImpl(String hostname, int port,
207
                                InetAddress clientAddress, int clientPort,
208
                                SSLParametersImpl sslParameters) throws IOException {
209
        super(hostname, port, clientAddress, clientPort);
210
        this.socket = this;
211 212
        this.peerHostname = hostname;
        this.peerPort = port;
213 214
        this.autoClose = false;
        this.sslParameters = sslParameters;
215 216 217
    }

    protected OpenSSLSocketImpl(InetAddress address, int port,
218
                                InetAddress clientAddress, int clientPort,
219
                                SSLParametersImpl sslParameters) throws IOException {
220
        super(address, port, clientAddress, clientPort);
221
        this.socket = this;
222 223
        this.peerHostname = null;
        this.peerPort = -1;
224 225
        this.autoClose = false;
        this.sslParameters = sslParameters;
226 227 228
    }

    /**
229 230
     * Create an SSL socket that wraps another socket. Invoked by
     * OpenSSLSocketImplWrapper constructor.
231
     */
232
    protected OpenSSLSocketImpl(Socket socket, String hostname, int port,
233
            boolean autoClose, SSLParametersImpl sslParameters) throws IOException {
234
        this.socket = socket;
235 236
        this.peerHostname = hostname;
        this.peerPort = port;
237
        this.autoClose = autoClose;
238
        this.sslParameters = sslParameters;
239 240 241 242

        // this.timeout is not set intentionally.
        // OpenSSLSocketImplWrapper.getSoTimeout will delegate timeout
        // to wrapped socket
243 244
    }

245 246 247 248 249 250
    private void checkOpen() throws SocketException {
        if (isClosed()) {
            throw new SocketException("Socket is closed");
        }
    }

251
    /**
252 253 254 255 256
     * Starts a TLS/SSL handshake on this connection using some native methods
     * from the OpenSSL library. It can negotiate new encryption keys, change
     * cipher suites, or initiate a new session. The certificate chain is
     * verified if the correspondent property in java.Security is set. All
     * listeners are notified at the end of the TLS/SSL handshake.
257
     */
Kenny Root's avatar
Kenny Root committed
258 259
    @Override
    public void startHandshake() throws IOException {
260 261 262 263
        checkOpen();
        synchronized (stateLock) {
            if (state == STATE_NEW) {
                state = STATE_HANDSHAKE_STARTED;
264
            } else {
265 266
                // We've either started the handshake already or have been closed.
                // Do nothing in both cases.
267 268 269 270
                return;
            }
        }

271 272 273 274 275 276 277 278 279 280 281
        // note that this modifies the global seed, not something specific to the connection
        final int seedLengthInBytes = NativeCrypto.RAND_SEED_LENGTH_IN_BYTES;
        final SecureRandom secureRandom = sslParameters.getSecureRandomMember();
        if (secureRandom == null) {
            NativeCrypto.RAND_load_file("/dev/urandom", seedLengthInBytes);
        } else {
            NativeCrypto.RAND_seed(secureRandom.generateSeed(seedLengthInBytes));
        }

        final boolean client = sslParameters.getUseClientMode();

282 283
        sslNativePointer = 0;
        boolean releaseResources = true;
284
        try {
Kenny Root's avatar
Kenny Root committed
285 286
            final AbstractSessionContext sessionContext = sslParameters.getSessionContext();
            final long sslCtxNativePointer = sessionContext.sslCtxNativePointer;
287 288
            sslNativePointer = NativeCrypto.SSL_new(sslCtxNativePointer);
            guard.open("close");
289

Kenny Root's avatar
Kenny Root committed
290
            boolean enableSessionCreation = getEnableSessionCreation();
291 292
            if (!enableSessionCreation) {
                NativeCrypto.SSL_set_session_creation_enabled(sslNativePointer,
Kenny Root's avatar
Kenny Root committed
293
                        enableSessionCreation);
294 295
            }

296 297 298 299 300
            // Allow servers to trigger renegotiation. Some inadvisable server
            // configurations cause them to attempt to renegotiate during
            // certain protocols.
            NativeCrypto.SSL_set_reject_peer_renegotiations(sslNativePointer, false);

Kenny Root's avatar
Kenny Root committed
301
            final OpenSSLSessionImpl sessionToReuse = sslParameters.getSessionToReuse(
302
                    sslNativePointer, getHostname(), getPort());
Alex Klyubin's avatar
Alex Klyubin committed
303
            sslParameters.setSSLParameters(sslCtxNativePointer, sslNativePointer, this, this,
304
                    peerHostname);
Kenny Root's avatar
Kenny Root committed
305 306
            sslParameters.setCertificateValidation(sslNativePointer);
            sslParameters.setTlsChannelId(sslNativePointer, channelIdPrivateKey);
307

308
            // Temporarily use a different timeout for the handshake process
309 310
            int savedReadTimeoutMilliseconds = getSoTimeout();
            int savedWriteTimeoutMilliseconds = getSoWriteTimeout();
311 312
            if (handshakeTimeoutMilliseconds >= 0) {
                setSoTimeout(handshakeTimeoutMilliseconds);
313
                setSoWriteTimeout(handshakeTimeoutMilliseconds);
314
            }
315

316 317 318 319 320 321
            synchronized (stateLock) {
                if (state == STATE_CLOSED) {
                    return;
                }
            }

322
            long sslSessionNativePointer;
323
            try {
324
                sslSessionNativePointer = NativeCrypto.SSL_do_handshake(sslNativePointer,
325
                        Platform.getFileDescriptor(socket), this, getSoTimeout(), client,
Kenny Root's avatar
Kenny Root committed
326
                        sslParameters.npnProtocols, client ? null : sslParameters.alpnProtocols);
327
            } catch (CertificateException e) {
328 329 330
                SSLHandshakeException wrapper = new SSLHandshakeException(e.getMessage());
                wrapper.initCause(e);
                throw wrapper;
331 332 333 334 335 336 337 338 339 340 341 342 343 344
            } catch (SSLException e) {
                // Swallow this exception if it's thrown as the result of an interruption.
                //
                // TODO: SSL_read and SSL_write return -1 when interrupted, but SSL_do_handshake
                // will throw the last sslError that it saw before sslSelect, usually SSL_WANT_READ
                // (or WANT_WRITE). Catching that exception here doesn't seem much worse than
                // changing the native code to return a "special" native pointer value when that
                // happens.
                synchronized (stateLock) {
                    if (state == STATE_CLOSED) {
                        return;
                    }
                }

345 346 347 348 349
                // Write CCS errors to EventLog
                String message = e.getMessage();
                // Must match error string of SSL_R_UNEXPECTED_CCS
                if (message.contains("unexpected CCS")) {
                    String logMessage = String.format("ssl_unexpected_ccs: host=%s",
Kenny Root's avatar
Kenny Root committed
350
                            getHostname());
351 352 353
                    Platform.logEvent(logMessage);
                }

354
                throw e;
355
            }
356 357 358 359 360 361 362 363 364 365

            boolean handshakeCompleted = false;
            synchronized (stateLock) {
                if (state == STATE_HANDSHAKE_COMPLETED) {
                    handshakeCompleted = true;
                } else if (state == STATE_CLOSED) {
                    return;
                }
            }

Kenny Root's avatar
Kenny Root committed
366
            sslSession = sslParameters.setupSession(sslSessionNativePointer, sslNativePointer,
367
                    sessionToReuse, getHostname(), getPort(), handshakeCompleted);
368 369 370

            // Restore the original timeout now that the handshake is complete
            if (handshakeTimeoutMilliseconds >= 0) {
371 372
                setSoTimeout(savedReadTimeoutMilliseconds);
                setSoWriteTimeout(savedWriteTimeoutMilliseconds);
373
            }
374

375 376 377 378
            // if not, notifyHandshakeCompletedListeners later in handshakeCompleted() callback
            if (handshakeCompleted) {
                notifyHandshakeCompletedListeners();
            }
379

380 381 382 383 384 385 386 387 388 389 390 391 392 393 394
            synchronized (stateLock) {
                releaseResources = (state == STATE_CLOSED);

                if (state == STATE_HANDSHAKE_STARTED) {
                    state = STATE_READY_HANDSHAKE_CUT_THROUGH;
                } else if (state == STATE_HANDSHAKE_COMPLETED) {
                    state = STATE_READY;
                }

                if (!releaseResources) {
                    // Unblock threads that are waiting for our state to transition
                    // into STATE_READY or STATE_READY_HANDSHAKE_CUT_THROUGH.
                    stateLock.notifyAll();
                }
            }
395
        } catch (SSLProtocolException e) {
396 397
            throw (SSLHandshakeException) new SSLHandshakeException("Handshake failed")
                    .initCause(e);
398
        } finally {
399
            // on exceptional exit, treat the socket as closed
400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415
            if (releaseResources) {
                synchronized (stateLock) {
                    // Mark the socket as closed since we might have reached this as
                    // a result on an exception thrown by the handshake process.
                    //
                    // The state will already be set to closed if we reach this as a result of
                    // an early return or an interruption due to a concurrent call to close().
                    state = STATE_CLOSED;
                    stateLock.notifyAll();
                }

                try {
                    shutdownAndFreeSslNative();
                } catch (IOException ignored) {

                }
416
            }
417
        }
418
    }
419

420 421 422 423 424 425 426 427 428
    /**
     * Returns the hostname that was supplied during socket creation or tries to
     * look up the hostname via the supplied socket address if possible. This
     * may result in the return of a IP address and should not be used for
     * Server Name Indication (SNI).
     */
    private String getHostname() {
        if (peerHostname != null) {
            return peerHostname;
429
        }
430 431 432 433 434
        if (resolvedHostname == null) {
            InetAddress inetAddress = super.getInetAddress();
            if (inetAddress != null) {
                resolvedHostname = inetAddress.getHostName();
            }
435
        }
436
        return resolvedHostname;
437 438
    }

439 440
    @Override
    public int getPort() {
441
        return peerPort == -1 ? super.getPort() : peerPort;
442 443
    }

Kenny Root's avatar
Kenny Root committed
444
    @Override
445
    @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks / client_cert_cb
446
    public void clientCertificateRequested(byte[] keyTypeBytes, byte[][] asn1DerEncodedPrincipals)
447
            throws CertificateEncodingException, SSLException {
Kenny Root's avatar
Kenny Root committed
448 449
        sslParameters.chooseClientCertificate(keyTypeBytes, asn1DerEncodedPrincipals,
                sslNativePointer, this);
450 451
    }

