All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.tomcat.util.net.AprSSLSupport Maven / Gradle / Ivy

There is a newer version: 11.0.0-M26
Show newest version
/*
 *  Licensed to the Apache Software Foundation (ASF) under one or more
 *  contributor license agreements.  See the NOTICE file distributed with
 *  this work for additional information regarding copyright ownership.
 *  The ASF licenses this file to You under the Apache License, Version 2.0
 *  (the "License"); you may not use this file except in compliance with
 *  the License.  You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 *  Unless required by applicable law or agreed to in writing, software
 *  distributed under the License is distributed on an "AS IS" BASIS,
 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *  See the License for the specific language governing permissions and
 *  limitations under the License.
 */
package org.apache.tomcat.util.net;

import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.security.cert.CertificateFactory;
import java.security.cert.X509Certificate;

import org.apache.tomcat.jni.SSL;

/**
 * Implementation of SSLSupport for APR.
 * 

* TODO: Add a mechanism (or figure out how to use what we already have) to * invalidate the session. */ public class AprSSLSupport implements SSLSupport { private final AprEndpoint.AprSocketWrapper socketWrapper; private final String clientCertProvider; public AprSSLSupport(AprEndpoint.AprSocketWrapper socketWrapper, String clientCertProvider) { this.socketWrapper = socketWrapper; this.clientCertProvider = clientCertProvider; } @Override public String getCipherSuite() throws IOException { try { return socketWrapper.getSSLInfoS(SSL.SSL_INFO_CIPHER); } catch (Exception e) { throw new IOException(e); } } @Override public X509Certificate[] getPeerCertificateChain() throws IOException { try { // certLength == -1 indicates an error unless TLS session tickets // are in use in which case OpenSSL won't store the chain in the // ticket. int certLength = socketWrapper.getSSLInfoI(SSL.SSL_INFO_CLIENT_CERT_CHAIN); byte[] clientCert = socketWrapper.getSSLInfoB(SSL.SSL_INFO_CLIENT_CERT); X509Certificate[] certs = null; if (clientCert != null) { if (certLength < 0) { certLength = 0; } certs = new X509Certificate[certLength + 1]; CertificateFactory cf; if (clientCertProvider == null) { cf = CertificateFactory.getInstance("X.509"); } else { cf = CertificateFactory.getInstance("X.509", clientCertProvider); } certs[0] = (X509Certificate) cf.generateCertificate(new ByteArrayInputStream(clientCert)); for (int i = 0; i < certLength; i++) { byte[] data = socketWrapper.getSSLInfoB(SSL.SSL_INFO_CLIENT_CERT_CHAIN + i); certs[i+1] = (X509Certificate) cf.generateCertificate(new ByteArrayInputStream(data)); } } return certs; } catch (Exception e) { throw new IOException(e); } } @Override public Integer getKeySize() throws IOException { try { return Integer.valueOf(socketWrapper.getSSLInfoI(SSL.SSL_INFO_CIPHER_USEKEYSIZE)); } catch (Exception e) { throw new IOException(e); } } @Override public String getSessionId() throws IOException { try { return socketWrapper.getSSLInfoS(SSL.SSL_INFO_SESSION_ID); } catch (Exception e) { throw new IOException(e); } } @Override public String getProtocol() throws IOException { try { return socketWrapper.getSSLInfoS(SSL.SSL_INFO_PROTOCOL); } catch (Exception e) { throw new IOException(e); } } @Override public String getRequestedProtocols() throws IOException { return null; } @Override public String getRequestedCiphers() throws IOException { return null; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy