All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.glassfish.jersey.SslConfigurator Maven / Gradle / Ivy

Go to download

Ehcache is an open source, standards-based cache used to boost performance, offload the database and simplify scalability. Ehcache is robust, proven and full-featured and this has made it the most widely-used Java-based cache.

There is a newer version: 2.10.9.2
Show newest version
/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 *
 * Copyright (c) 2007-2013 Oracle and/or its affiliates. All rights reserved.
 *
 * The contents of this file are subject to the terms of either the GNU
 * General Public License Version 2 only ("GPL") or the Common Development
 * and Distribution License("CDDL") (collectively, the "License").  You
 * may not use this file except in compliance with the License.  You can
 * obtain a copy of the License at
 * http://glassfish.java.net/public/CDDL+GPL_1_1.html
 * or packager/legal/LICENSE.txt.  See the License for the specific
 * language governing permissions and limitations under the License.
 *
 * When distributing the software, include this License Header Notice in each
 * file and include the License file at packager/legal/LICENSE.txt.
 *
 * GPL Classpath Exception:
 * Oracle designates this particular file as subject to the "Classpath"
 * exception as provided by Oracle in the GPL Version 2 section of the License
 * file that accompanied this code.
 *
 * Modifications:
 * If applicable, add the following below the License Header, with the fields
 * enclosed by brackets [] replaced by your own identifying information:
 * "Portions Copyright [year] [name of copyright owner]"
 *
 * Contributor(s):
 * If you wish your version of this file to be governed by only the CDDL or
 * only the GPL Version 2, indicate your decision by adding "[Contributor]
 * elects to include this software in this distribution under the [CDDL or GPL
 * Version 2] license."  If you don't indicate a single choice of license, a
 * recipient has the option to distribute your version of this file under
 * either the CDDL, the GPL Version 2 or to extend the choice of license to
 * its licensees as provided above.  However, if you add GPL Version 2 code
 * and therefore, elected the GPL Version 2 license, then the option applies
 * only if the new code is made subject to such option by the copyright
 * holder.
 */
package org.glassfish.jersey;

import java.io.ByteArrayInputStream;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.io.InputStream;
import java.security.AccessController;
import java.security.KeyManagementException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.UnrecoverableKeyException;
import java.security.cert.CertificateException;
import java.util.Arrays;
import java.util.Properties;
import java.util.logging.Logger;

import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManagerFactory;

import org.glassfish.jersey.internal.LocalizationMessages;
import org.glassfish.jersey.internal.util.PropertiesHelper;

/**
 * Utility class, which helps to configure {@link SSLContext} instances.
 *
 * For example:
 * 
 * SslConfigurator sslConfig = SslConfigurator.newInstance()
 *    .trustStoreFile("truststore.jks")
 *    .trustStorePassword("asdfgh")
 *    .trustStoreType("JKS")
 *    .trustManagerFactoryAlgorithm("PKIX")
 *
 *    .keyStoreFile("keystore.jks")
 *    .keyPassword("asdfgh")
 *    .keyStoreType("JKS")
 *    .keyManagerFactoryAlgorithm("SunX509")
 *    .keyStoreProvider("SunJSSE")
 *
 *    .securityProtocol("SSL");
 *
 * SSLContext sslContext = sslConfig.createSSLContext();
 * 
* * @author Alexey Stashok * @author Hubert Iwaniuk * @author Bruno Harbulot * @author Marek Potociar (marek.potociar at oracle.com) */ @SuppressWarnings("UnusedDeclaration") public final class SslConfigurator { /** * Trust store provider name. * * The value MUST be a {@code String} representing the name of a trust store provider. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_STORE_PROVIDER = "javax.net.ssl.trustStoreProvider"; /** * Key store provider name. * * The value MUST be a {@code String} representing the name of a trust store provider. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_STORE_PROVIDER = "javax.net.ssl.keyStoreProvider"; /** * Trust store file name. * * The value MUST be a {@code String} representing the name of a trust store file. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_STORE_FILE = "javax.net.ssl.trustStore"; /** * Key store file name. * * The value MUST be a {@code String} representing the name of a key store file. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_STORE_FILE = "javax.net.ssl.keyStore"; /** * Trust store file password - the password used to unlock the trust store file. * * The value MUST be a {@code String} representing the trust store file password. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_STORE_PASSWORD = "javax.net.ssl.trustStorePassword"; /** * Key store file password - the password used to unlock the trust store file. * * The value MUST be a {@code String} representing the key store file password. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_STORE_PASSWORD = "javax.net.ssl.keyStorePassword"; /** * Trust store type (see {@link java.security.KeyStore#getType()} for more info). * * The value MUST be a {@code String} representing the trust store type name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_STORE_TYPE = "javax.net.ssl.trustStoreType"; /** * Key store type (see {@link java.security.KeyStore#getType()} for more info). * * The value MUST be a {@code String} representing the key store type name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_STORE_TYPE = "javax.net.ssl.keyStoreType"; /** * Key manager factory algorithm name. * * The value MUST be a {@code String} representing the key manager factory algorithm name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_MANAGER_FACTORY_ALGORITHM = "ssl.keyManagerFactory.algorithm"; /** * Key manager factory provider name. * * The value MUST be a {@code String} representing the key manager factory provider name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String KEY_MANAGER_FACTORY_PROVIDER = "ssl.keyManagerFactory.provider"; /** * Trust manager factory algorithm name. * * The value MUST be a {@code String} representing the trust manager factory algorithm name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_MANAGER_FACTORY_ALGORITHM = "ssl.trustManagerFactory.algorithm"; /** * Trust manager factory provider name. * * The value MUST be a {@code String} representing the trust manager factory provider name. *

* No default value is set. *

*

* The name of the configuration property is {@value}. *

*/ public static final String TRUST_MANAGER_FACTORY_PROVIDER = "ssl.trustManagerFactory.provider"; /** * Default SSL configuration that is used to create default SSL context instances that do not take into * account system properties. */ private static final SslConfigurator DEFAULT_CONFIG_NO_PROPS = new SslConfigurator(false); /** * Logger. */ private static final Logger LOGGER = Logger.getLogger(SslConfigurator.class.getName()); private KeyStore keyStore; private KeyStore trustStore; private String trustStoreProvider; private String keyStoreProvider; private String trustStoreType; private String keyStoreType; private char[] trustStorePass; private char[] keyStorePass; private char[] keyPass; private String trustStoreFile; private String keyStoreFile; private byte[] trustStoreBytes; private byte[] keyStoreBytes; private String trustManagerFactoryAlgorithm; private String keyManagerFactoryAlgorithm; private String trustManagerFactoryProvider; private String keyManagerFactoryProvider; private String securityProtocol = "TLS"; /** * Get a new instance of a {@link SSLContext} configured using default configuration settings. * * The default SSL configuration is initialized from system properties. This method is a shortcut * for {@link #getDefaultContext(boolean) getDefaultContext(true)}. * * @return new instance of a default SSL context initialized from system properties. */ public static SSLContext getDefaultContext() { return getDefaultContext(true); } /** * Get a new instance of a {@link SSLContext} configured using default configuration settings. * * If {@code readSystemProperties} parameter is set to {@code true}, the default SSL configuration * is initialized from system properties. * * @param readSystemProperties if {@code true}, the default SSL context will be initialized using * system properties. * @return new instance of a default SSL context initialized from system properties. */ public static SSLContext getDefaultContext(boolean readSystemProperties) { if (readSystemProperties) { return new SslConfigurator(true).createSSLContext(); } else { return DEFAULT_CONFIG_NO_PROPS.createSSLContext(); } } /** * Get a new & initialized SSL configurator instance. * * The instance {@link #retrieve(java.util.Properties) retrieves} the initial configuration from * {@link System#getProperties() system properties}. * * @return new & initialized SSL configurator instance. */ public static SslConfigurator newInstance() { return new SslConfigurator(false); } /** * Get a new SSL configurator instance. * * @param readSystemProperties if {@code true}, {@link #retrieve(java.util.Properties) Retrieves} * the initial configuration from {@link System#getProperties()}, * otherwise the instantiated configurator will be empty. * @return new SSL configurator instance. */ public static SslConfigurator newInstance(boolean readSystemProperties) { return new SslConfigurator(readSystemProperties); } private SslConfigurator(boolean readSystemProperties) { if (readSystemProperties) { retrieve(AccessController.doPrivileged(PropertiesHelper.getSystemProperties())); } } private SslConfigurator(SslConfigurator that) { this.keyStore = that.keyStore; this.trustStore = that.trustStore; this.trustStoreProvider = that.trustStoreProvider; this.keyStoreProvider = that.keyStoreProvider; this.trustStoreType = that.trustStoreType; this.keyStoreType = that.keyStoreType; this.trustStorePass = that.trustStorePass; this.keyStorePass = that.keyStorePass; this.keyPass = that.keyPass; this.trustStoreFile = that.trustStoreFile; this.keyStoreFile = that.keyStoreFile; this.trustStoreBytes = that.trustStoreBytes; this.keyStoreBytes = that.keyStoreBytes; this.trustManagerFactoryAlgorithm = that.trustManagerFactoryAlgorithm; this.keyManagerFactoryAlgorithm = that.keyManagerFactoryAlgorithm; this.trustManagerFactoryProvider = that.trustManagerFactoryProvider; this.keyManagerFactoryProvider = that.keyManagerFactoryProvider; this.securityProtocol = that.securityProtocol; } /** * Create a copy of the current SSL configurator instance. * * @return copy of the current SSL configurator instance */ public SslConfigurator copy() { return new SslConfigurator(this); } /** * Set the trust store provider name. * * @param trustStoreProvider trust store provider to set. * @return updated SSL configurator instance. */ public SslConfigurator trustStoreProvider(String trustStoreProvider) { this.trustStoreProvider = trustStoreProvider; return this; } /** * Set the key store provider name. * * @param keyStoreProvider key store provider to set. * @return updated SSL configurator instance. */ public SslConfigurator keyStoreProvider(String keyStoreProvider) { this.keyStoreProvider = keyStoreProvider; return this; } /** * Set the type of trust store. * * @param trustStoreType type of trust store to set. * @return updated SSL configurator instance. */ public SslConfigurator trustStoreType(String trustStoreType) { this.trustStoreType = trustStoreType; return this; } /** * Set the type of key store. * * @param keyStoreType type of key store to set. * @return updated SSL configurator instance. */ public SslConfigurator keyStoreType(String keyStoreType) { this.keyStoreType = keyStoreType; return this; } /** * Set the password of trust store. * * @param password password of trust store to set. * @return updated SSL configurator instance. */ public SslConfigurator trustStorePassword(String password) { this.trustStorePass = password.toCharArray(); return this; } /** * Set the password of key store. * * @param password password of key store to set. * @return updated SSL configurator instance. */ public SslConfigurator keyStorePassword(String password) { this.keyStorePass = password.toCharArray(); return this; } /** * Set the password of key store. * * @param password password of key store to set. * @return updated SSL configurator instance. */ public SslConfigurator keyStorePassword(char[] password) { this.keyStorePass = password.clone(); return this; } /** * Set the password of the key in the key store. * * @param password password of key to set. * @return updated SSL configurator instance. */ public SslConfigurator keyPassword(String password) { this.keyPass = password.toCharArray(); return this; } /** * Set the password of the key in the key store. * * @param password password of key to set. * @return updated SSL configurator instance. */ public SslConfigurator keyPassword(char[] password) { this.keyPass = password.clone(); return this; } /** * Set the trust store file name. *

* Setting a trust store instance resets any {@link #trustStore(java.security.KeyStore) trust store instance} * or {@link #trustStoreBytes(byte[]) trust store payload} value previously set. *

* * @param fileName {@link java.io.File file} name of the trust store. * @return updated SSL configurator instance. */ public SslConfigurator trustStoreFile(String fileName) { this.trustStoreFile = fileName; this.trustStoreBytes = null; this.trustStore = null; return this; } /** * Set the trust store payload as byte array. *

