mirror of
https://github.com/vanitasvitae/Smack.git
synced 2024-09-27 18:19:33 +02:00
77 lines
2.8 KiB
Java
77 lines
2.8 KiB
Java
/**
|
|
*
|
|
* Copyright 2015-2016 Florian Schmaus
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
package org.jivesoftware.smack.util.dns.minidns;
|
|
|
|
import java.io.IOException;
|
|
import java.security.KeyManagementException;
|
|
import java.security.SecureRandom;
|
|
import java.security.cert.CertificateException;
|
|
import java.util.logging.Level;
|
|
import java.util.logging.Logger;
|
|
|
|
import javax.net.ssl.KeyManager;
|
|
import javax.net.ssl.SSLContext;
|
|
import javax.net.ssl.SSLSocket;
|
|
import javax.net.ssl.TrustManager;
|
|
import javax.net.ssl.X509TrustManager;
|
|
|
|
import org.jivesoftware.smack.util.dns.SmackDaneVerifier;
|
|
|
|
import de.measite.minidns.dane.DaneVerifier;
|
|
import de.measite.minidns.dane.ExpectingTrustManager;
|
|
|
|
public class MiniDnsDaneVerifier implements SmackDaneVerifier {
|
|
private static final Logger LOGGER = Logger.getLogger(MiniDnsDaneVerifier.class.getName());
|
|
|
|
private static final DaneVerifier VERIFIER = new DaneVerifier();
|
|
|
|
private ExpectingTrustManager expectingTrustManager;
|
|
|
|
// Package protected constructor. Use MiniDnsDane.newInstance() to create the verifier.
|
|
MiniDnsDaneVerifier() {
|
|
}
|
|
|
|
@Override
|
|
public void init(SSLContext context, KeyManager[] km, X509TrustManager tm, SecureRandom random) throws KeyManagementException {
|
|
if (expectingTrustManager != null) {
|
|
throw new IllegalStateException("DaneProvider was initialized before. Use newInstance() instead.");
|
|
}
|
|
expectingTrustManager = new ExpectingTrustManager(tm);
|
|
context.init(km, new TrustManager[] {expectingTrustManager}, random);
|
|
}
|
|
|
|
@Override
|
|
public void finish(SSLSocket sslSocket) throws CertificateException {
|
|
if (VERIFIER.verify(sslSocket)) {
|
|
// DANE verification was the only requirement according to the TLSA RR. We can return here.
|
|
return;
|
|
}
|
|
|
|
// DANE verification was successful, but according to the TLSA RR we also must perform PKIX validation.
|
|
if (expectingTrustManager.hasException()) {
|
|
// PKIX validation has failed. Throw an exception but close the socket first.
|
|
try {
|
|
sslSocket.close();
|
|
} catch (IOException e) {
|
|
LOGGER.log(Level.FINER, "Closing TLS socket failed", e);
|
|
}
|
|
throw expectingTrustManager.getException();
|
|
}
|
|
}
|
|
|
|
}
|