Alex Klyubin's avatar
Alex Klyubin committed
452 453 454 455 456 457 458 459 460 461 462 463
    @Override
    @SuppressWarnings("unused") // used by native psk_client_callback
    public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) {
        return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
    }

    @Override
    @SuppressWarnings("unused") // used by native psk_server_callback
    public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) {
        return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
    }

Kenny Root's avatar
Kenny Root committed
464
    @Override
465
    @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks / info_callback
Kenny Root's avatar
Kenny Root committed
466
    public void onSSLStateChange(long sslSessionNativePtr, int type, int val) {
467
        if (type != NativeConstants.SSL_CB_HANDSHAKE_DONE) {
Kenny Root's avatar
Kenny Root committed
468 469 470
            return;
        }

471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488
        synchronized (stateLock) {
            if (state == STATE_HANDSHAKE_STARTED) {
                // If sslSession is null, the handshake was completed during
                // the call to NativeCrypto.SSL_do_handshake and not during a
                // later read operation. That means we do not need to fix up
                // the SSLSession and session cache or notify
                // HandshakeCompletedListeners, it will be done in
                // startHandshake.

                state = STATE_HANDSHAKE_COMPLETED;
                return;
            } else if (state == STATE_READY_HANDSHAKE_CUT_THROUGH) {
                // We've returned from startHandshake, which means we've set a sslSession etc.
                // we need to fix them up, which we'll do outside this lock.
            } else if (state == STATE_CLOSED) {
                // Someone called "close" but the handshake hasn't been interrupted yet.
                return;
            }
489
        }
490

491 492 493 494 495 496 497
        // reset session id from the native pointer and update the
        // appropriate cache.
        sslSession.resetId();
        AbstractSessionContext sessionContext =
            (sslParameters.getUseClientMode())
            ? sslParameters.getClientSessionContext()
                : sslParameters.getServerSessionContext();
498
        sessionContext.putSession(sslSession);
499 500 501

        // let listeners know we are finally done
        notifyHandshakeCompletedListeners();
502 503 504 505 506 507 508 509

        synchronized (stateLock) {
            // Now that we've fixed up our state, we can tell waiting threads that
            // we're ready.
            state = STATE_READY;
            // Notify all threads waiting for the handshake to complete.
            stateLock.notifyAll();
        }
510 511 512 513 514 515 516 517 518 519 520
    }

    private void notifyHandshakeCompletedListeners() {
        if (listeners != null && !listeners.isEmpty()) {
            // notify the listeners
            HandshakeCompletedEvent event =
                new HandshakeCompletedEvent(this, sslSession);
            for (HandshakeCompletedListener listener : listeners) {
                try {
                    listener.handshakeCompleted(event);
                } catch (RuntimeException e) {
521 522 523 524 525 526 527
                    // The RI runs the handlers in a separate thread,
                    // which we do not. But we try to preserve their
                    // behavior of logging a problem and not killing
                    // the handshaking thread just because a listener
                    // has a problem.
                    Thread thread = Thread.currentThread();
                    thread.getUncaughtExceptionHandler().uncaughtException(thread, e);
528 529 530
                }
            }
        }
531 532
    }

533
    @SuppressWarnings("unused") // used by NativeCrypto.SSLHandshakeCallbacks
Kenny Root's avatar
Kenny Root committed
534
    @Override
535
    public void verifyCertificateChain(long sslSessionNativePtr, long[] certRefs, String authMethod)
536
            throws CertificateException {
537
        try {
538 539 540 541
            X509TrustManager x509tm = sslParameters.getX509TrustManager();
            if (x509tm == null) {
                throw new CertificateException("No X.509 TrustManager");
            }
542
            if (certRefs == null || certRefs.length == 0) {
543 544
                throw new SSLException("Peer sent no certificate");
            }
545 546 547
            OpenSSLX509Certificate[] peerCertChain = new OpenSSLX509Certificate[certRefs.length];
            for (int i = 0; i < certRefs.length; i++) {
                peerCertChain[i] = new OpenSSLX509Certificate(certRefs[i]);
548
            }
549 550 551

            // Used for verifyCertificateChain callback
            handshakeSession = new OpenSSLSessionImpl(sslSessionNativePtr, null, peerCertChain,
552
                    getHostname(), getPort(), null);
553

554 555
            boolean client = sslParameters.getUseClientMode();
            if (client) {
556
                Platform.checkServerTrusted(x509tm, peerCertChain, authMethod, getHostname());
557
            } else {
558
                String authType = peerCertChain[0].getPublicKey().getAlgorithm();
Brian Carlstrom's avatar
Remove  
Brian Carlstrom committed
559
                x509tm.checkClientTrusted(peerCertChain, authType);
560
            }
561 562 563
        } catch (CertificateException e) {
            throw e;
        } catch (Exception e) {
564
            throw new CertificateException(e);
565 566 567
        } finally {
            // Clear this before notifying handshake completed listeners
            handshakeSession = null;
568 569 570
        }
    }

