Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* Copyright 2008-2017 UnboundID Corp.
* All Rights Reserved.
*/
/*
* Copyright (C) 2008-2017 UnboundID Corp.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License (GPLv2 only)
* or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see .
*/
package com.unboundid.util.ssl;
import java.io.File;
import java.io.FileInputStream;
import java.io.Serializable;
import java.security.KeyStore;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.Date;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import com.unboundid.util.NotMutable;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import static com.unboundid.util.Debug.*;
import static com.unboundid.util.Validator.*;
import static com.unboundid.util.ssl.SSLMessages.*;
/**
* This class provides an SSL trust manager that will consult a specified trust
* store file to determine whether to trust a certificate that is presented to
* it. By default, it will use the default trust store format for the JVM
* (e.g., "JKS" for Sun-provided Java implementations), but alternate formats
* like PKCS12 may be used.
*/
@NotMutable()
@ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE)
public final class TrustStoreTrustManager
implements X509TrustManager, Serializable
{
/**
* The serial version UID for this serializable class.
*/
private static final long serialVersionUID = -4093869102727719415L;
// Indicates whether to automatically trust expired or not-yet-valid
// certificates.
private final boolean examineValidityDates;
// The PIN to use to access the trust store.
private final char[] trustStorePIN;
// The path to the trust store file.
private final String trustStoreFile;
// The format to use for the trust store file.
private final String trustStoreFormat;
/**
* Creates a new instance of this trust store trust manager that will trust
* all certificates in the specified file within the validity window. It will
* use the default trust store format and will not provide a PIN when
* attempting to read the trust store.
*
* @param trustStoreFile The path to the trust store file to use. It must
* not be {@code null}.
*/
public TrustStoreTrustManager(final File trustStoreFile)
{
this(trustStoreFile.getAbsolutePath(), null, null, true);
}
/**
* Creates a new instance of this trust store trust manager that will trust
* all certificates in the specified file within the validity window. It will
* use the default trust store format and will not provide a PIN when
* attempting to read the trust store.
*
* @param trustStoreFile The path to the trust store file to use. It must
* not be {@code null}.
*/
public TrustStoreTrustManager(final String trustStoreFile)
{
this(trustStoreFile, null, null, true);
}
/**
* Creates a new instance of this trust store trust manager that will trust
* all certificates in the specified file with the specified constraints.
*
* @param trustStoreFile The path to the trust store file to use. It
* must not be {@code null}.
* @param trustStorePIN The PIN to use to access the contents of the
* trust store. It may be {@code null} if no
* PIN is required.
* @param trustStoreFormat The format to use for the trust store. It
* may be {@code null} if the default format
* should be used.
* @param examineValidityDates Indicates whether to reject certificates if
* the current time is outside the validity
* window for the certificate.
*/
public TrustStoreTrustManager(final File trustStoreFile,
final char[] trustStorePIN,
final String trustStoreFormat,
final boolean examineValidityDates)
{
this(trustStoreFile.getAbsolutePath(), trustStorePIN, trustStoreFormat,
examineValidityDates);
}
/**
* Creates a new instance of this trust store trust manager that will trust
* all certificates in the specified file with the specified constraints.
*
* @param trustStoreFile The path to the trust store file to use. It
* must not be {@code null}.
* @param trustStorePIN The PIN to use to access the contents of the
* trust store. It may be {@code null} if no
* PIN is required.
* @param trustStoreFormat The format to use for the trust store. It
* may be {@code null} if the default format
* should be used.
* @param examineValidityDates Indicates whether to reject certificates if
* the current time is outside the validity
* window for the certificate.
*/
public TrustStoreTrustManager(final String trustStoreFile,
final char[] trustStorePIN,
final String trustStoreFormat,
final boolean examineValidityDates)
{
ensureNotNull(trustStoreFile);
this.trustStoreFile = trustStoreFile;
this.trustStorePIN = trustStorePIN;
this.examineValidityDates = examineValidityDates;
if (trustStoreFormat == null)
{
this.trustStoreFormat = KeyStore.getDefaultType();
}
else
{
this.trustStoreFormat = trustStoreFormat;
}
}
/**
* Retrieves the path to the trust store file to use.
*
* @return The path to the trust store file to use.
