blob: 88803e10abc319da5e71700f27fd7793170dd5c5 [file] [log] [blame]
/*
* ====================================================================
*
* Copyright 2002-2004 The Apache Software Foundation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* ====================================================================
*
* This software consists of voluntary contributions made by many
* individuals on behalf of the Apache Software Foundation. For more
* information on the Apache Software Foundation, please see
* <http://www.apache.org/>.
*
*/
/*
* This file has been modified by Adobe (Adobe Systems Incorporated).
* Date: Oct 24, 2008 onwards.
* Reason(s): Fixed the following issues:
* BLZ-269 - Add support to proxy service for IBM X509
* checkstyle warnings
*/
package flex.messaging.services.http.httpclient;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import flex.messaging.util.Trace;
/**
* <p>
* EasyX509TrustManager unlike default {@link javax.net.ssl.X509TrustManager} accepts
* self-signed certificates.
* </p>
* <p>
* This trust manager SHOULD NOT be used for productive systems
* due to security reasons, unless it is a concious decision and
* you are perfectly aware of security implications of accepting
* self-signed certificates
* </p>
*
* <p>
* DISCLAIMER: HttpClient developers DO NOT actively support this component.
* The component is provided as a reference material, which may be inappropriate
* use without additional customization.
* </p>
*/
public class EasyX509TrustManager implements X509TrustManager {
private X509TrustManager standardTrustManager = null;
private boolean trustStore;
/**
* Constructor for EasyX509TrustManager.
*
* @param keystore the KeyStore to use
* @throws NoSuchAlgorithmException, KeyStoreException if the construction process failed
*/
public EasyX509TrustManager(KeyStore keystore) throws NoSuchAlgorithmException, KeyStoreException {
super();
TrustManagerFactory factory = null;
try {
factory = TrustManagerFactory.getInstance("SunX509");
} catch (NoSuchAlgorithmException nsae) {
// Fallback attempt - try for an IbmX509 factory in case we're running in WAS with no Sun providers registered.
try {
factory = TrustManagerFactory.getInstance("IbmX509");
} catch (NoSuchAlgorithmException nsae2) {
throw new NoSuchAlgorithmException("Neither SunX509 nor IbmX509 trust manager supported.");
}
}
factory.init(keystore);
TrustManager[] trustmanagers = factory.getTrustManagers();
if (trustmanagers.length == 0) {
factory.init(keystore);
trustmanagers = factory.getTrustManagers();
// If we still have no trust managers, throw.
if (trustmanagers.length == 0)
throw new NoSuchAlgorithmException("Neither SunX509 nor IbmX509 trust manager supported.");
}
this.standardTrustManager = (X509TrustManager) trustmanagers[0];
// very lax settings must be used if flex.trustStore is being used
trustStore = (System.getProperty("flex.trustStore") != null);
}
/*
* (non-Javadoc)
* @see javax.net.ssl.X509TrustManager#checkClientTrusted(X509Certificate[] x509Certificates, String authType)
*/
public void checkClientTrusted(X509Certificate[] certificates, String authType) throws CertificateException {
if (trustStore) {
return;
}
standardTrustManager.checkServerTrusted(certificates, authType);
}
/*
* (non-Javadoc)
* @see com.sun.net.ssl.X509TrustManager#isServerTrusted(X509Certificate[])
*/
public void checkServerTrusted(X509Certificate[] certificates, String authType) throws CertificateException {
if (trustStore) {
return;
}
if (certificates != null) {
if (Trace.ssl) {
Trace.trace("Server certificate chain:");
for (int i = 0; i < certificates.length; i++) {
Trace.trace("X509Certificate[" + i + "]=" + certificates[i]);
}
}
}
if ((certificates != null) && (certificates.length == 1)) {
X509Certificate certificate = certificates[0];
try {
certificate.checkValidity();
} catch (CertificateException e) {
if (Trace.ssl) {
Trace.trace(e.toString());
}
throw e;
}
} else {
standardTrustManager.checkServerTrusted(certificates, authType);
}
}
/*
* (non-Javadoc)
* @see com.sun.net.ssl.X509TrustManager#getAcceptedIssuers()
*/
public X509Certificate[] getAcceptedIssuers() {
return this.standardTrustManager.getAcceptedIssuers();
}
}