Kenny Root's avatar
Kenny Root committed
571 572
    @Override
    public InputStream getInputStream() throws IOException {
573
        checkOpen();
574 575 576 577 578 579 580

        InputStream returnVal;
        synchronized (stateLock) {
            if (state == STATE_CLOSED) {
                throw new SocketException("Socket is closed.");
            }

581 582 583 584
            if (is == null) {
                is = new SSLInputStream();
            }

585
            returnVal = is;
586
        }
587 588 589 590 591 592

        // Block waiting for a handshake without a lock held. It's possible that the socket
        // is closed at this point. If that happens, we'll still return the input stream but
        // all reads on it will throw.
        waitForHandshake();
        return returnVal;
593 594
    }

Kenny Root's avatar
Kenny Root committed
595 596
    @Override
    public OutputStream getOutputStream() throws IOException {
597
        checkOpen();
598 599 600 601 602 603 604

        OutputStream returnVal;
        synchronized (stateLock) {
            if (state == STATE_CLOSED) {
                throw new SocketException("Socket is closed.");
            }

605 606 607 608
            if (os == null) {
                os = new SSLOutputStream();
            }

609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
            returnVal = os;
        }

        // Block waiting for a handshake without a lock held. It's possible that the socket
        // is closed at this point. If that happens, we'll still return the output stream but
        // all writes on it will throw.
        waitForHandshake();
        return returnVal;
    }

    private void assertReadableOrWriteableState() {
        if (state == STATE_READY || state == STATE_READY_HANDSHAKE_CUT_THROUGH) {
            return;
        }

        throw new AssertionError("Invalid state: " + state);
    }


    private void waitForHandshake() throws IOException {
        startHandshake();

        synchronized (stateLock) {
            while (state != STATE_READY &&
                    state != STATE_READY_HANDSHAKE_CUT_THROUGH &&
                    state != STATE_CLOSED) {
                try {
                    stateLock.wait();
                } catch (InterruptedException e) {
                    Thread.currentThread().interrupt();
                    IOException ioe = new IOException("Interrupted waiting for handshake");
                    ioe.initCause(e);

                    throw ioe;
                }
            }

            if (state == STATE_CLOSED) {
                throw new SocketException("Socket is closed");
            }
649 650 651 652 653 654 655 656 657
        }
    }

    /**
     * This inner class provides input data stream functionality
     * for the OpenSSL native implementation. It is used to
     * read data received via SSL protocol.
     */
    private class SSLInputStream extends InputStream {
658 659 660 661 662 663 664 665
        /**
         * OpenSSL only lets one thread read at a time, so this is used to
         * make sure we serialize callers of SSL_read. Thread is already
         * expected to have completed handshaking.
         */
        private final Object readLock = new Object();

        SSLInputStream() {
666 667 668 669 670 671 672
        }

        /**
         * Reads one byte. If there is no data in the underlying buffer,
         * this operation can block until the data will be
         * available.
         * @return read value.
673
         * @throws IOException
674
         */
675
        @Override
676
        public int read() throws IOException {
677 678 679
            byte[] buffer = new byte[1];
            int result = read(buffer, 0, 1);
            return (result != -1) ? buffer[0] & 0xff : -1;
680 681 682 683 684 685
        }

        /**
         * Method acts as described in spec for superclass.
         * @see java.io.InputStream#read(byte[],int,int)
         */
686
        @Override
687
        public int read(byte[] buf, int offset, int byteCount) throws IOException {
688
            BlockGuard.getThreadPolicy().onNetwork();
689 690

            checkOpen();
Kenny Root's avatar
Kenny Root committed
691
            ArrayUtils.checkOffsetAndCount(buf.length, offset, byteCount);
692 693 694 695
            if (byteCount == 0) {
                return 0;
            }

696
            synchronized (readLock) {
697 698 699 700 701 702
                synchronized (stateLock) {
                    if (state == STATE_CLOSED) {
                        throw new SocketException("socket is closed");
                    }

                    if (DBG_STATE) assertReadableOrWriteableState();
703
                }
704

705
                return NativeCrypto.SSL_read(sslNativePointer, Platform.getFileDescriptor(socket),
706
                        OpenSSLSocketImpl.this, buf, offset, byteCount, getSoTimeout());
707 708
            }
        }
709 710 711 712 713 714 715 716 717 718

        public void awaitPendingOps() {
            if (DBG_STATE) {
                synchronized (stateLock) {
                    if (state != STATE_CLOSED) throw new AssertionError("State is: " + state);
                }
            }

            synchronized (readLock) { }
        }
719 720 721 722 723 724 725 726
    }

    /**
     * This inner class provides output data stream functionality
     * for the OpenSSL native implementation. It is used to
     * write data according to the encryption parameters given in SSL context.
     */
    private class SSLOutputStream extends OutputStream {
727 728 729 730 731 732 733 734 735

        /**
         * OpenSSL only lets one thread write at a time, so this is used
         * to make sure we serialize callers of SSL_write. Thread is
         * already expected to have completed handshaking.
         */
        private final Object writeLock = new Object();

        SSLOutputStream() {
736 737 738 739 740 741
        }

        /**
         * Method acts as described in spec for superclass.
         * @see java.io.OutputStream#write(int)
         */
742
        @Override
743
        public void write(int oneByte) throws IOException {
744 745 746
            byte[] buffer = new byte[1];
            buffer[0] = (byte) (oneByte & 0xff);
            write(buffer);
747 748 749 750 751 752
        }