* Setting a trust store instance resets any {@link #trustStoreFile(String) trust store file} * or {@link #trustStore(java.security.KeyStore) trust store instance} value previously set. *

* * @param payload trust store payload. * @return updated SSL configurator instance. */ public SslConfigurator trustStoreBytes(byte[] payload) { this.trustStoreBytes = payload.clone(); this.trustStoreFile = null; this.trustStore = null; return this; } /** * Set the key store file name. *

* Setting a key store instance resets any {@link #keyStore(java.security.KeyStore) key store instance} * or {@link #keyStoreBytes(byte[]) key store payload} value previously set. *

* * @param fileName {@link java.io.File file} name of the key store. * @return updated SSL configurator instance. */ public SslConfigurator keyStoreFile(String fileName) { this.keyStoreFile = fileName; this.keyStoreBytes = null; this.keyStore = null; return this; } /** * Set the key store payload as byte array. *

* Setting a key store instance resets any {@link #keyStoreFile(String) key store file} * or {@link #keyStore(java.security.KeyStore) key store instance} value previously set. *

* * @param payload key store payload. * @return updated SSL configurator instance. */ public SslConfigurator keyStoreBytes(byte[] payload) { this.keyStoreBytes = payload.clone(); this.keyStoreFile = null; this.keyStore = null; return this; } /** * Set the trust manager factory algorithm. * * @param algorithm the trust manager factory algorithm. * @return updated SSL configurator instance. */ public SslConfigurator trustManagerFactoryAlgorithm(String algorithm) { this.trustManagerFactoryAlgorithm = algorithm; return this; } /** * Set the key manager factory algorithm. * * @param algorithm the key manager factory algorithm. * @return updated SSL configurator instance. */ public SslConfigurator keyManagerFactoryAlgorithm(String algorithm) { this.keyManagerFactoryAlgorithm = algorithm; return this; } /** * Set the trust manager factory provider. * * @param provider the trust manager factory provider. * @return updated SSL configurator instance. */ public SslConfigurator trustManagerFactoryProvider(String provider) { this.trustManagerFactoryAlgorithm = provider; return this; } /** * Set the key manager factory provider. * * @param provider the key manager factory provider. * @return updated SSL configurator instance. */ public SslConfigurator keyManagerFactoryProvider(String provider) { this.keyManagerFactoryAlgorithm = provider; return this; } /** * Set the SSLContext protocol. The default value is {@code TLS} if this is {@code null}. * * @param protocol protocol for {@link javax.net.ssl.SSLContext#getProtocol()}. * @return updated SSL configurator instance. */ public SslConfigurator securityProtocol(String protocol) { this.securityProtocol = protocol; return this; } /** * Get the key store instance. * * @return key store instance or {@code null} if not explicitly set. */ KeyStore getKeyStore() { return keyStore; } /** * Set the key store instance. *

* Setting a key store instance resets any {@link #keyStoreFile(String) key store file} * or {@link #keyStoreBytes(byte[]) key store payload} value previously set. *

* * @param keyStore key store instance. * @return updated SSL configurator instance. */ public SslConfigurator keyStore(KeyStore keyStore) { this.keyStore = keyStore; this.keyStoreFile = null; this.keyStoreBytes = null; return this; } /** * Get the trust store instance. *

* Setting a trust store instance resets any {@link #trustStoreFile(String) trust store file} * or {@link #trustStoreBytes(byte[]) trust store payload} value previously set. *