*/
public String getTrustStoreFile()
{
return trustStoreFile;
}
/**
* Retrieves the name of the trust store file format.
*
* @return The name of the trust store file format.
*/
public String getTrustStoreFormat()
{
return trustStoreFormat;
}
/**
* Indicate whether to reject certificates if the current time is outside the
* validity window for the certificate.
*
* @return {@code true} if the certificate validity time should be examined
* and certificates should be rejected if they are expired or not
* yet valid, or {@code false} if certificates should be accepted
* even outside of the validity window.
*/
public boolean examineValidityDates()
{
return examineValidityDates;
}
/**
* Retrieves a set of trust managers that may be used to determine whether the
* provided certificate chain should be trusted. It will also check the
* validity of the provided certificates.
*
* @param chain The certificate chain for which to make the determination.
*
* @return The set of trust managers that may be used to make the
* determination.
*
* @throws CertificateException If the provided client certificate chain
* should not be trusted.
*/
private synchronized X509TrustManager[] getTrustManagers(
final X509Certificate[] chain)
throws CertificateException
{
if (examineValidityDates)
{
final Date d = new Date();
for (final X509Certificate c : chain)
{
c.checkValidity(d);
}
}
final File f = new File(trustStoreFile);
if (! f.exists())
{
throw new CertificateException(
ERR_TRUSTSTORE_NO_SUCH_FILE.get(trustStoreFile));
}
final KeyStore ks;
try
{
ks = KeyStore.getInstance(trustStoreFormat);
}
catch (Exception e)
{
debugException(e);
throw new CertificateException(
ERR_TRUSTSTORE_UNSUPPORTED_FORMAT.get(trustStoreFormat), e);
}
FileInputStream inputStream = null;
try
{
inputStream = new FileInputStream(f);
ks.load(inputStream, trustStorePIN);
}
catch (Exception e)
{
debugException(e);
throw new CertificateException(
ERR_TRUSTSTORE_CANNOT_LOAD.get(trustStoreFile, trustStoreFormat,
String.valueOf(e)),
e);
}
finally
{
if (inputStream != null)
{
try
{
inputStream.close();
}
catch (Exception e)
{
debugException(e);
}
}
}
try
{
final TrustManagerFactory factory = TrustManagerFactory.getInstance(
TrustManagerFactory.getDefaultAlgorithm());
factory.init(ks);
final TrustManager[] trustManagers = factory.getTrustManagers();
final X509TrustManager[] x509TrustManagers =
new X509TrustManager[trustManagers.length];
for (int i=0; i < trustManagers.length; i++)
{
x509TrustManagers[i] = (X509TrustManager) trustManagers[i];
}
return x509TrustManagers;
}
catch (Exception e)
{
debugException(e);
throw new CertificateException(
ERR_TRUSTSTORE_CANNOT_GET_TRUST_MANAGERS.get(trustStoreFile,
trustStoreFormat, String.valueOf(e)),
e);
}
}
/**
* Checks to determine whether the provided client certificate chain should be
* trusted.
*
* @param chain The client certificate chain for which to make the
* determination.
* @param authType The authentication type based on the client certificate.
*
* @throws CertificateException If the provided client certificate chain
* should not be trusted.
*/
public synchronized void checkClientTrusted(final X509Certificate[] chain,
final String authType)
throws CertificateException
{
for (final X509TrustManager m : getTrustManagers(chain))
{
m.checkClientTrusted(chain, authType);
}
}
/**
* Checks to determine whether the provided server certificate chain should be
* trusted.
*
* @param chain The server certificate chain for which to make the
* determination.
* @param authType The key exchange algorithm used.
*
* @throws CertificateException If the provided server certificate chain
* should not be trusted.
*/
public synchronized void checkServerTrusted(final X509Certificate[] chain,
final String authType)
throws CertificateException
{
for (final X509TrustManager m : getTrustManagers(chain))
{
m.checkServerTrusted(chain, authType);
}
}
/**
* Retrieves the accepted issuer certificates for this trust manager. This
* will always return an empty array.
*
* @return The accepted issuer certificates for this trust manager.
*/
public synchronized X509Certificate[] getAcceptedIssuers()
{
return new X509Certificate[0];
}
}