Mercurial > 510Connectbot
comparison src/org/tn5250j/framework/transport/SSL/X509CertificateTrustManager.java @ 79:01d939969b10
merge tn5250 branch into default
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Mon, 16 Jun 2014 08:24:00 -0700 |
parents | 51f34b9de232 |
children | 77ac18bc1b2f |
comparison
equal
deleted
inserted
replaced
19:b3d0d806cbe2 | 79:01d939969b10 |
---|---|
1 package org.tn5250j.framework.transport.SSL; | |
2 | |
3 /* | |
4 * @(#)X509CertificateTrustManager.java | |
5 * | |
6 * Copyright: Copyright (c) 2001 | |
7 * | |
8 * This program is free software; you can redistribute it and/or modify | |
9 * it under the terms of the GNU General Public License as published by | |
10 * the Free Software Foundation; either version 2, or (at your option) | |
11 * any later version. | |
12 * | |
13 * This program is distributed in the hope that it will be useful, | |
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 * GNU General Public License for more details. | |
17 * | |
18 * You should have received a copy of the GNU General Public License | |
19 * along with this software; see the file COPYING. If not, write to | |
20 * the Free Software Foundation, Inc., 59 Temple Place, Suite 330, | |
21 * Boston, MA 02111-1307 USA | |
22 * | |
23 */ | |
24 import javax.net.ssl.TrustManager; | |
25 import javax.net.ssl.X509TrustManager; | |
26 import java.security.cert.X509Certificate; | |
27 import java.security.KeyStore; | |
28 import java.security.cert.CertificateException; | |
29 import java.util.ArrayList; | |
30 import java.util.Arrays; | |
31 | |
32 import com.five_ten_sg.connectbot.R; | |
33 import com.five_ten_sg.connectbot.service.TerminalBridge; | |
34 import com.five_ten_sg.connectbot.service.TerminalManager; | |
35 | |
36 | |
37 /** | |
38 * This class is used to trust certificates exchanged during an SSL socket | |
39 * handshake. It allows the user to accept the certificate so that connections | |
40 * can be made without requiring the server to have a certificate signed by a | |
41 * CA (Verisign, Thawte, etc.). | |
42 * | |
43 * @author Stephen M. Kennedy <skennedy@tenthpowertech.com> | |
44 * @deprecated. no longer used. | |
45 * | |
46 */ | |
47 public class X509CertificateTrustManager implements X509TrustManager { | |
48 | |
49 KeyStore ks = null; | |
50 TrustManager[] trustManagers; | |
51 TerminalBridge bridge = null; | |
52 TerminalManager manager = null; | |
53 | |
54 public X509CertificateTrustManager(TrustManager[] managers, KeyStore keyStore, TerminalBridge bridge, TerminalManager manager) { | |
55 this.bridge = bridge; | |
56 this.manager = manager; | |
57 trustManagers = managers; | |
58 ks = keyStore; | |
59 } | |
60 | |
61 public void checkClientTrusted(X509Certificate[] chain, String type) throws CertificateException { | |
62 throw new SecurityException("checkClientTrusted unsupported"); | |
63 } | |
64 | |
65 | |
66 /** | |
67 * Checks the server certificate. If it isn't trusted by the trust manager | |
68 * passed to the constructor, then the user will be prompted to accept the | |
69 * certificate. | |
70 */ | |
71 public void checkServerTrusted(X509Certificate[] chain, String type) | |
72 throws CertificateException { | |
73 try { | |
74 for (int i=0; i<trustManagers.length; i++) { | |
75 if (trustManagers[i] instanceof X509TrustManager) | |
76 ((X509TrustManager)trustManagers[i]).checkServerTrusted(chain,type); | |
77 } | |
78 return; | |
79 } catch (CertificateException ce) { | |
80 X509Certificate cert = chain[0]; | |
81 String certInfo = "Version: " + cert.getVersion() + "\n"; | |
82 certInfo = certInfo.concat("Serial Number: " + cert.getSerialNumber()+"\n"); | |
83 certInfo = certInfo.concat("Signature Algorithm: " + cert.getSigAlgName()+"\n"); | |
84 certInfo = certInfo.concat("Issuer: " + cert.getIssuerDN().getName()+"\n"); | |
85 certInfo = certInfo.concat("Valid From: " + cert.getNotBefore()+"\n"); | |
86 certInfo = certInfo.concat("Valid To: " + cert.getNotAfter()+"\n"); | |
87 certInfo = certInfo.concat("Subject DN: " + cert.getSubjectDN().getName()+"\n"); | |
88 certInfo = certInfo.concat("Public Key: " + cert.getPublicKey().getFormat()+"\n"); | |
89 | |
90 bridge.outputLine(manager.res.getString(R.string.host_certificate, certInfo)); | |
91 Boolean result = bridge.promptHelper.requestBooleanPrompt(null, manager.res.getString(R.string.prompt_accept_certificate)); | |
92 if ((result == null) || (!result.booleanValue())) { | |
93 throw new java.security.cert.CertificateException("Certificate Not Accepted"); | |
94 } | |
95 } | |
96 } | |
97 | |
98 public X509Certificate[] getAcceptedIssuers() { | |
99 ArrayList<X509Certificate> list = new ArrayList<X509Certificate>(10); | |
100 for (int i=0; i<trustManagers.length; i++) { | |
101 if (trustManagers[i] instanceof X509TrustManager) | |
102 list.addAll(Arrays.asList(((X509TrustManager)trustManagers[i]).getAcceptedIssuers())); | |
103 } | |
104 X509Certificate[] acceptedIssuers = new X509Certificate[list.size()]; | |
105 acceptedIssuers = list.toArray(acceptedIssuers); | |
106 return acceptedIssuers; | |
107 } | |
108 } |