001/*
002 * $HeadURL: file:///opt/dev/not-yet-commons-ssl-SVN-repo/tags/commons-ssl-0.3.17/src/java/org/apache/commons/ssl/Java13TrustManagerWrapper.java $
003 * $Revision: 138 $
004 * $Date: 2008-03-03 23:50:07 -0800 (Mon, 03 Mar 2008) $
005 *
006 * ====================================================================
007 * Licensed to the Apache Software Foundation (ASF) under one
008 * or more contributor license agreements.  See the NOTICE file
009 * distributed with this work for additional information
010 * regarding copyright ownership.  The ASF licenses this file
011 * to you under the Apache License, Version 2.0 (the
012 * "License"); you may not use this file except in compliance
013 * with the License.  You may obtain a copy of the License at
014 *
015 *   http://www.apache.org/licenses/LICENSE-2.0
016 *
017 * Unless required by applicable law or agreed to in writing,
018 * software distributed under the License is distributed on an
019 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
020 * KIND, either express or implied.  See the License for the
021 * specific language governing permissions and limitations
022 * under the License.
023 * ====================================================================
024 *
025 * This software consists of voluntary contributions made by many
026 * individuals on behalf of the Apache Software Foundation.  For more
027 * information on the Apache Software Foundation, please see
028 * <http://www.apache.org/>.
029 *
030 */
031
032package org.apache.commons.ssl;
033
034import com.sun.net.ssl.X509TrustManager;
035
036import java.security.cert.CertificateException;
037import java.security.cert.X509Certificate;
038
039/**
040 * @author Credit Union Central of British Columbia
041 * @author <a href="http://www.cucbc.com/">www.cucbc.com</a>
042 * @author <a href="mailto:juliusdavies@cucbc.com">juliusdavies@cucbc.com</a>
043 * @since 30-Jun-2006
044 */
045public class Java13TrustManagerWrapper implements X509TrustManager {
046
047    private final X509TrustManager trustManager;
048    private final TrustChain trustChain;
049    private final SSL ssl;
050
051    public Java13TrustManagerWrapper(X509TrustManager m, TrustChain tc, SSL h) {
052        this.trustManager = m;
053        this.trustChain = tc;
054        this.ssl = h;
055    }
056
057    public boolean isClientTrusted(X509Certificate[] chain) {
058        ssl.setCurrentClientChain(chain);
059        boolean firstTest = trustManager.isClientTrusted(chain);
060        return test(firstTest, chain);
061    }
062
063    public boolean isServerTrusted(X509Certificate[] chain) {
064        ssl.setCurrentServerChain(chain);
065        boolean firstTest = trustManager.isServerTrusted(chain);
066        return test(firstTest, chain);
067    }
068
069    public X509Certificate[] getAcceptedIssuers() {
070        if ( trustChain.containsTrustAll()) {
071            // This means we accept all issuers.
072            return new X509Certificate[0];
073        } else {
074            return trustManager.getAcceptedIssuers();
075        }
076    }
077
078    private boolean test(boolean firstTest, X509Certificate[] chain) {
079        // Even if the first test failed, we might still be okay as long as
080        // this SSLServer or SSLClient is setup to trust all certificates.
081        if (!firstTest) {
082            if (!trustChain.contains(TrustMaterial.TRUST_ALL)) {
083                return false;
084            }
085        }
086        try {
087            for (int i = 0; i < chain.length; i++) {
088                X509Certificate c = chain[i];
089                if (ssl.getCheckExpiry()) {
090                    c.checkValidity();
091                }
092                if (ssl.getCheckCRL()) {
093                    Certificates.checkCRL(c);
094                }
095            }
096            return true;
097        }
098        catch (CertificateException ce) {
099            return false;
100        }
101    }
102
103}