001    /*
002     * $HeadURL: http://juliusdavies.ca/svn/not-yet-commons-ssl/tags/commons-ssl-0.3.11/src/java/org/apache/commons/ssl/Java13TrustManagerWrapper.java $
003     * $Revision: 138 $
004     * $Date: 2008-03-03 23:50:07 -0800 (Mon, 03 Mar 2008) $
005     *
006     * ====================================================================
007     * Licensed to the Apache Software Foundation (ASF) under one
008     * or more contributor license agreements.  See the NOTICE file
009     * distributed with this work for additional information
010     * regarding copyright ownership.  The ASF licenses this file
011     * to you under the Apache License, Version 2.0 (the
012     * "License"); you may not use this file except in compliance
013     * with the License.  You may obtain a copy of the License at
014     *
015     *   http://www.apache.org/licenses/LICENSE-2.0
016     *
017     * Unless required by applicable law or agreed to in writing,
018     * software distributed under the License is distributed on an
019     * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
020     * KIND, either express or implied.  See the License for the
021     * specific language governing permissions and limitations
022     * under the License.
023     * ====================================================================
024     *
025     * This software consists of voluntary contributions made by many
026     * individuals on behalf of the Apache Software Foundation.  For more
027     * information on the Apache Software Foundation, please see
028     * <http://www.apache.org/>.
029     *
030     */
031    
032    package org.apache.commons.ssl;
033    
034    import com.sun.net.ssl.X509TrustManager;
035    
036    import java.security.cert.CertificateException;
037    import java.security.cert.X509Certificate;
038    
039    /**
040     * @author Credit Union Central of British Columbia
041     * @author <a href="http://www.cucbc.com/">www.cucbc.com</a>
042     * @author <a href="mailto:juliusdavies@cucbc.com">juliusdavies@cucbc.com</a>
043     * @since 30-Jun-2006
044     */
045    public class Java13TrustManagerWrapper implements X509TrustManager {
046    
047        private final X509TrustManager trustManager;
048        private final TrustChain trustChain;
049        private final SSL ssl;
050    
051        public Java13TrustManagerWrapper(X509TrustManager m, TrustChain tc, SSL h) {
052            this.trustManager = m;
053            this.trustChain = tc;
054            this.ssl = h;
055        }
056    
057        public boolean isClientTrusted(X509Certificate[] chain) {
058            ssl.setCurrentClientChain(chain);
059            boolean firstTest = trustManager.isClientTrusted(chain);
060            return test(firstTest, chain);
061        }
062    
063        public boolean isServerTrusted(X509Certificate[] chain) {
064            ssl.setCurrentServerChain(chain);
065            boolean firstTest = trustManager.isServerTrusted(chain);
066            return test(firstTest, chain);
067        }
068    
069        public X509Certificate[] getAcceptedIssuers() {
070            if ( trustChain.containsTrustAll()) {
071                // This means we accept all issuers.
072                return new X509Certificate[0];
073            } else {
074                return trustManager.getAcceptedIssuers();
075            }
076        }
077    
078        private boolean test(boolean firstTest, X509Certificate[] chain) {
079            // Even if the first test failed, we might still be okay as long as
080            // this SSLServer or SSLClient is setup to trust all certificates.
081            if (!firstTest) {
082                if (!trustChain.contains(TrustMaterial.TRUST_ALL)) {
083                    return false;
084                }
085            }
086            try {
087                for (int i = 0; i < chain.length; i++) {
088                    X509Certificate c = chain[i];
089                    if (ssl.getCheckExpiry()) {
090                        c.checkValidity();
091                    }
092                    if (ssl.getCheckCRL()) {
093                        Certificates.checkCRL(c);
094                    }
095                }
096                return true;
097            }
098            catch (CertificateException ce) {
099                return false;
100            }
101        }
102    
103    }