Mercurial > 510Connectbot
view src/org/tn5250j/framework/transport/SSL/X509CertificateTrustManager.java @ 423:76efe8fa29b9
more debugging looking for duplicate transmission
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Fri, 31 Oct 2014 08:58:00 -0700 |
parents | 77ac18bc1b2f |
children |
line wrap: on
line source
package org.tn5250j.framework.transport.SSL; /* * @(#)X509CertificateTrustManager.java * * Copyright: Copyright (c) 2001 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this software; see the file COPYING. If not, write to * the Free Software Foundation, Inc., 59 Temple Place, Suite 330, * Boston, MA 02111-1307 USA * */ import javax.net.ssl.TrustManager; import javax.net.ssl.X509TrustManager; import java.security.cert.X509Certificate; import java.security.KeyStore; import java.security.cert.CertificateException; import java.util.ArrayList; import java.util.Arrays; import com.five_ten_sg.connectbot.R; import com.five_ten_sg.connectbot.service.TerminalBridge; import com.five_ten_sg.connectbot.service.TerminalManager; /** * This class is used to trust certificates exchanged during an SSL socket * handshake. It allows the user to accept the certificate so that connections * can be made without requiring the server to have a certificate signed by a * CA (Verisign, Thawte, etc.). * * @author Stephen M. Kennedy <skennedy@tenthpowertech.com> * @deprecated. no longer used. * */ public class X509CertificateTrustManager implements X509TrustManager { KeyStore ks = null; TrustManager[] trustManagers; TerminalBridge bridge = null; TerminalManager manager = null; public X509CertificateTrustManager(TrustManager[] managers, KeyStore keyStore, TerminalBridge bridge, TerminalManager manager) { this.bridge = bridge; this.manager = manager; trustManagers = managers; ks = keyStore; } public void checkClientTrusted(X509Certificate[] chain, String type) throws CertificateException { throw new SecurityException("checkClientTrusted unsupported"); } /** * Checks the server certificate. If it isn't trusted by the trust manager * passed to the constructor, then the user will be prompted to accept the * certificate. */ public void checkServerTrusted(X509Certificate[] chain, String type) throws CertificateException { try { for (int i = 0; i < trustManagers.length; i++) { if (trustManagers[i] instanceof X509TrustManager) ((X509TrustManager)trustManagers[i]).checkServerTrusted(chain, type); } return; } catch (CertificateException ce) { X509Certificate cert = chain[0]; String certInfo = "Version: " + cert.getVersion() + "\n"; certInfo = certInfo.concat("Serial Number: " + cert.getSerialNumber() + "\n"); certInfo = certInfo.concat("Signature Algorithm: " + cert.getSigAlgName() + "\n"); certInfo = certInfo.concat("Issuer: " + cert.getIssuerDN().getName() + "\n"); certInfo = certInfo.concat("Valid From: " + cert.getNotBefore() + "\n"); certInfo = certInfo.concat("Valid To: " + cert.getNotAfter() + "\n"); certInfo = certInfo.concat("Subject DN: " + cert.getSubjectDN().getName() + "\n"); certInfo = certInfo.concat("Public Key: " + cert.getPublicKey().getFormat() + "\n"); bridge.outputLine(manager.res.getString(R.string.host_certificate, certInfo)); Boolean result = bridge.promptHelper.requestBooleanPrompt(null, manager.res.getString(R.string.prompt_accept_certificate)); if ((result == null) || (!result.booleanValue())) { throw new java.security.cert.CertificateException("Certificate Not Accepted"); } } } public X509Certificate[] getAcceptedIssuers() { ArrayList<X509Certificate> list = new ArrayList<X509Certificate>(10); for (int i = 0; i < trustManagers.length; i++) { if (trustManagers[i] instanceof X509TrustManager) list.addAll(Arrays.asList(((X509TrustManager)trustManagers[i]).getAcceptedIssuers())); } X509Certificate[] acceptedIssuers = new X509Certificate[list.size()]; acceptedIssuers = list.toArray(acceptedIssuers); return acceptedIssuers; } }