001/**
002 *
003 * Copyright 2015-2019 Florian Schmaus
004 *
005 * Licensed under the Apache License, Version 2.0 (the "License");
006 * you may not use this file except in compliance with the License.
007 * You may obtain a copy of the License at
008 *
009 *     http://www.apache.org/licenses/LICENSE-2.0
010 *
011 * Unless required by applicable law or agreed to in writing, software
012 * distributed under the License is distributed on an "AS IS" BASIS,
013 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
014 * See the License for the specific language governing permissions and
015 * limitations under the License.
016 */
017package org.jivesoftware.smack.util.dns.minidns;
018
019import java.security.KeyManagementException;
020import java.security.SecureRandom;
021import java.security.cert.CertificateException;
022
023import javax.net.ssl.KeyManager;
024import javax.net.ssl.SSLContext;
025import javax.net.ssl.SSLSession;
026import javax.net.ssl.TrustManager;
027import javax.net.ssl.X509TrustManager;
028
029import org.jivesoftware.smack.util.dns.SmackDaneVerifier;
030
031import org.minidns.dane.DaneVerifier;
032import org.minidns.dane.ExpectingTrustManager;
033
034public class MiniDnsDaneVerifier implements SmackDaneVerifier {
035
036    private static final DaneVerifier VERIFIER = new DaneVerifier();
037
038    private ExpectingTrustManager expectingTrustManager;
039
040    // Package protected constructor. Use MiniDnsDane.newInstance() to create the verifier.
041    MiniDnsDaneVerifier() {
042    }
043
044    @Override
045    public void init(SSLContext context, KeyManager[] km, X509TrustManager tm, SecureRandom random) throws KeyManagementException {
046        if (expectingTrustManager != null) {
047            throw new IllegalStateException("DaneProvider was initialized before. Use newInstance() instead.");
048        }
049        expectingTrustManager = new ExpectingTrustManager(tm);
050        context.init(km, new TrustManager[] {expectingTrustManager}, random);
051    }
052
053    @Override
054    public void finish(SSLSession sslSession) throws CertificateException {
055        if (VERIFIER.verify(sslSession)) {
056            // DANE verification was the only requirement according to the TLSA RR. We can return here.
057            return;
058        }
059
060        // DANE verification was successful, but according to the TLSA RR we also must perform PKIX validation.
061        if (expectingTrustManager.hasException()) {
062         // PKIX validation has failed. Throw an exception.
063            throw expectingTrustManager.getException();
064        }
065    }
066}