Mercurial Hosting > luan
comparison src/org/eclipse/jetty/server/ssl/SslCertificates.java @ 802:3428c60d7cfc
replace jetty jars with source
| author | Franklin Schmidt <fschmidt@gmail.com> |
|---|---|
| date | Wed, 07 Sep 2016 21:15:48 -0600 |
| parents | |
| children | 8e9db0bbf4f9 |
comparison
equal
deleted
inserted
replaced
| 801:6a21393191c1 | 802:3428c60d7cfc |
|---|---|
| 1 // | |
| 2 // ======================================================================== | |
| 3 // Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd. | |
| 4 // ------------------------------------------------------------------------ | |
| 5 // All rights reserved. This program and the accompanying materials | |
| 6 // are made available under the terms of the Eclipse Public License v1.0 | |
| 7 // and Apache License v2.0 which accompanies this distribution. | |
| 8 // | |
| 9 // The Eclipse Public License is available at | |
| 10 // http://www.eclipse.org/legal/epl-v10.html | |
| 11 // | |
| 12 // The Apache License v2.0 is available at | |
| 13 // http://www.opensource.org/licenses/apache2.0.php | |
| 14 // | |
| 15 // You may elect to redistribute this code under either of these licenses. | |
| 16 // ======================================================================== | |
| 17 // | |
| 18 | |
| 19 package org.eclipse.jetty.server.ssl; | |
| 20 | |
| 21 import java.io.ByteArrayInputStream; | |
| 22 import java.io.IOException; | |
| 23 import java.security.cert.X509Certificate; | |
| 24 | |
| 25 import javax.net.ssl.SSLPeerUnverifiedException; | |
| 26 import javax.net.ssl.SSLSession; | |
| 27 import javax.net.ssl.SSLSocket; | |
| 28 | |
| 29 import org.eclipse.jetty.http.HttpSchemes; | |
| 30 import org.eclipse.jetty.io.EndPoint; | |
| 31 import org.eclipse.jetty.io.bio.SocketEndPoint; | |
| 32 import org.eclipse.jetty.server.Request; | |
| 33 import org.eclipse.jetty.util.TypeUtil; | |
| 34 import org.eclipse.jetty.util.log.Log; | |
| 35 import org.eclipse.jetty.util.log.Logger; | |
| 36 | |
| 37 public class SslCertificates | |
| 38 { | |
| 39 private static final Logger LOG = Log.getLogger(SslCertificates.class); | |
| 40 | |
| 41 /** | |
| 42 * The name of the SSLSession attribute that will contain any cached information. | |
| 43 */ | |
| 44 static final String CACHED_INFO_ATTR = CachedInfo.class.getName(); | |
| 45 | |
| 46 public static X509Certificate[] getCertChain(SSLSession sslSession) | |
| 47 { | |
| 48 try | |
| 49 { | |
| 50 javax.security.cert.X509Certificate javaxCerts[]=sslSession.getPeerCertificateChain(); | |
| 51 if (javaxCerts==null||javaxCerts.length==0) | |
| 52 return null; | |
| 53 | |
| 54 int length=javaxCerts.length; | |
| 55 X509Certificate[] javaCerts=new X509Certificate[length]; | |
| 56 | |
| 57 java.security.cert.CertificateFactory cf=java.security.cert.CertificateFactory.getInstance("X.509"); | |
| 58 for (int i=0; i<length; i++) | |
| 59 { | |
| 60 byte bytes[]=javaxCerts[i].getEncoded(); | |
| 61 ByteArrayInputStream stream=new ByteArrayInputStream(bytes); | |
| 62 javaCerts[i]=(X509Certificate)cf.generateCertificate(stream); | |
| 63 } | |
| 64 | |
| 65 return javaCerts; | |
| 66 } | |
| 67 catch (SSLPeerUnverifiedException pue) | |
| 68 { | |
| 69 return null; | |
| 70 } | |
| 71 catch (Exception e) | |
| 72 { | |
| 73 LOG.warn(Log.EXCEPTION,e); | |
| 74 return null; | |
| 75 } | |
| 76 } | |
| 77 | |
| 78 | |
| 79 /* ------------------------------------------------------------ */ | |
| 80 /** | |
| 81 * Allow the Listener a chance to customise the request. before the server | |
| 82 * does its stuff. <br> | |
| 83 * This allows the required attributes to be set for SSL requests. <br> | |
| 84 * The requirements of the Servlet specs are: | |
| 85 * <ul> | |
| 86 * <li> an attribute named "javax.servlet.request.ssl_session_id" of type | |
| 87 * String (since Servlet Spec 3.0).</li> | |
| 88 * <li> an attribute named "javax.servlet.request.cipher_suite" of type | |
| 89 * String.</li> | |
| 90 * <li> an attribute named "javax.servlet.request.key_size" of type Integer.</li> | |
| 91 * <li> an attribute named "javax.servlet.request.X509Certificate" of type | |
| 92 * java.security.cert.X509Certificate[]. This is an array of objects of type | |
| 93 * X509Certificate, the order of this array is defined as being in ascending | |
| 94 * order of trust. The first certificate in the chain is the one set by the | |
| 95 * client, the next is the one used to authenticate the first, and so on. | |
| 96 * </li> | |
| 97 * </ul> | |
| 98 * | |
| 99 * @param endpoint | |
| 100 * The Socket the request arrived on. This should be a | |
| 101 * {@link SocketEndPoint} wrapping a {@link SSLSocket}. | |
| 102 * @param request | |
| 103 * HttpRequest to be customised. | |
| 104 */ | |
| 105 public static void customize(SSLSession sslSession, EndPoint endpoint, Request request) throws IOException | |
| 106 { | |
| 107 request.setScheme(HttpSchemes.HTTPS); | |
| 108 | |
| 109 try | |
| 110 { | |
| 111 String cipherSuite=sslSession.getCipherSuite(); | |
| 112 Integer keySize; | |
| 113 X509Certificate[] certs; | |
| 114 String idStr; | |
| 115 | |
| 116 CachedInfo cachedInfo=(CachedInfo)sslSession.getValue(CACHED_INFO_ATTR); | |
| 117 if (cachedInfo!=null) | |
| 118 { | |
| 119 keySize=cachedInfo.getKeySize(); | |
| 120 certs=cachedInfo.getCerts(); | |
| 121 idStr=cachedInfo.getIdStr(); | |
| 122 } | |
| 123 else | |
| 124 { | |
| 125 keySize=new Integer(ServletSSL.deduceKeyLength(cipherSuite)); | |
| 126 certs=SslCertificates.getCertChain(sslSession); | |
| 127 byte[] bytes = sslSession.getId(); | |
| 128 idStr = TypeUtil.toHexString(bytes); | |
| 129 cachedInfo=new CachedInfo(keySize,certs,idStr); | |
| 130 sslSession.putValue(CACHED_INFO_ATTR,cachedInfo); | |
| 131 } | |
| 132 | |
| 133 if (certs!=null) | |
| 134 request.setAttribute("javax.servlet.request.X509Certificate",certs); | |
| 135 | |
| 136 request.setAttribute("javax.servlet.request.cipher_suite",cipherSuite); | |
| 137 request.setAttribute("javax.servlet.request.key_size",keySize); | |
| 138 request.setAttribute("javax.servlet.request.ssl_session_id", idStr); | |
| 139 } | |
| 140 catch (Exception e) | |
| 141 { | |
| 142 LOG.warn(Log.EXCEPTION,e); | |
| 143 } | |
| 144 } | |
| 145 | |
| 146 /* ------------------------------------------------------------ */ | |
| 147 /* ------------------------------------------------------------ */ | |
| 148 /* ------------------------------------------------------------ */ | |
| 149 /** | |
| 150 * Simple bundle of information that is cached in the SSLSession. Stores the | |
| 151 * effective keySize and the client certificate chain. | |
| 152 */ | |
| 153 private static class CachedInfo | |
| 154 { | |
| 155 private final X509Certificate[] _certs; | |
| 156 private final Integer _keySize; | |
| 157 private final String _idStr; | |
| 158 | |
| 159 CachedInfo(Integer keySize, X509Certificate[] certs,String idStr) | |
| 160 { | |
| 161 this._keySize=keySize; | |
| 162 this._certs=certs; | |
| 163 this._idStr=idStr; | |
| 164 } | |
| 165 | |
| 166 X509Certificate[] getCerts() | |
| 167 { | |
| 168 return _certs; | |
| 169 } | |
| 170 | |
| 171 Integer getKeySize() | |
| 172 { | |
| 173 return _keySize; | |
| 174 } | |
| 175 | |
| 176 String getIdStr() | |
| 177 { | |
| 178 return _idStr; | |
| 179 } | |
| 180 } | |
| 181 | |
| 182 } |