* * @return trust store instance or {@code null} if not explicitly set. */ KeyStore getTrustStore() { return trustStore; } /** * Set the trust store instance. * * @param trustStore trust store instance. * @return updated SSL configurator instance. */ public SslConfigurator trustStore(KeyStore trustStore) { this.trustStore = trustStore; this.trustStoreFile = null; this.trustStoreBytes = null; return this; } /** * Create new SSL context instance using the current SSL context configuration. * * @return newly configured SSL context instance. */ public SSLContext createSSLContext() { TrustManagerFactory trustManagerFactory = null; KeyManagerFactory keyManagerFactory = null; KeyStore _keyStore = keyStore; if (_keyStore == null && (keyStoreBytes != null || keyStoreFile != null)) { try { if (keyStoreProvider != null) { _keyStore = KeyStore.getInstance( keyStoreType != null ? keyStoreType : KeyStore.getDefaultType(), keyStoreProvider); } else { _keyStore = KeyStore.getInstance(keyStoreType != null ? keyStoreType : KeyStore.getDefaultType()); } InputStream keyStoreInputStream = null; try { if (keyStoreBytes != null) { keyStoreInputStream = new ByteArrayInputStream(keyStoreBytes); } else if (!keyStoreFile.equals("NONE")) { keyStoreInputStream = new FileInputStream(keyStoreFile); } _keyStore.load(keyStoreInputStream, keyStorePass); } finally { try { if (keyStoreInputStream != null) { keyStoreInputStream.close(); } } catch (IOException ignored) { } } } catch (KeyStoreException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_IMPL_NOT_FOUND(), e); } catch (CertificateException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_CERT_LOAD_ERROR(), e); } catch (FileNotFoundException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_FILE_NOT_FOUND(keyStoreFile), e); } catch (IOException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_LOAD_ERROR(keyStoreFile), e); } catch (NoSuchProviderException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_PROVIDERS_NOT_REGISTERED(), e); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException(LocalizationMessages.SSL_KS_INTEGRITY_ALGORITHM_NOT_FOUND(), e); } } if (_keyStore != null) { String kmfAlgorithm = keyManagerFactoryAlgorithm; if (kmfAlgorithm == null) { kmfAlgorithm = AccessController.doPrivileged(PropertiesHelper.getSystemProperty( KEY_MANAGER_FACTORY_ALGORITHM, KeyManagerFactory.getDefaultAlgorithm())); } try { if (keyManagerFactoryProvider != null) { keyManagerFactory = KeyManagerFactory.getInstance(kmfAlgorithm, keyManagerFactoryProvider); } else { keyManagerFactory = KeyManagerFactory.getInstance(kmfAlgorithm); } final char[] password = keyPass != null ? keyPass : keyStorePass; if (password != null) { keyManagerFactory.init(_keyStore, password); } else { String ksName = keyStoreProvider != null ? LocalizationMessages.SSL_KMF_NO_PASSWORD_FOR_PROVIDER_BASED_KS() : keyStoreBytes != null ? LocalizationMessages.SSL_KMF_NO_PASSWORD_FOR_BYTE_BASED_KS() : keyStoreFile; LOGGER.config(LocalizationMessages.SSL_KMF_NO_PASSWORD_SET(ksName)); keyManagerFactory = null; } } catch (KeyStoreException e) { throw new IllegalStateException(LocalizationMessages.SSL_KMF_INIT_FAILED(), e); } catch (UnrecoverableKeyException e) { throw new IllegalStateException(LocalizationMessages.SSL_KMF_UNRECOVERABLE_KEY(), e); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException(LocalizationMessages.SSL_KMF_ALGORITHM_NOT_SUPPORTED(), e); } catch (NoSuchProviderException e) { throw new IllegalStateException(LocalizationMessages.SSL_KMF_PROVIDER_NOT_REGISTERED(), e); } } KeyStore _trustStore = trustStore; if (_trustStore == null && (trustStoreBytes != null || trustStoreFile != null)) { try { if (trustStoreProvider != null) { _trustStore = KeyStore.getInstance( trustStoreType != null ? trustStoreType : KeyStore.getDefaultType(), trustStoreProvider); } else { _trustStore = KeyStore.getInstance(trustStoreType != null ? trustStoreType : KeyStore.getDefaultType()); } InputStream trustStoreInputStream = null; try { if (trustStoreBytes != null) { trustStoreInputStream = new ByteArrayInputStream(trustStoreBytes); } else if (!trustStoreFile.equals("NONE")) { trustStoreInputStream = new FileInputStream(trustStoreFile); } _trustStore.load(trustStoreInputStream, trustStorePass); } finally { try { if (trustStoreInputStream != null) { trustStoreInputStream.close(); } } catch (IOException ignored) { } } } catch (KeyStoreException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_IMPL_NOT_FOUND(), e); } catch (CertificateException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_CERT_LOAD_ERROR(), e); } catch (FileNotFoundException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_FILE_NOT_FOUND(trustStoreFile), e); } catch (IOException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_LOAD_ERROR(trustStoreFile), e); } catch (NoSuchProviderException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_PROVIDERS_NOT_REGISTERED(), e); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException(LocalizationMessages.SSL_TS_INTEGRITY_ALGORITHM_NOT_FOUND(), e); } } if (_trustStore != null) { String tmfAlgorithm = trustManagerFactoryAlgorithm; if (tmfAlgorithm == null) { tmfAlgorithm = AccessController.doPrivileged(PropertiesHelper.getSystemProperty( TRUST_MANAGER_FACTORY_ALGORITHM, TrustManagerFactory.getDefaultAlgorithm())); } try { if (trustManagerFactoryProvider != null) { trustManagerFactory = TrustManagerFactory.getInstance(tmfAlgorithm, trustManagerFactoryProvider); } else { trustManagerFactory = TrustManagerFactory.getInstance(tmfAlgorithm); } trustManagerFactory.init(_trustStore); } catch (KeyStoreException e) { throw new IllegalStateException(LocalizationMessages.SSL_TMF_INIT_FAILED(), e); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException(LocalizationMessages.SSL_TMF_ALGORITHM_NOT_SUPPORTED(), e); } catch (NoSuchProviderException e) { throw new IllegalStateException(LocalizationMessages.SSL_TMF_PROVIDER_NOT_REGISTERED(), e); } } try { String secProtocol = "TLS"; if (securityProtocol != null) { secProtocol = securityProtocol; } final SSLContext sslContext = SSLContext.getInstance(secProtocol); sslContext.init( keyManagerFactory != null ? keyManagerFactory.getKeyManagers() : null, trustManagerFactory != null ? trustManagerFactory.getTrustManagers() : null, null); return sslContext; } catch (KeyManagementException e) { throw new IllegalStateException(LocalizationMessages.SSL_CTX_INIT_FAILED(), e); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException(LocalizationMessages.SSL_CTX_ALGORITHM_NOT_SUPPORTED(), e); } } /** * Retrieve the SSL context configuration from the supplied properties. * * @param props properties containing the SSL context configuration. * @return updated SSL configurator instance. */ public SslConfigurator retrieve(Properties props) { trustStoreProvider = props.getProperty(TRUST_STORE_PROVIDER); keyStoreProvider = props.getProperty(KEY_STORE_PROVIDER); trustManagerFactoryProvider = props.getProperty(TRUST_MANAGER_FACTORY_PROVIDER); keyManagerFactoryProvider = props.getProperty(KEY_MANAGER_FACTORY_PROVIDER); trustStoreType = props.getProperty(TRUST_STORE_TYPE); keyStoreType = props.getProperty(KEY_STORE_TYPE); if (props.getProperty(TRUST_STORE_PASSWORD) != null) { trustStorePass = props.getProperty(TRUST_STORE_PASSWORD).toCharArray(); } else { trustStorePass = null; } if (props.getProperty(KEY_STORE_PASSWORD) != null) { keyStorePass = props.getProperty(KEY_STORE_PASSWORD).toCharArray(); } else { keyStorePass = null; } trustStoreFile = props.getProperty(TRUST_STORE_FILE); keyStoreFile = props.getProperty(KEY_STORE_FILE); trustStoreBytes = null; keyStoreBytes = null; trustStore = null; keyStore = null; securityProtocol = "TLS"; return