/*
 * JBoss, Home of Professional Open Source.
 * Copyright 2014 Red Hat, Inc., and individual contributors
 * as indicated by the @author tags.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 *  Unless required by applicable law or agreed to in writing, software
 *  distributed under the License is distributed on an "AS IS" BASIS,
 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *  See the License for the specific language governing permissions and
 *  limitations under the License.
 */

package io.undertow.server;

import io.undertow.UndertowMessages;
import io.undertow.util.FlexBase64;
import org.xnio.SslClientAuthMode;

import javax.net.ssl.SSLPeerUnverifiedException;
import javax.net.ssl.SSLSession;
import javax.security.cert.CertificateException;
import javax.security.cert.X509Certificate;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.nio.ByteBuffer;
import java.nio.charset.StandardCharsets;
import java.util.Collection;

Basic SSL session information. This information is generally provided by a front end proxy.
Author:Stuart Douglas
/** * Basic SSL session information. This information is generally provided by a front end proxy. * * @author Stuart Douglas */
public class BasicSSLSessionInfo implements SSLSessionInfo { private final byte[] sessionId; private final String cypherSuite; private final java.security.cert.Certificate[] peerCertificate; private final X509Certificate[] certificate;
Params:
  • sessionId – The SSL session ID
  • cypherSuite – The cypher suite name
  • certificate – A string representation of the client certificate
Throws:
/** * * @param sessionId The SSL session ID * @param cypherSuite The cypher suite name * @param certificate A string representation of the client certificate * @throws java.security.cert.CertificateException If the client cert could not be decoded * @throws CertificateException If the client cert could not be decoded */
public BasicSSLSessionInfo(byte[] sessionId, String cypherSuite, String certificate) throws java.security.cert.CertificateException, CertificateException { this.sessionId = sessionId; this.cypherSuite = cypherSuite; if (certificate != null) { java.security.cert.CertificateFactory cf = java.security.cert.CertificateFactory.getInstance("X.509"); byte[] certificateBytes = certificate.getBytes(StandardCharsets.US_ASCII); ByteArrayInputStream stream = new ByteArrayInputStream(certificateBytes); Collection<? extends java.security.cert.Certificate> certCol = cf.generateCertificates(stream); this.peerCertificate = new java.security.cert.Certificate[certCol.size()]; this.certificate = new X509Certificate[certCol.size()]; int i=0; for(java.security.cert.Certificate cert : certCol) { this.peerCertificate[i] = cert; this.certificate[i++] = X509Certificate.getInstance(cert.getEncoded()); } } else { this.peerCertificate = null; this.certificate = null; } }
Params:
  • sessionId – The Base64 encoded SSL session ID
  • cypherSuite – The cypher suite name
  • certificate – A string representation of the client certificate
Throws:
/** * * @param sessionId The Base64 encoded SSL session ID * @param cypherSuite The cypher suite name * @param certificate A string representation of the client certificate * @throws java.security.cert.CertificateException If the client cert could not be decoded * @throws CertificateException If the client cert could not be decoded */
public BasicSSLSessionInfo(String sessionId, String cypherSuite, String certificate) throws java.security.cert.CertificateException, CertificateException { this(sessionId == null ? null : base64Decode(sessionId), cypherSuite, certificate); } @Override public byte[] getSessionId() { if(sessionId == null) { return null; } final byte[] copy = new byte[sessionId.length]; System.arraycopy(sessionId, 0, copy, 0, copy.length); return copy; } @Override public String getCipherSuite() { return cypherSuite; } @Override public java.security.cert.Certificate[] getPeerCertificates() throws SSLPeerUnverifiedException { if (certificate == null) { throw UndertowMessages.MESSAGES.peerUnverified(); } return peerCertificate; } @Override public X509Certificate[] getPeerCertificateChain() throws SSLPeerUnverifiedException { if (certificate == null) { throw UndertowMessages.MESSAGES.peerUnverified(); } return certificate; } @Override public void renegotiate(HttpServerExchange exchange, SslClientAuthMode sslClientAuthMode) throws IOException { throw UndertowMessages.MESSAGES.renegotiationNotSupported(); } @Override public SSLSession getSSLSession() { return null; } private static byte[] base64Decode(String sessionId) { try { ByteBuffer sessionIdBuffer = FlexBase64.decode(sessionId); byte[] sessionIdData; if (sessionIdBuffer.hasArray()) { sessionIdData = sessionIdBuffer.array(); } else { sessionIdData = new byte[sessionIdBuffer.remaining()]; sessionIdBuffer.get(sessionIdData); } return sessionIdData; } catch (IOException e) { //can happen if the session id is invalid return null; } } }