gov.nist.javax.sip.stack.NioTlsMessageProcessor Maven / Gradle / Ivy
The newest version!
/*
* Conditions Of Use
*
* This software was developed by employees of the National Institute of
* Standards and Technology (NIST), an agency of the Federal Government.
* Pursuant to title 15 Untied States Code Section 105, works of NIST
* employees are not subject to copyright protection in the United States
* and are considered to be in the public domain. As a result, a formal
* license is not needed to use the software.
*
* This software is provided by NIST as a service and is expressly
* provided "AS IS." NIST MAKES NO WARRANTY OF ANY KIND, EXPRESS, IMPLIED
* OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTY OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT
* AND DATA ACCURACY. NIST does not warrant or make any representations
* regarding the use of the software or the results thereof, including but
* not limited to the correctness, accuracy, reliability or usefulness of
* the software.
*
* Permission to use this software is contingent upon your acceptance
* of the terms of this agreement
*
* .
*
*/
package android.gov.nist.javax.sip.stack;
import android.gov.nist.core.CommonLogger;
import android.gov.nist.core.LogWriter;
import android.gov.nist.core.StackLogger;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509TrustManager;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.net.InetAddress;
import java.nio.channels.SocketChannel;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
public class NioTlsMessageProcessor extends NioTcpMessageProcessor{
private static StackLogger logger = CommonLogger.getLogger(NioTlsMessageProcessor.class);
// Create a trust manager that does not validate certificate chains
TrustManager[] trustAllCerts = new TrustManager[] {
new X509TrustManager() {
public java.security.cert.X509Certificate[] getAcceptedIssuers() {
return new X509Certificate[0];
}
public void checkClientTrusted(X509Certificate[] certs, String authType) {
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug(
"checkClientTrusted : Not validating certs " + certs + " authType " + authType);
}
}
public void checkServerTrusted(X509Certificate[] certs, String authType) {
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug(
"checkServerTrusted : Not validating certs " + certs + " authType " + authType);
}
}
}};
SSLContext sslServerCtx;
SSLContext sslClientCtx;
public NioTlsMessageProcessor(InetAddress ipAddress,
SIPTransactionStack sipStack, int port) {
super(ipAddress, sipStack, port);
transport = "TLS";
try {
init();
} catch (Exception e) {
throw new RuntimeException(e);
}
}
@Override
public NioTcpMessageChannel createMessageChannel(NioTcpMessageProcessor nioTcpMessageProcessor, SocketChannel socketChannel) throws IOException {
NioTcpMessageChannel retval = nioHandler.getMessageChannel(socketChannel);
if (retval == null) {
retval = new NioTlsMessageChannel(nioTcpMessageProcessor,
socketChannel);
nioHandler.putMessageChannel(socketChannel, retval);
}
return retval;
}
@Override
ConnectionOrientedMessageChannel constructMessageChannel(InetAddress targetHost, int port) throws IOException {
return new NioTlsMessageChannel(targetHost,
port, sipStack, this);
}
public void init() throws Exception, CertificateException, FileNotFoundException, IOException {
if(sipStack.securityManagerProvider.getKeyManagers(false) == null ||
sipStack.securityManagerProvider.getTrustManagers(false) == null ||
sipStack.securityManagerProvider.getTrustManagers(true) == null) {
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug("TLS initialization failed due to NULL security config");
}
return; // The settings
}
sslServerCtx = SSLContext.getInstance("TLS");
sslClientCtx = SSLContext.getInstance("TLS");
if(sipStack.getClientAuth() == ClientAuthType.DisabledAll) {
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug(
"ClientAuth " + sipStack.getClientAuth() + " bypassing all cert validations");
}
sslServerCtx.init(sipStack.securityManagerProvider.getKeyManagers(false), trustAllCerts, null);
sslClientCtx.init(sipStack.securityManagerProvider.getKeyManagers(true), trustAllCerts, null);
} else {
if (logger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
logger.logDebug(
"ClientAuth " + sipStack.getClientAuth());
}
sslServerCtx.init(sipStack.securityManagerProvider.getKeyManagers(false),
sipStack.securityManagerProvider.getTrustManagers(false),
null);
sslClientCtx.init(sipStack.securityManagerProvider.getKeyManagers(true),
sipStack.securityManagerProvider.getTrustManagers(true),
null);
}
}
}