001/** 002 * 003 * Copyright 2015-2019 Florian Schmaus 004 * 005 * Licensed under the Apache License, Version 2.0 (the "License"); 006 * you may not use this file except in compliance with the License. 007 * You may obtain a copy of the License at 008 * 009 * http://www.apache.org/licenses/LICENSE-2.0 010 * 011 * Unless required by applicable law or agreed to in writing, software 012 * distributed under the License is distributed on an "AS IS" BASIS, 013 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 014 * See the License for the specific language governing permissions and 015 * limitations under the License. 016 */ 017package org.jivesoftware.smack.util.dns.minidns; 018 019import java.security.KeyManagementException; 020import java.security.SecureRandom; 021import java.security.cert.CertificateException; 022 023import javax.net.ssl.KeyManager; 024import javax.net.ssl.SSLContext; 025import javax.net.ssl.SSLSession; 026import javax.net.ssl.TrustManager; 027import javax.net.ssl.X509TrustManager; 028 029import org.jivesoftware.smack.util.dns.SmackDaneVerifier; 030 031import org.minidns.dane.DaneVerifier; 032import org.minidns.dane.ExpectingTrustManager; 033 034public class MiniDnsDaneVerifier implements SmackDaneVerifier { 035 036 private static final DaneVerifier VERIFIER = new DaneVerifier(); 037 038 private ExpectingTrustManager expectingTrustManager; 039 040 // Package protected constructor. Use MiniDnsDane.newInstance() to create the verifier. 041 MiniDnsDaneVerifier() { 042 } 043 044 @Override 045 public void init(SSLContext context, KeyManager[] km, X509TrustManager tm, SecureRandom random) throws KeyManagementException { 046 if (expectingTrustManager != null) { 047 throw new IllegalStateException("DaneProvider was initialized before. Use newInstance() instead."); 048 } 049 expectingTrustManager = new ExpectingTrustManager(tm); 050 context.init(km, new TrustManager[] {expectingTrustManager}, random); 051 } 052 053 @Override 054 public void finish(SSLSession sslSession) throws CertificateException { 055 if (VERIFIER.verify(sslSession)) { 056 // DANE verification was the only requirement according to the TLSA RR. We can return here. 057 return; 058 } 059 060 // DANE verification was successful, but according to the TLSA RR we also must perform PKIX validation. 061 if (expectingTrustManager.hasException()) { 062 // PKIX validation has failed. Throw an exception. 063 throw expectingTrustManager.getException(); 064 } 065 } 066}