        /**
         * Method acts as described in spec for superclass.
         * @see java.io.OutputStream#write(byte[],int,int)
         */
753
        @Override
754
        public void write(byte[] buf, int offset, int byteCount) throws IOException {
755
            BlockGuard.getThreadPolicy().onNetwork();
756
            checkOpen();
Kenny Root's avatar
Kenny Root committed
757
            ArrayUtils.checkOffsetAndCount(buf.length, offset, byteCount);
758 759 760 761
            if (byteCount == 0) {
                return;
            }

762
            synchronized (writeLock) {
763 764 765 766 767 768
                synchronized (stateLock) {
                    if (state == STATE_CLOSED) {
                        throw new SocketException("socket is closed");
                    }

                    if (DBG_STATE) assertReadableOrWriteableState();
769
                }
770

771
                NativeCrypto.SSL_write(sslNativePointer, Platform.getFileDescriptor(socket),
772
                        OpenSSLSocketImpl.this, buf, offset, byteCount, writeTimeoutMilliseconds);
773 774
            }
        }
775 776 777 778 779 780 781 782 783 784 785


        public void awaitPendingOps() {
            if (DBG_STATE) {
                synchronized (stateLock) {
                    if (state != STATE_CLOSED) throw new AssertionError("State is: " + state);
                }
            }

            synchronized (writeLock) { }
        }
786 787 788
    }


Kenny Root's avatar
Kenny Root committed
789 790
    @Override
    public SSLSession getSession() {
791 792
        if (sslSession == null) {
            try {
793
                waitForHandshake();
794 795 796
            } catch (IOException e) {
                // return an invalid session with
                // invalid cipher suite of "SSL_NULL_WITH_NULL_NULL"
Kenny Root's avatar
Kenny Root committed
797
                return SSLNullSession.getNullSession();
798
            }
799 800 801 802
        }
        return sslSession;
    }

Kenny Root's avatar
Kenny Root committed
803 804
    @Override
    public void addHandshakeCompletedListener(
805 806 807 808 809
            HandshakeCompletedListener listener) {
        if (listener == null) {
            throw new IllegalArgumentException("Provided listener is null");
        }
        if (listeners == null) {
810
            listeners = new ArrayList<HandshakeCompletedListener>();
811 812 813 814
        }
        listeners.add(listener);
    }

Kenny Root's avatar
Kenny Root committed
815 816
    @Override
    public void removeHandshakeCompletedListener(
817 818 819 820 821 822 823 824 825 826 827 828 829 830
            HandshakeCompletedListener listener) {
        if (listener == null) {
            throw new IllegalArgumentException("Provided listener is null");
        }
        if (listeners == null) {
            throw new IllegalArgumentException(
                    "Provided listener is not registered");
        }
        if (!listeners.remove(listener)) {
            throw new IllegalArgumentException(
                    "Provided listener is not registered");
        }
    }

Kenny Root's avatar
Kenny Root committed
831 832
    @Override
    public boolean getEnableSessionCreation() {
833 834 835
        return sslParameters.getEnableSessionCreation();
    }

Kenny Root's avatar
Kenny Root committed
836 837
    @Override
    public void setEnableSessionCreation(boolean flag) {
838 839 840
        sslParameters.setEnableSessionCreation(flag);
    }

Kenny Root's avatar
Kenny Root committed
841 842
    @Override
    public String[] getSupportedCipherSuites() {
843
        return NativeCrypto.getSupportedCipherSuites();
844 845
    }

Kenny Root's avatar
Kenny Root committed
846 847
    @Override
    public String[] getEnabledCipherSuites() {
Kenny Root's avatar
Kenny Root committed
848
        return sslParameters.getEnabledCipherSuites();
849 850
    }

Kenny Root's avatar
Kenny Root committed
851 852
    @Override
    public void setEnabledCipherSuites(String[] suites) {
Kenny Root's avatar
Kenny Root committed
853
        sslParameters.setEnabledCipherSuites(suites);
854 855
    }

Kenny Root's avatar
Kenny Root committed
856 857
    @Override
    public String[] getSupportedProtocols() {
858
        return NativeCrypto.getSupportedProtocols();
859 860
    }

Kenny Root's avatar
Kenny Root committed
861 862
    @Override
    public String[] getEnabledProtocols() {
863
        return sslParameters.getEnabledProtocols();
864 865
    }

Kenny Root's avatar
Kenny Root committed
866 867
    @Override
    public void setEnabledProtocols(String[] protocols) {
868
        sslParameters.setEnabledProtocols(protocols);
869 870
    }

871 872 873 874 875 876
    /**
     * This method enables session ticket support.
     *
     * @param useSessionTickets True to enable session tickets
     */
    public void setUseSessionTickets(boolean useSessionTickets) {
Kenny Root's avatar
Kenny Root committed
877
        sslParameters.useSessionTickets = useSessionTickets;
878 879 880 881 882 883 884 885
    }

    /**
     * This method enables Server Name Indication
     *
     * @param hostname the desired SNI hostname, or null to disable
     */
    public void setHostname(String hostname) {
Kenny Root's avatar
Kenny Root committed
886
        sslParameters.setUseSni(hostname != null);
887
        peerHostname = hostname;
888 889
    }

890 891 892 893 894 895 896 897 898 899 900 901 902
    /**
     * Enables/disables TLS Channel ID for this server socket.
     *
     * <p>This method needs to be invoked before the handshake starts.
     *
     * @throws IllegalStateException if this is a client socket or if the handshake has already
     *         started.

