001/* 002 * $HeadURL: file:///opt/dev/not-yet-commons-ssl-SVN-repo/tags/commons-ssl-0.3.17/src/java/org/apache/commons/ssl/Java13TrustManagerWrapper.java $ 003 * $Revision: 138 $ 004 * $Date: 2008-03-03 23:50:07 -0800 (Mon, 03 Mar 2008) $ 005 * 006 * ==================================================================== 007 * Licensed to the Apache Software Foundation (ASF) under one 008 * or more contributor license agreements. See the NOTICE file 009 * distributed with this work for additional information 010 * regarding copyright ownership. The ASF licenses this file 011 * to you under the Apache License, Version 2.0 (the 012 * "License"); you may not use this file except in compliance 013 * with the License. You may obtain a copy of the License at 014 * 015 * http://www.apache.org/licenses/LICENSE-2.0 016 * 017 * Unless required by applicable law or agreed to in writing, 018 * software distributed under the License is distributed on an 019 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 020 * KIND, either express or implied. See the License for the 021 * specific language governing permissions and limitations 022 * under the License. 023 * ==================================================================== 024 * 025 * This software consists of voluntary contributions made by many 026 * individuals on behalf of the Apache Software Foundation. For more 027 * information on the Apache Software Foundation, please see 028 * <http://www.apache.org/>. 029 * 030 */ 031 032package org.apache.commons.ssl; 033 034import com.sun.net.ssl.X509TrustManager; 035 036import java.security.cert.CertificateException; 037import java.security.cert.X509Certificate; 038 039/** 040 * @author Credit Union Central of British Columbia 041 * @author <a href="http://www.cucbc.com/">www.cucbc.com</a> 042 * @author <a href="mailto:juliusdavies@cucbc.com">juliusdavies@cucbc.com</a> 043 * @since 30-Jun-2006 044 */ 045public class Java13TrustManagerWrapper implements X509TrustManager { 046 047 private final X509TrustManager trustManager; 048 private final TrustChain trustChain; 049 private final SSL ssl; 050 051 public Java13TrustManagerWrapper(X509TrustManager m, TrustChain tc, SSL h) { 052 this.trustManager = m; 053 this.trustChain = tc; 054 this.ssl = h; 055 } 056 057 public boolean isClientTrusted(X509Certificate[] chain) { 058 ssl.setCurrentClientChain(chain); 059 boolean firstTest = trustManager.isClientTrusted(chain); 060 return test(firstTest, chain); 061 } 062 063 public boolean isServerTrusted(X509Certificate[] chain) { 064 ssl.setCurrentServerChain(chain); 065 boolean firstTest = trustManager.isServerTrusted(chain); 066 return test(firstTest, chain); 067 } 068 069 public X509Certificate[] getAcceptedIssuers() { 070 if ( trustChain.containsTrustAll()) { 071 // This means we accept all issuers. 072 return new X509Certificate[0]; 073 } else { 074 return trustManager.getAcceptedIssuers(); 075 } 076 } 077 078 private boolean test(boolean firstTest, X509Certificate[] chain) { 079 // Even if the first test failed, we might still be okay as long as 080 // this SSLServer or SSLClient is setup to trust all certificates. 081 if (!firstTest) { 082 if (!trustChain.contains(TrustMaterial.TRUST_ALL)) { 083 return false; 084 } 085 } 086 try { 087 for (int i = 0; i < chain.length; i++) { 088 X509Certificate c = chain[i]; 089 if (ssl.getCheckExpiry()) { 090 c.checkValidity(); 091 } 092 if (ssl.getCheckCRL()) { 093 Certificates.checkCRL(c); 094 } 095 } 096 return true; 097 } 098 catch (CertificateException ce) { 099 return false; 100 } 101 } 102 103}