|
32 | 32 | import java.text.MessageFormat;
|
33 | 33 | import java.util.ArrayList;
|
34 | 34 | import java.util.Arrays;
|
35 |
| -import java.util.Collection; |
36 | 35 | import java.util.Collections;
|
37 |
| -import java.util.HashSet; |
38 | 36 | import java.util.LinkedList;
|
39 | 37 | import java.util.List;
|
40 | 38 | import java.util.Locale;
|
@@ -760,59 +758,28 @@ private static SSLPossession choosePossession(HandshakeContext hc,
|
760 | 758 | crKeyTypes.add("RSASSA-PSS");
|
761 | 759 | }
|
762 | 760 |
|
763 |
| - Collection<String> checkedKeyTypes = new HashSet<>(); |
764 |
| - List<String> supportedKeyTypes = new ArrayList<>(); |
765 |
| - for (SignatureScheme ss : hc.peerRequestedCertSignSchemes) { |
766 |
| - if (checkedKeyTypes.contains(ss.keyAlgorithm)) { |
767 |
| - if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) { |
768 |
| - SSLLogger.warning( |
769 |
| - "Unsupported authentication scheme: " + ss.name); |
770 |
| - } |
771 |
| - continue; |
772 |
| - } |
773 |
| - checkedKeyTypes.add(ss.keyAlgorithm); |
774 |
| - |
775 |
| - // Don't select a signature scheme unless we will be able to |
776 |
| - // produce a CertificateVerify message later |
777 |
| - if (SignatureScheme.getPreferableAlgorithm( |
778 |
| - hc.algorithmConstraints, |
779 |
| - hc.peerRequestedSignatureSchemes, |
780 |
| - ss, hc.negotiatedProtocol) == null) { |
781 |
| - |
782 |
| - if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) { |
783 |
| - SSLLogger.warning( |
784 |
| - "Unable to produce CertificateVerify for " + |
785 |
| - "signature scheme: " + ss.name); |
786 |
| - } |
787 |
| - continue; |
788 |
| - } |
789 |
| - |
790 |
| - X509Authentication ka = X509Authentication.valueOf(ss); |
791 |
| - if (ka == null) { |
792 |
| - if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) { |
793 |
| - SSLLogger.warning( |
794 |
| - "Unsupported authentication scheme: " + ss.name); |
795 |
| - } |
796 |
| - continue; |
797 |
| - } else { |
798 |
| - // Any auth object will have a set of allowed key types. |
799 |
| - // This set should share at least one common algorithm with |
800 |
| - // the CR's allowed key types. |
801 |
| - if (Collections.disjoint(crKeyTypes, |
802 |
| - Arrays.asList(ka.keyTypes))) { |
803 |
| - if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) { |
804 |
| - SSLLogger.warning( |
805 |
| - "Unsupported authentication scheme: " + |
806 |
| - ss.name); |
807 |
| - } |
808 |
| - continue; |
809 |
| - } |
810 |
| - } |
811 |
| - supportedKeyTypes.add(ss.keyAlgorithm); |
812 |
| - } |
| 761 | + String[] supportedKeyTypes = hc.peerRequestedCertSignSchemes |
| 762 | + .stream() |
| 763 | + .map(ss -> ss.keyAlgorithm) |
| 764 | + .distinct() |
| 765 | + .filter(ka -> SignatureScheme.getPreferableAlgorithm( // Don't select a signature scheme unless |
| 766 | + hc.algorithmConstraints, // we will be able to produce |
| 767 | + hc.peerRequestedSignatureSchemes, // a CertificateVerify message later |
| 768 | + ka, hc.negotiatedProtocol) != null |
| 769 | + || SSLLogger.logWarning("ssl,handshake", |
| 770 | + "Unable to produce CertificateVerify for key algorithm: " + ka)) |
| 771 | + .filter(ka -> { |
| 772 | + var xa = X509Authentication.valueOfKeyAlgorithm(ka); |
| 773 | + // Any auth object will have a set of allowed key types. |
| 774 | + // This set should share at least one common algorithm with |
| 775 | + // the CR's allowed key types. |
| 776 | + return xa != null && !Collections.disjoint(crKeyTypes, Arrays.asList(xa.keyTypes)) |
| 777 | + || SSLLogger.logWarning("ssl,handshake", "Unsupported key algorithm: " + ka); |
| 778 | + }) |
| 779 | + .toArray(String[]::new); |
813 | 780 |
|
814 | 781 | SSLPossession pos = X509Authentication
|
815 |
| - .createPossession(hc, supportedKeyTypes.toArray(String[]::new)); |
| 782 | + .createPossession(hc, supportedKeyTypes); |
816 | 783 | if (pos == null) {
|
817 | 784 | if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
|
818 | 785 | SSLLogger.warning("No available authentication scheme");
|
|
0 commit comments