     */
    public void setChannelIdEnabled(boolean enabled) {
        if (getUseClientMode()) {
            throw new IllegalStateException("Client mode");
        }
903 904 905 906 907 908 909

        synchronized (stateLock) {
            if (state != STATE_NEW) {
                throw new IllegalStateException(
                        "Could not enable/disable Channel ID after the initial handshake has"
                                + " begun.");
            }
910
        }
Kenny Root's avatar
Kenny Root committed
911
        sslParameters.channelIdEnabled = enabled;
912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927
    }

    /**
     * Gets the TLS Channel ID for this server socket. Channel ID is only available once the
     * handshake completes.
     *
     * @return channel ID or {@code null} if not available.
     *
     * @throws IllegalStateException if this is a client socket or if the handshake has not yet
     *         completed.
     * @throws SSLException if channel ID is available but could not be obtained.
     */
    public byte[] getChannelId() throws SSLException {
        if (getUseClientMode()) {
            throw new IllegalStateException("Client mode");
        }
928 929 930 931 932 933

        synchronized (stateLock) {
            if (state != STATE_READY) {
                throw new IllegalStateException(
                        "Channel ID is only available after handshake completes");
            }
934 935 936 937 938 939 940 941 942 943
        }
        return NativeCrypto.SSL_get_tls_channel_id(sslNativePointer);
    }

    /**
     * Sets the {@link PrivateKey} to be used for TLS Channel ID by this client socket.
     *
     * <p>This method needs to be invoked before the handshake starts.
     *
     * @param privateKey private key (enables TLS Channel ID) or {@code null} for no key (disables
944
     *        TLS Channel ID). The private key must be an Elliptic Curve (EC) key based on the NIST
945 946 947 948 949
     *        P-256 curve (aka SECG secp256r1 or ANSI X9.62 prime256v1).
     *
     * @throws IllegalStateException if this is a server socket or if the handshake has already
     *         started.
     */
950
    public void setChannelIdPrivateKey(PrivateKey privateKey) {
951 952 953
        if (!getUseClientMode()) {
            throw new IllegalStateException("Server mode");
        }
954 955 956 957 958 959 960

        synchronized (stateLock) {
            if (state != STATE_NEW) {
                throw new IllegalStateException(
                        "Could not change Channel ID private key after the initial handshake has"
                                + " begun.");
            }
961
        }
962

963
        if (privateKey == null) {
Kenny Root's avatar
Kenny Root committed
964 965
            sslParameters.channelIdEnabled = false;
            channelIdPrivateKey = null;
966
        } else {
Kenny Root's avatar
Kenny Root committed
967
            sslParameters.channelIdEnabled = true;
968
            try {
969 970 971 972 973 974 975 976 977 978 979
                ECParameterSpec ecParams = null;
                if (privateKey instanceof ECKey) {
                    ecParams = ((ECKey) privateKey).getParams();
                }
                if (ecParams == null) {
                    // Assume this is a P-256 key, as specified in the contract of this method.
                    ecParams =
                            OpenSSLECGroupContext.getCurveByName("prime256v1").getECParameterSpec();
                }
                channelIdPrivateKey =
                        OpenSSLKey.fromECPrivateKeyForTLSStackOnly(privateKey, ecParams);
980 981 982 983
            } catch (InvalidKeyException e) {
                // Will have error in startHandshake
            }
        }
984 985
    }

Kenny Root's avatar
Kenny Root committed
986 987
    @Override
    public boolean getUseClientMode() {
988 989 990
        return sslParameters.getUseClientMode();
    }

Kenny Root's avatar
Kenny Root committed
991 992
    @Override
    public void setUseClientMode(boolean mode) {
993 994 995 996 997
        synchronized (stateLock) {
            if (state != STATE_NEW) {
                throw new IllegalArgumentException(
                        "Could not change the mode after the initial handshake has begun.");
            }
998 999 1000 1001
        }
        sslParameters.setUseClientMode(mode);
    }

Kenny Root's avatar
Kenny Root committed
1002 1003
    @Override
    public boolean getWantClientAuth() {
1004 1005 1006
        return sslParameters.getWantClientAuth();
    }

Kenny Root's avatar
Kenny Root committed
1007 1008
    @Override
    public boolean getNeedClientAuth() {
1009 1010 1011
        return sslParameters.getNeedClientAuth();
    }

Kenny Root's avatar
Kenny Root committed
1012 1013
    @Override
    public void setNeedClientAuth(boolean need) {
1014 1015 1016
        sslParameters.setNeedClientAuth(need);
    }

Kenny Root's avatar
Kenny Root committed
1017 1018
    @Override
    public void setWantClientAuth(boolean want) {
1019 1020 1021
        sslParameters.setWantClientAuth(want);
    }