this; } @Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; SslConfigurator that = (SslConfigurator) o; if (keyManagerFactoryAlgorithm != null ? !keyManagerFactoryAlgorithm.equals(that.keyManagerFactoryAlgorithm) : that.keyManagerFactoryAlgorithm != null) { return false; } if (keyManagerFactoryProvider != null ? !keyManagerFactoryProvider.equals(that.keyManagerFactoryProvider) : that.keyManagerFactoryProvider != null) { return false; } if (!Arrays.equals(keyPass, that.keyPass)) { return false; } if (keyStore != null ? !keyStore.equals(that.keyStore) : that.keyStore != null) { return false; } if (!Arrays.equals(keyStoreBytes, that.keyStoreBytes)) { return false; } if (keyStoreFile != null ? !keyStoreFile.equals(that.keyStoreFile) : that.keyStoreFile != null) { return false; } if (!Arrays.equals(keyStorePass, that.keyStorePass)) { return false; } if (keyStoreProvider != null ? !keyStoreProvider.equals(that.keyStoreProvider) : that.keyStoreProvider != null) { return false; } if (keyStoreType != null ? !keyStoreType.equals(that.keyStoreType) : that.keyStoreType != null) { return false; } if (securityProtocol != null ? !securityProtocol.equals(that.securityProtocol) : that.securityProtocol != null) { return false; } if (trustManagerFactoryAlgorithm != null ? !trustManagerFactoryAlgorithm.equals(that.trustManagerFactoryAlgorithm) : that.trustManagerFactoryAlgorithm != null) { return false; } if (trustManagerFactoryProvider != null ? !trustManagerFactoryProvider.equals(that.trustManagerFactoryProvider) : that.trustManagerFactoryProvider != null) { return false; } if (trustStore != null ? !trustStore.equals(that.trustStore) : that.trustStore != null) { return false; } if (!Arrays.equals(trustStoreBytes, that.trustStoreBytes)) { return false; } if (trustStoreFile != null ? !trustStoreFile.equals(that.trustStoreFile) : that.trustStoreFile != null) { return false; } if (!Arrays.equals(trustStorePass, that.trustStorePass)) { return false; } if (trustStoreProvider != null ? !trustStoreProvider.equals(that.trustStoreProvider) : that.trustStoreProvider != null) { return false; } if (trustStoreType != null ? !trustStoreType.equals(that.trustStoreType) : that.trustStoreType != null) { return false; } return true; } @Override public int hashCode() { int result = keyStore != null ? keyStore.hashCode() : 0; result = 31 * result + (trustStore != null ? trustStore.hashCode() : 0); result = 31 * result + (trustStoreProvider != null ? trustStoreProvider.hashCode() : 0); result = 31 * result + (keyStoreProvider != null ? keyStoreProvider.hashCode() : 0); result = 31 * result + (trustStoreType != null ? trustStoreType.hashCode() : 0); result = 31 * result + (keyStoreType != null ? keyStoreType.hashCode() : 0); result = 31 * result + (trustStorePass != null ? Arrays.hashCode(trustStorePass) : 0); result = 31 * result + (keyStorePass != null ? Arrays.hashCode(keyStorePass) : 0); result = 31 * result + (keyPass != null ? Arrays.hashCode(keyPass) : 0); result = 31 * result + (trustStoreFile != null ? trustStoreFile.hashCode() : 0); result = 31 * result + (keyStoreFile != null ? keyStoreFile.hashCode() : 0); result = 31 * result + (trustStoreBytes != null ? Arrays.hashCode(trustStoreBytes) : 0); result = 31 * result + (keyStoreBytes != null ? Arrays.hashCode(keyStoreBytes) : 0); result = 31 * result + (trustManagerFactoryAlgorithm != null ? trustManagerFactoryAlgorithm.hashCode() : 0); result = 31 * result + (keyManagerFactoryAlgorithm != null ? keyManagerFactoryAlgorithm.hashCode() : 0); result = 31 * result + (trustManagerFactoryProvider != null ? trustManagerFactoryProvider.hashCode() : 0); result = 31 * result + (keyManagerFactoryProvider != null ? keyManagerFactoryProvider.hashCode() : 0); result = 31 * result + (securityProtocol != null ? securityProtocol.hashCode() : 0); return result; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy