diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/lib/jss.def jss-4.2.6/mozilla/security/jss/lib/jss.def --- jss-4.2.6.pre-IPv6/mozilla/security/jss/lib/jss.def 2009-06-24 17:08:59.784371000 -0700 +++ jss-4.2.6/mozilla/security/jss/lib/jss.def 2009-06-19 17:56:00.000000000 -0700 @@ -175,6 +175,7 @@ Java_org_mozilla_jss_ssl_SSLServerSocket Java_org_mozilla_jss_ssl_SSLSocket_forceHandshake; Java_org_mozilla_jss_ssl_SSLSocket_getKeepAlive; Java_org_mozilla_jss_ssl_SSLSocket_getLocalAddressNative; +Java_org_mozilla_jss_ssl_SocketBase_getLocalAddressByteArrayNative; Java_org_mozilla_jss_ssl_SSLSocket_getPort; Java_org_mozilla_jss_ssl_SSLSocket_getReceiveBufferSize; Java_org_mozilla_jss_ssl_SSLSocket_getSendBufferSize; @@ -199,6 +200,7 @@ Java_org_mozilla_jss_ssl_SSLSocket_socke Java_org_mozilla_jss_ssl_SSLSocket_socketWrite; Java_org_mozilla_jss_ssl_SocketBase_getLocalPortNative; Java_org_mozilla_jss_ssl_SocketBase_getPeerAddressNative; +Java_org_mozilla_jss_ssl_SocketBase_getPeerAddressByteArrayNative; Java_org_mozilla_jss_ssl_SocketBase_setClientCertNicknameNative; Java_org_mozilla_jss_ssl_SocketBase_requestClientAuthNoExpiryCheckNative; Java_org_mozilla_jss_ssl_SocketBase_setSSLOption; diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLServerSocket.java jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLServerSocket.java --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLServerSocket.java 2007-03-20 15:39:28.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLServerSocket.java 2009-06-24 13:46:49.000000000 -0700 @@ -36,7 +36,8 @@ package org.mozilla.jss.ssl; -import java.net.InetAddress; +import java.util.*; +import java.net.*; import java.io.IOException; import java.net.Socket; import java.net.SocketException; @@ -138,34 +139,34 @@ public class SSLServerSocket extends jav super.close(); // create the socket + + int socketFamily = SocketBase.SSL_AF_INET; + if(SocketBase.supportsIPV6()) { + socketFamily = SocketBase.SSL_AF_INET6; + } + sockProxy = new SocketProxy( - base.socketCreate(this, certApprovalCallback, null) ); + base.socketCreate(this, certApprovalCallback, null,socketFamily) ); base.setProxy(sockProxy); setReuseAddress(reuseAddr); - // bind it to the local address and port - if( bindAddr == null ) { - bindAddr = anyLocalAddr; - } byte[] bindAddrBA = null; if( bindAddr != null ) { bindAddrBA = bindAddr.getAddress(); } base.socketBind(bindAddrBA, port); + + String hostName = null; + if(bindAddr != null) { + hostName = bindAddr.getCanonicalHostName(); + } socketListen(backlog); } private native void socketListen(int backlog) throws SocketException; - private static InetAddress anyLocalAddr; - static { - try { - anyLocalAddr = InetAddress.getByName("0.0.0.0"); - } catch (java.net.UnknownHostException e) { } - } - /** * Accepts a connection. This call will block until a connection is made * or the timeout is reached. diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c 2007-05-08 18:40:14.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c 2009-06-24 13:27:15.000000000 -0700 @@ -460,10 +460,15 @@ Java_org_mozilla_jss_ssl_SSLSocket_socke JSSL_SocketData *sock; PRNetAddr addr; jbyte *addrBAelems = NULL; + int addrBALen = 0; PRStatus status; int stat; const char *hostnameStr=NULL; + jmethodID supportsIPV6ID; + jclass socketBaseClass; + jboolean supportsIPV6 = 0; + if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS) { /* exception was thrown */ goto finish; @@ -472,16 +477,32 @@ Java_org_mozilla_jss_ssl_SSLSocket_socke /* * setup the PRNetAddr structure */ - addr.inet.family = AF_INET; - addr.inet.port = htons(port); - PR_ASSERT(sizeof(addr.inet.ip) == 4); - PR_ASSERT( (*env)->GetArrayLength(env, addrBA) == 4); + + socketBaseClass = (*env)->FindClass(env, SOCKET_BASE_NAME); + if( socketBaseClass == NULL ) { + ASSERT_OUTOFMEM(env); + goto finish; + } + supportsIPV6ID = (*env)->GetStaticMethodID(env, socketBaseClass, + SUPPORTS_IPV6_NAME, SUPPORTS_IPV6_SIG); + + if( supportsIPV6ID == NULL ) { + ASSERT_OUTOFMEM(env); + goto finish; + } + + supportsIPV6 = (*env)->CallStaticBooleanMethod(env, socketBaseClass, + supportsIPV6ID); + addrBAelems = (*env)->GetByteArrayElements(env, addrBA, NULL); + addrBALen = (*env)->GetArrayLength(env, addrBA); + + PR_ASSERT(addrBALen != 0); + if( addrBAelems == NULL ) { ASSERT_OUTOFMEM(env); goto finish; } - memcpy(&addr.inet.ip, addrBAelems, 4); /* * Tell SSL the URL we think we want to connect to. @@ -495,6 +516,38 @@ Java_org_mozilla_jss_ssl_SSLSocket_socke goto finish; } + if( addrBAelems == NULL ) { + ASSERT_OUTOFMEM(env); + goto finish; + } + + if(addrBALen != 4 && addrBALen != 16) { + JSSL_throwSSLSocketException(env, "Invalid address in connect!"); + goto finish; + } + + if( addrBALen == 4) { + addr.inet.family = AF_INET; + addr.inet.port = PR_htons(port); + memcpy(&addr.inet.ip, addrBAelems, 4); + + if(supportsIPV6) { + addr.ipv6.family = AF_INET6; + addr.ipv6.port = PR_htons(port); + PR_ConvertIPv4AddrToIPv6(addr.inet.ip,&addr.ipv6.ip); + } + + } else { /* Must be 16 and ipv6 */ + if(supportsIPV6) { + addr.ipv6.family = AF_INET6; + addr.ipv6.port = PR_htons(port); + memcpy(&addr.ipv6.ip,addrBAelems, 16); + } else { + JSSL_throwSSLSocketException(env, "Invalid address in connect!"); + goto finish; + } + } + /* * make the connect call */ diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.java jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.java --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.java 2007-05-08 18:40:14.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.java 2009-06-24 13:45:59.000000000 -0700 @@ -243,11 +243,16 @@ public class SSLSocket extends java.net. SSLClientCertificateSelectionCallback clientCertSelectionCallback) throws IOException { + + int socketFamily = SocketBase.SSL_AF_INET; + if(SocketBase.supportsIPV6()) { + socketFamily = SocketBase.SSL_AF_INET6; + } // create the socket sockProxy = new SocketProxy( base.socketCreate( - this, certApprovalCallback, clientCertSelectionCallback) ); + this, certApprovalCallback, clientCertSelectionCallback,socketFamily) ); base.setProxy(sockProxy); @@ -288,7 +293,7 @@ public class SSLSocket extends java.net. new SocketProxy( base.socketCreate( this, certApprovalCallback, clientCertSelectionCallback, - s, host ) ); + s, host,SocketBase.SSL_AF_INET ) ); base.setProxy(sockProxy); resetHandshake(); diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SocketBase.java jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SocketBase.java --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/SocketBase.java 2007-03-20 15:39:28.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SocketBase.java 2009-06-24 13:50:32.000000000 -0700 @@ -70,16 +70,16 @@ class SocketBase { native byte[] socketCreate(Object socketObject, SSLCertificateApprovalCallback certApprovalCallback, SSLClientCertificateSelectionCallback clientCertSelectionCallback, - java.net.Socket javaSock, String host) + java.net.Socket javaSock, String host,int family) throws SocketException; byte[] socketCreate(Object socketObject, SSLCertificateApprovalCallback certApprovalCallback, - SSLClientCertificateSelectionCallback clientCertSelectionCallback) + SSLClientCertificateSelectionCallback clientCertSelectionCallback,int family) throws SocketException { return socketCreate(socketObject, certApprovalCallback, - clientCertSelectionCallback, null, null); + clientCertSelectionCallback, null, null,family); } native void socketBind(byte[] addrBA, int port) throws SocketException; @@ -115,6 +115,10 @@ class SocketBase { static final int SSL_REQUIRE_FIRST_HANDSHAKE = 20; static final int SSL_REQUIRE_NO_ERROR = 21; + + static final int SSL_AF_INET = 50; + static final int SSL_AF_INET6 = 51; + void close() throws IOException { socketClose(); } @@ -281,13 +285,25 @@ class SocketBase { return in; } + private native byte[] getLocalAddressByteArrayNative() throws SocketException; + private native byte[] getPeerAddressByteArrayNative() throws SocketException; /** * @return the InetAddress of the peer end of the socket. */ InetAddress getInetAddress() { try { - return convertIntToInetAddress( getPeerAddressNative() ); + byte[] address = getPeerAddressByteArrayNative(); + + InetAddress iAddr = null; + + try { + + iAddr = InetAddress.getByAddress(address); + } catch(UnknownHostException e) { + } + + return iAddr; } catch(SocketException e) { return null; } @@ -299,7 +315,17 @@ class SocketBase { */ InetAddress getLocalAddress() { try { - return convertIntToInetAddress( getLocalAddressNative() ); + byte[] address = getLocalAddressByteArrayNative(); + + InetAddress lAddr = null; + + try { + + lAddr = InetAddress.getByAddress(address); + } catch(UnknownHostException e) { + } + + return lAddr; } catch(SocketException e) { return null; } @@ -378,4 +404,45 @@ class SocketBase { return topException; } } + + static private int supportsIPV6 = -1; + static boolean supportsIPV6() { + + if(supportsIPV6 >= 0) { + if(supportsIPV6 > 0) { + return true; + } else { + return false; + } + } + + Enumeration netInter; + try { + netInter = NetworkInterface.getNetworkInterfaces(); + } catch (SocketException e) { + + return false; + } + while ( netInter.hasMoreElements() ) + { + NetworkInterface ni = (NetworkInterface)netInter.nextElement(); + Enumeration addrs = ni.getInetAddresses(); + while ( addrs.hasMoreElements() ) + { + Object o = addrs.nextElement(); + if ( o.getClass() == InetAddress.class || + o.getClass() == Inet4Address.class || + o.getClass() == Inet6Address.class ) + { + InetAddress iaddr = (InetAddress) o; + if(o.getClass() == Inet6Address.class) { + supportsIPV6 = 1; + return true; + } + } + } + } + supportsIPV6 = 0; + return false; + } } diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/common.c jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/common.c 2007-04-24 11:34:58.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c 2009-06-24 14:22:02.000000000 -0700 @@ -33,7 +33,6 @@ * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ - #include #include #include @@ -51,6 +50,9 @@ #include #endif +#define SSL_AF_INET 50 +#define SSL_AF_INET6 51 + void JSSL_throwSSLSocketException(JNIEnv *env, char *message) { @@ -142,7 +144,7 @@ finish: JNIEXPORT jbyteArray JNICALL Java_org_mozilla_jss_ssl_SocketBase_socketCreate(JNIEnv *env, jobject self, jobject sockObj, jobject certApprovalCallback, - jobject clientCertSelectionCallback, jobject javaSock, jstring host) + jobject clientCertSelectionCallback, jobject javaSock, jstring host,jint family) { jbyteArray sdArray = NULL; JSSL_SocketData *sockdata = NULL; @@ -150,10 +152,21 @@ Java_org_mozilla_jss_ssl_SocketBase_sock PRFileDesc *newFD; PRFileDesc *tmpFD; PRFilePrivate *priv = NULL; + int socketFamily = 0; + + if (family != SSL_AF_INET6 && family != SSL_AF_INET) { + JSSL_throwSSLSocketException(env, + "socketCreate() Invalid family!"); + goto finish; + } + if( family == SSL_AF_INET) + socketFamily = PR_AF_INET; + else + socketFamily = PR_AF_INET6; if( javaSock == NULL ) { /* create a TCP socket */ - newFD = PR_NewTCPSocket(); + newFD = PR_OpenTCPSocket(socketFamily); if( newFD == NULL ) { JSSL_throwSSLSocketException(env, "PR_NewTCPSocket() returned NULL"); @@ -394,10 +407,10 @@ PRInt32 JSSL_enums[] = { SSL_REQUIRE_ALWAYS, /* 19 */ /* ssl.h */ SSL_REQUIRE_FIRST_HANDSHAKE,/* 20 */ /* ssl.h */ SSL_REQUIRE_NO_ERROR, /* 21 */ /* ssl.h */ - 0 }; + JNIEXPORT void JNICALL Java_org_mozilla_jss_ssl_SocketBase_socketBind (JNIEnv *env, jobject self, jbyteArray addrBA, jint port) @@ -405,8 +418,13 @@ Java_org_mozilla_jss_ssl_SocketBase_sock JSSL_SocketData *sock; PRNetAddr addr; jbyte *addrBAelems = NULL; + int addrBALen = 0; PRStatus status; + jmethodID supportsIPV6ID; + jclass socketBaseClass; + jboolean supportsIPV6 = 0; + if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS) { /* exception was thrown */ goto finish; @@ -415,19 +433,72 @@ Java_org_mozilla_jss_ssl_SocketBase_sock /* * setup the PRNetAddr structure */ - addr.inet.family = AF_INET; - addr.inet.port = htons(port); + + /* + * Do we support IPV6? + */ + + socketBaseClass = (*env)->FindClass(env, SOCKET_BASE_NAME); + if( socketBaseClass == NULL ) { + ASSERT_OUTOFMEM(env); + goto finish; + } + supportsIPV6ID = (*env)->GetStaticMethodID(env, socketBaseClass, + SUPPORTS_IPV6_NAME, SUPPORTS_IPV6_SIG); + + if( supportsIPV6ID == NULL ) { + ASSERT_OUTOFMEM(env); + goto finish; + } + + supportsIPV6 = (*env)->CallStaticBooleanMethod(env, socketBaseClass, + supportsIPV6ID); + + memset( &addr, 0, sizeof( PRNetAddr )); + if( addrBA != NULL ) { - PR_ASSERT(sizeof(addr.inet.ip) == 4); - PR_ASSERT( (*env)->GetArrayLength(env, addrBA) == 4); addrBAelems = (*env)->GetByteArrayElements(env, addrBA, NULL); + addrBALen = (*env)->GetArrayLength(env, addrBA); + if( addrBAelems == NULL ) { ASSERT_OUTOFMEM(env); goto finish; } - memcpy(&addr.inet.ip, addrBAelems, 4); + + if(addrBALen != 4 && addrBALen != 16) { + JSS_throwMsgPrErr(env, BIND_EXCEPTION, + "Invalid address in bind!"); + goto finish; + } + + if( addrBALen == 4) { + addr.inet.family = PR_AF_INET; + addr.inet.port = PR_htons(port); + memcpy(&addr.inet.ip, addrBAelems, 4); + + if(supportsIPV6) { + addr.inet.family = PR_AF_INET6; + addr.ipv6.port = PR_htons(port); + PR_ConvertIPv4AddrToIPv6(addr.inet.ip,&addr.ipv6.ip); + } + + } else { /* Must be 16 and ipv6 */ + if(supportsIPV6) { + addr.ipv6.family = PR_AF_INET6; + addr.ipv6.port = PR_htons(port); + memcpy(&addr.ipv6.ip,addrBAelems, 16); + } else { + JSS_throwMsgPrErr(env, BIND_EXCEPTION, + "Invalid address in bind!"); + goto finish; + } + } } else { - addr.inet.ip = PR_htonl(INADDR_ANY); + if(supportsIPV6) { + status = PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET6, port, &addr); + } else { + status = PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET, port, &addr); + } } /* do the bind() call */ @@ -601,6 +672,78 @@ finish: return status; } +JNIEXPORT jbyteArray JNICALL +Java_org_mozilla_jss_ssl_SocketBase_getPeerAddressByteArrayNative + (JNIEnv *env, jobject self) +{ + jbyteArray byteArray=NULL; + PRNetAddr addr; + jbyte *address=NULL; + int size=4; + + if( JSSL_getSockAddr(env, self, &addr, PEER_SOCK) != PR_SUCCESS) { + goto finish; + } + + if( PR_NetAddrFamily(&addr) == PR_AF_INET6) { + size = 16; + address = (jbyte *) &addr.ipv6.ip; + } else { + address = (jbyte *) &addr.inet.ip; + } + + byteArray = (*env)->NewByteArray(env,size); + if(byteArray == NULL) { + ASSERT_OUTOFMEM(env); + goto finish; + } + (*env)->SetByteArrayRegion(env, byteArray, 0,size ,address); + if( (*env)->ExceptionOccurred(env) != NULL) { + PR_ASSERT(PR_FALSE); + goto finish; + } + +finish: + return byteArray; +} + +JNIEXPORT jbyteArray JNICALL +Java_org_mozilla_jss_ssl_SocketBase_getLocalAddressByteArrayNative + (JNIEnv *env, jobject self) +{ + jbyteArray byteArray=NULL; + PRNetAddr addr; + jbyte *address=NULL; + int size=4; + + if( JSSL_getSockAddr(env, self, &addr, LOCAL_SOCK) != PR_SUCCESS) { + goto finish; + } + + if( PR_NetAddrFamily(&addr) == PR_AF_INET6) { + size = 16; + address = (jbyte *) &addr.ipv6.ip; + } else { + address = (jbyte *) &addr.inet.ip; + } + + byteArray = (*env)->NewByteArray(env,size); + if(byteArray == NULL) { + ASSERT_OUTOFMEM(env); + goto finish; + } + (*env)->SetByteArrayRegion(env, byteArray, 0,size,address); + if( (*env)->ExceptionOccurred(env) != NULL) { + PR_ASSERT(PR_FALSE); + goto finish; + } + +finish: + return byteArray; +} + +/* Leave the original versions of these functions for compatibility */ + JNIEXPORT jint JNICALL Java_org_mozilla_jss_ssl_SocketBase_getPeerAddressNative (JNIEnv *env, jobject self) diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c 2007-04-24 11:34:58.000000000 -0700 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c 2009-06-24 13:43:13.000000000 -0700 @@ -290,6 +290,7 @@ getInetAddress(PRFileDesc *fd, PRNetAddr jobject inetAddress; jbyteArray addrByteArray; jint port; + int addrBALen = 0; if( GET_ENV(fd->secret->javaVM, env) ) goto finish; @@ -377,8 +378,9 @@ getInetAddress(PRFileDesc *fd, PRNetAddr memset(addr, 0, sizeof(PRNetAddr)); - /* we only handle IPV4 */ - PR_ASSERT( (*env)->GetArrayLength(env, addrByteArray) == 4 ); + addrBALen = (*env)->GetArrayLength(env, addrByteArray); + + PR_ASSERT( (addrBALen == 4) || (addrBALen == 16 ) ); /* make sure you release them later */ addrBytes = (*env)->GetByteArrayElements(env, addrByteArray, NULL); @@ -388,9 +390,16 @@ getInetAddress(PRFileDesc *fd, PRNetAddr } /* ip field is in network byte order */ - memcpy( (void*) &addr->inet.ip, addrBytes, 4); - addr->inet.family = PR_AF_INET; - addr->inet.port = port; + + if (addrBALen == 4) { + memcpy( (void*) &addr->inet.ip, addrBytes, 4); + addr->inet.family = PR_AF_INET; + addr->inet.port = port; + } else { + memcpy( (void*) &addr->ipv6.ip,addrBytes, 16); + addr->inet.family = PR_AF_INET6; + addr->inet.port = port; + } (*env)->ReleaseByteArrayElements(env, addrByteArray, addrBytes, JNI_ABORT); diff -rupN jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/util/java_ids.h jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/java_ids.h --- jss-4.2.6.pre-IPv6/mozilla/security/jss/org/mozilla/jss/util/java_ids.h 2006-02-22 17:21:52.000000000 -0800 +++ jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/java_ids.h 2009-06-19 17:56:00.000000000 -0700 @@ -312,6 +312,8 @@ PR_BEGIN_EXTERN_C #define SOCKET_BASE_NAME "org/mozilla/jss/ssl/SocketBase" #define PROCESS_EXCEPTIONS_NAME "processExceptions" #define PROCESS_EXCEPTIONS_SIG "(Ljava/lang/Throwable;Ljava/lang/Throwable;)Ljava/lang/Throwable;" +#define SUPPORTS_IPV6_NAME "supportsIPV6" +#define SUPPORTS_IPV6_SIG "()Z" /* * SSLCertificateApprovalCallback