/*
 * Copyright (c) 2011, 2015, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Oracle designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Oracle in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

package sun.security.provider.certpath.ssl;

import java.io.IOException;
import java.net.URI;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collection;
import java.util.Collections;
import java.util.List;
import java.security.GeneralSecurityException;
import java.security.InvalidAlgorithmParameterException;
import java.security.Provider;
import java.security.cert.CertificateException;
import java.security.cert.CertSelector;
import java.security.cert.CertStore;
import java.security.cert.CertStoreException;
import java.security.cert.CertStoreParameters;
import java.security.cert.CertStoreSpi;
import java.security.cert.CRLSelector;
import java.security.cert.X509Certificate;
import java.security.cert.X509CRL;
import java.net.Socket;
import java.net.URLConnection;
import javax.net.ssl.HostnameVerifier;
import javax.net.ssl.HttpsURLConnection;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSession;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509ExtendedTrustManager;

A CertStore that retrieves an SSL server's certificate chain.
/** * A CertStore that retrieves an SSL server's certificate chain. */
public final class SSLServerCertStore extends CertStoreSpi { private final URI uri; private static final GetChainTrustManager trustManager; private static final SSLSocketFactory socketFactory; private static final HostnameVerifier hostnameVerifier; static { trustManager = new GetChainTrustManager(); hostnameVerifier = new HostnameVerifier() { public boolean verify(String hostname, SSLSession session) { return true; } }; SSLSocketFactory tempFactory; try { SSLContext context = SSLContext.getInstance("SSL"); context.init(null, new TrustManager[] { trustManager }, null); tempFactory = context.getSocketFactory(); } catch (GeneralSecurityException gse) { tempFactory = null; } socketFactory = tempFactory; } SSLServerCertStore(URI uri) throws InvalidAlgorithmParameterException { super(null); this.uri = uri; } public Collection<X509Certificate> engineGetCertificates (CertSelector selector) throws CertStoreException { try { URLConnection urlConn = uri.toURL().openConnection(); if (urlConn instanceof HttpsURLConnection) { if (socketFactory == null) { throw new CertStoreException( "No initialized SSLSocketFactory"); } HttpsURLConnection https = (HttpsURLConnection)urlConn; https.setSSLSocketFactory(socketFactory); https.setHostnameVerifier(hostnameVerifier); synchronized (trustManager) { try { https.connect(); return getMatchingCerts( trustManager.serverChain, selector); } catch (IOException ioe) { // If the server certificate has already been // retrieved, don't mind the connection state. if (trustManager.exchangedServerCerts) { return getMatchingCerts( trustManager.serverChain, selector); } // otherwise, rethrow the exception throw ioe; } finally { trustManager.cleanup(); } } } } catch (IOException ioe) { throw new CertStoreException(ioe); } return Collections.<X509Certificate>emptySet(); } private static List<X509Certificate> getMatchingCerts (List<X509Certificate> certs, CertSelector selector) { // if selector not specified, all certs match if (selector == null) { return certs; } List<X509Certificate> matchedCerts = new ArrayList<>(certs.size()); for (X509Certificate cert : certs) { if (selector.match(cert)) { matchedCerts.add(cert); } } return matchedCerts; } public Collection<X509CRL> engineGetCRLs(CRLSelector selector) throws CertStoreException { throw new UnsupportedOperationException(); } public static CertStore getInstance(URI uri) throws InvalidAlgorithmParameterException { return new CS(new SSLServerCertStore(uri), null, "SSLServer", null); } /* * An X509ExtendedTrustManager that ignores the server certificate * validation. */ private static class GetChainTrustManager extends X509ExtendedTrustManager { private List<X509Certificate> serverChain = Collections.<X509Certificate>emptyList(); private boolean exchangedServerCerts = false; @Override public X509Certificate[] getAcceptedIssuers() { return new X509Certificate[0]; } @Override public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException { throw new UnsupportedOperationException(); } @Override public void checkClientTrusted(X509Certificate[] chain, String authType, Socket socket) throws CertificateException { throw new UnsupportedOperationException(); } @Override public void checkClientTrusted(X509Certificate[] chain, String authType, SSLEngine engine) throws CertificateException { throw new UnsupportedOperationException(); } @Override public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException { exchangedServerCerts = true; this.serverChain = (chain == null) ? Collections.<X509Certificate>emptyList() : Arrays.<X509Certificate>asList(chain); } @Override public void checkServerTrusted(X509Certificate[] chain, String authType, Socket socket) throws CertificateException { checkServerTrusted(chain, authType); } @Override public void checkServerTrusted(X509Certificate[] chain, String authType, SSLEngine engine) throws CertificateException { checkServerTrusted(chain, authType); } void cleanup() { exchangedServerCerts = false; serverChain = Collections.<X509Certificate>emptyList(); } }
This class allows the SSLServerCertStore to be accessed as a CertStore.
/** * This class allows the SSLServerCertStore to be accessed as a CertStore. */
private static class CS extends CertStore { protected CS(CertStoreSpi spi, Provider p, String type, CertStoreParameters params) { super(spi, p, type, params); } } }