Kenny Root's avatar
Kenny Root committed
1022 1023
    @Override
    public void sendUrgentData(int data) throws IOException {
1024
        throw new SocketException("Method sendUrgentData() is not supported.");
1025 1026
    }

Kenny Root's avatar
Kenny Root committed
1027 1028
    @Override
    public void setOOBInline(boolean on) throws SocketException {
1029
        throw new SocketException("Methods sendUrgentData, setOOBInline are not supported.");
1030 1031
    }

Kenny Root's avatar
Kenny Root committed
1032 1033
    @Override
    public void setSoTimeout(int readTimeoutMilliseconds) throws SocketException {
1034 1035
        super.setSoTimeout(readTimeoutMilliseconds);
        this.readTimeoutMilliseconds = readTimeoutMilliseconds;
1036 1037
    }

Kenny Root's avatar
Kenny Root committed
1038 1039
    @Override
    public int getSoTimeout() throws SocketException {
1040 1041 1042 1043 1044 1045 1046 1047 1048
        return readTimeoutMilliseconds;
    }

    /**
     * Note write timeouts are not part of the javax.net.ssl.SSLSocket API
     */
    public void setSoWriteTimeout(int writeTimeoutMilliseconds) throws SocketException {
        this.writeTimeoutMilliseconds = writeTimeoutMilliseconds;

1049
        Platform.setSocketWriteTimeout(this, writeTimeoutMilliseconds);
1050 1051 1052 1053 1054 1055 1056
    }

    /**
     * Note write timeouts are not part of the javax.net.ssl.SSLSocket API
     */
    public int getSoWriteTimeout() throws SocketException {
        return writeTimeoutMilliseconds;
1057 1058
    }

1059 1060 1061 1062
    /**
     * Set the handshake timeout on this socket.  This timeout is specified in
     * milliseconds and will be used only during the handshake process.
     */
1063 1064
    public void setHandshakeTimeout(int handshakeTimeoutMilliseconds) throws SocketException {
        this.handshakeTimeoutMilliseconds = handshakeTimeoutMilliseconds;
1065 1066
    }

Kenny Root's avatar
Kenny Root committed
1067 1068
    @Override
    public void close() throws IOException {
1069
        // TODO: Close SSL sockets using a background thread so they close gracefully.
1070

1071 1072
        SSLInputStream sslInputStream = null;
        SSLOutputStream sslOutputStream = null;
1073

1074 1075 1076 1077 1078
        synchronized (stateLock) {
            if (state == STATE_CLOSED) {
                // close() has already been called, so do nothing and return.
                return;
            }
1079

1080 1081 1082 1083 1084 1085 1086 1087
            int oldState = state;
            state = STATE_CLOSED;

            if (oldState == STATE_NEW) {
                // The handshake hasn't been started yet, so there's no OpenSSL related
                // state to clean up. We still need to close the underlying socket if
                // we're wrapping it and were asked to autoClose.
                closeUnderlyingSocket();
1088

1089
                stateLock.notifyAll();
1090 1091 1092
                return;
            }

1093 1094 1095 1096 1097 1098
            if (oldState != STATE_READY && oldState != STATE_READY_HANDSHAKE_CUT_THROUGH) {
                // If we're in these states, we still haven't returned from startHandshake.
                // We call SSL_interrupt so that we can interrupt SSL_do_handshake and then
                // set the state to STATE_CLOSED. startHandshake will handle all cleanup
                // after SSL_do_handshake returns, so we don't have anything to do here.
                NativeCrypto.SSL_interrupt(sslNativePointer);
1099

1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112
                stateLock.notifyAll();
                return;
            }

            stateLock.notifyAll();
            // We've already returned from startHandshake, so we potentially have
            // input and output streams to clean up.
            sslInputStream = is;
            sslOutputStream = os;
        }

        // Don't bother interrupting unless we have something to interrupt.
        if (sslInputStream != null || sslOutputStream != null) {
1113
            NativeCrypto.SSL_interrupt(sslNativePointer);
1114
        }
1115

1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131
        // Wait for the input and output streams to finish any reads they have in
        // progress. If there are no reads in progress at this point, future reads will
        // throw because state == STATE_CLOSED
        if (sslInputStream != null) {
            sslInputStream.awaitPendingOps();
        }
        if (sslOutputStream != null) {
            sslOutputStream.awaitPendingOps();
        }

        shutdownAndFreeSslNative();
    }

    private void shutdownAndFreeSslNative() throws IOException {
        try {
            BlockGuard.getThreadPolicy().onNetwork();
1132
            NativeCrypto.SSL_shutdown(sslNativePointer, Platform.getFileDescriptor(socket),
1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154
                    this);
        } catch (IOException ignored) {
            /*
            * Note that although close() can throw
            * IOException, the RI does not throw if there
            * is problem sending a "close notify" which
            * can happen if the underlying socket is closed.
            */
        } finally {
            free();
            closeUnderlyingSocket();
        }
    }

    private void closeUnderlyingSocket() throws IOException {
        if (socket != this) {
            if (autoClose && !socket.isClosed()) {
                socket.close();
            }
        } else {
            if (!super.isClosed()) {
                super.close();
1155 1156 1157 1158
            }
        }
    }

1159 1160 1161 1162 1163 1164
    private void free() {
        if (sslNativePointer == 0) {
            return;
        }
        NativeCrypto.SSL_free(sslNativePointer);
        sslNativePointer = 0;
1165
        guard.close();
1166
    }
1167

Kenny Root's avatar
Kenny Root committed
1168 1169
    @Override
    protected void finalize() throws Throwable {
1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186
        try {
            /*
             * Just worry about our own state. Notably we do not try and
             * close anything. The SocketImpl, either our own
             * PlainSocketImpl, or the Socket we are wrapping, will do
             * that. This might mean we do not properly SSL_shutdown, but
             * if you want to do that, properly close the socket yourself.
             *
             * The reason why we don't try to SSL_shutdown, is that there
             * can be a race between finalizers where the PlainSocketImpl
             * finalizer runs first and closes the socket. However, in the
             * meanwhile, the underlying file descriptor could be reused
             * for another purpose. If we call SSL_shutdown, the
             * underlying socket BIOs still have the old file descriptor
             * and will write the close notify to some unsuspecting
             * reader.
             */
1187 1188 1189
            if (guard != null) {
                guard.warnIfOpen();
            }
1190 1191 1192 1193
            free();
        } finally {
            super.finalize();
        }
1194
    }
1195

1196
    /* @Override */
1197 1198
    public FileDescriptor getFileDescriptor$() {
        if (socket == this) {
1199
            return Platform.getFileDescriptorFromSSLSocket(this);
1200
        } else {
1201
            return Platform.getFileDescriptor(socket);
1202 1203
        }
    }
Jesse Wilson's avatar
Jesse Wilson committed
1204 1205 1206 1207 1208 1209

    /**
     * Returns the protocol agreed upon by client and server, or null if no
     * protocol was agreed upon.
     */
    public byte[] getNpnSelectedProtocol() {
1210
        return NativeCrypto.SSL_get_npn_negotiated_protocol(sslNativePointer);
Jesse Wilson's avatar
Jesse Wilson committed
1211 1212
    }

Kenny Root's avatar
Kenny Root committed
1213 1214 1215 1216 1217 1218 1219 1220
    /**
     * Returns the protocol agreed upon by client and server, or {@code null} if
     * no protocol was agreed upon.
     */
    public byte[] getAlpnSelectedProtocol() {
        return NativeCrypto.SSL_get0_alpn_selected(sslNativePointer);
    }

Jesse Wilson's avatar
Jesse Wilson committed
1221 1222 1223 1224
    /**
     * Sets the list of protocols this peer is interested in. If null no
     * protocols will be used.
     *
1225 1226 1227 1228
     * @param npnProtocols a non-empty array of protocol names. From
     *     SSL_select_next_proto, "vector of 8-bit, length prefixed byte
     *     strings. The length byte itself is not included in the length. A byte
     *     string of length 0 is invalid. No byte string may be truncated.".
Jesse Wilson's avatar
Jesse Wilson committed
1229 1230
     */
    public void setNpnProtocols(byte[] npnProtocols) {
1231 1232 1233
        if (npnProtocols != null && npnProtocols.length == 0) {
            throw new IllegalArgumentException("npnProtocols.length == 0");
        }
Kenny Root's avatar
Kenny Root committed
1234
        sslParameters.npnProtocols = npnProtocols;
Jesse Wilson's avatar
Jesse Wilson committed
1235
    }
Kenny Root's avatar
Kenny Root committed
1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250

    /**
     * Sets the list of protocols this peer is interested in. If the list is
     * {@code null}, no protocols will be used.
     *
     * @param alpnProtocols a non-empty array of protocol names. From
     *            SSL_select_next_proto, "vector of 8-bit, length prefixed byte
     *            strings. The length byte itself is not included in the length.
     *            A byte string of length 0 is invalid. No byte string may be
     *            truncated.".
     */
    public void setAlpnProtocols(byte[] alpnProtocols) {
        if (alpnProtocols != null && alpnProtocols.length == 0) {
            throw new IllegalArgumentException("alpnProtocols.length == 0");
        }
Kenny Root's avatar
Kenny Root committed
1251
        sslParameters.alpnProtocols = alpnProtocols;
1252
    }
1253

Kenny Root's avatar
Kenny Root committed
1254 1255 1256 1257 1258 1259 1260 1261 1262 1263
    @Override
    public String chooseServerAlias(X509KeyManager keyManager, String keyType) {
        return keyManager.chooseServerAlias(keyType, null, this);
    }

    @Override
    public String chooseClientAlias(X509KeyManager keyManager, X500Principal[] issuers,
            String[] keyTypes) {
        return keyManager.chooseClientAlias(keyTypes, null, this);
    }
Alex Klyubin's avatar
Alex Klyubin committed
1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278

    @Override
    public String chooseServerPSKIdentityHint(PSKKeyManager keyManager) {
        return keyManager.chooseServerKeyIdentityHint(this);
    }

    @Override
    public String chooseClientPSKIdentity(PSKKeyManager keyManager, String identityHint) {
        return keyManager.chooseClientKeyIdentity(identityHint, this);
    }

    @Override
    public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) {
        return keyManager.getKey(identityHint, identity, this);
    }
1279
}