mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
8215443: The use of TransportContext.fatal() leads to bad coding style
Reviewed-by: ascarpino
This commit is contained in:
parent
5a6385b363
commit
84105b36fd
48 changed files with 454 additions and 585 deletions
|
@ -75,7 +75,7 @@ final class RSAClientKeyExchange {
|
|||
super(context);
|
||||
|
||||
if (m.remaining() < 2) {
|
||||
context.conContext.fatal(Alert.HANDSHAKE_FAILURE,
|
||||
throw context.conContext.fatal(Alert.HANDSHAKE_FAILURE,
|
||||
"Invalid RSA ClientKeyExchange message: insufficient data");
|
||||
}
|
||||
|
||||
|
@ -167,14 +167,14 @@ final class RSAClientKeyExchange {
|
|||
}
|
||||
|
||||
if (rsaCredentials == null && x509Credentials == null) {
|
||||
chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"No RSA credentials negotiated for client key exchange");
|
||||
}
|
||||
|
||||
PublicKey publicKey = (rsaCredentials != null) ?
|
||||
rsaCredentials.popPublicKey : x509Credentials.popPublicKey;
|
||||
if (!publicKey.getAlgorithm().equals("RSA")) { // unlikely
|
||||
chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"Not RSA public key for client key exchange");
|
||||
}
|
||||
|
||||
|
@ -186,10 +186,8 @@ final class RSAClientKeyExchange {
|
|||
ckem = new RSAClientKeyExchangeMessage(
|
||||
chc, premaster, publicKey);
|
||||
} catch (GeneralSecurityException gse) {
|
||||
chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw chc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"Cannot generate RSA premaster secret", gse);
|
||||
|
||||
return null; // make the compiler happy
|
||||
}
|
||||
if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
|
||||
SSLLogger.fine(
|
||||
|
@ -205,7 +203,7 @@ final class RSAClientKeyExchange {
|
|||
chc.negotiatedCipherSuite.keyExchange,
|
||||
chc.negotiatedProtocol);
|
||||
if (ke == null) { // unlikely
|
||||
chc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
throw chc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
"Not supported key exchange type");
|
||||
} else {
|
||||
SSLKeyDerivation masterKD = ke.createKeyDerivation(chc);
|
||||
|
@ -217,7 +215,7 @@ final class RSAClientKeyExchange {
|
|||
SSLTrafficKeyDerivation kd =
|
||||
SSLTrafficKeyDerivation.valueOf(chc.negotiatedProtocol);
|
||||
if (kd == null) { // unlikely
|
||||
chc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
throw chc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
"Not supported key derivation: " +
|
||||
chc.negotiatedProtocol);
|
||||
} else {
|
||||
|
@ -262,14 +260,14 @@ final class RSAClientKeyExchange {
|
|||
}
|
||||
|
||||
if (rsaPossession == null && x509Possession == null) { // unlikely
|
||||
shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"No RSA possessions negotiated for client key exchange");
|
||||
}
|
||||
|
||||
PrivateKey privateKey = (rsaPossession != null) ?
|
||||
rsaPossession.popPrivateKey : x509Possession.popPrivateKey;
|
||||
if (!privateKey.getAlgorithm().equals("RSA")) { // unlikely
|
||||
shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"Not RSA private key for client key exchange");
|
||||
}
|
||||
|
||||
|
@ -287,7 +285,7 @@ final class RSAClientKeyExchange {
|
|||
RSAPremasterSecret.decode(shc, privateKey, ckem.encrypted);
|
||||
shc.handshakeCredentials.add(premaster);
|
||||
} catch (GeneralSecurityException gse) {
|
||||
shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
throw shc.conContext.fatal(Alert.ILLEGAL_PARAMETER,
|
||||
"Cannot decode RSA premaster secret", gse);
|
||||
}
|
||||
|
||||
|
@ -296,7 +294,7 @@ final class RSAClientKeyExchange {
|
|||
shc.negotiatedCipherSuite.keyExchange,
|
||||
shc.negotiatedProtocol);
|
||||
if (ke == null) { // unlikely
|
||||
shc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
throw shc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
"Not supported key exchange type");
|
||||
} else {
|
||||
SSLKeyDerivation masterKD = ke.createKeyDerivation(shc);
|
||||
|
@ -308,7 +306,7 @@ final class RSAClientKeyExchange {
|
|||
SSLTrafficKeyDerivation kd =
|
||||
SSLTrafficKeyDerivation.valueOf(shc.negotiatedProtocol);
|
||||
if (kd == null) { // unlikely
|
||||
shc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
throw shc.conContext.fatal(Alert.INTERNAL_ERROR,
|
||||
"Not supported key derivation: " +
|
||||
shc.negotiatedProtocol);
|
||||
} else {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue