Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
318c59ff
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
318c59ff
编写于
3月 20, 2019
作者:
C
coffeys
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
8218863: Better endpoint checks
Reviewed-by: xuelei, ahgross, jnimeh, mullan, rhalade
上级
80795ac8
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
53 addition
and
50 deletion
+53
-50
src/share/classes/sun/security/ssl/SSLContextImpl.java
src/share/classes/sun/security/ssl/SSLContextImpl.java
+16
-14
src/share/classes/sun/security/ssl/X509TrustManagerImpl.java
src/share/classes/sun/security/ssl/X509TrustManagerImpl.java
+37
-36
未找到文件。
src/share/classes/sun/security/ssl/SSLContextImpl.java
浏览文件 @
318c59ff
...
...
@@ -1114,8 +1114,9 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
checkAdditionalTrust
(
chain
,
authType
,
engine
,
false
);
}
private
void
checkAdditionalTrust
(
X509Certificate
[]
chain
,
String
authType
,
Socket
socket
,
boolean
isClient
)
throws
CertificateException
{
private
void
checkAdditionalTrust
(
X509Certificate
[]
chain
,
String
authType
,
Socket
socket
,
boolean
checkClientTrusted
)
throws
CertificateException
{
if
(
socket
!=
null
&&
socket
.
isConnected
()
&&
socket
instanceof
SSLSocket
)
{
...
...
@@ -1129,9 +1130,8 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
String
identityAlg
=
sslSocket
.
getSSLParameters
().
getEndpointIdentificationAlgorithm
();
if
(
identityAlg
!=
null
&&
identityAlg
.
length
()
!=
0
)
{
String
hostname
=
session
.
getPeerHost
();
X509TrustManagerImpl
.
checkIdentity
(
hostname
,
chain
[
0
],
identityAlg
);
X509TrustManagerImpl
.
checkIdentity
(
session
,
chain
,
identityAlg
,
checkClientTrusted
);
}
// try the best to check the algorithm constraints
...
...
@@ -1155,12 +1155,13 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
constraints
=
new
SSLAlgorithmConstraints
(
sslSocket
,
true
);
}
checkAlgorithmConstraints
(
chain
,
constraints
,
isClient
);
checkAlgorithmConstraints
(
chain
,
constraints
,
checkClientTrusted
);
}
}
private
void
checkAdditionalTrust
(
X509Certificate
[]
chain
,
String
authType
,
SSLEngine
engine
,
boolean
isClient
)
throws
CertificateException
{
private
void
checkAdditionalTrust
(
X509Certificate
[]
chain
,
String
authType
,
SSLEngine
engine
,
boolean
checkClientTrusted
)
throws
CertificateException
{
if
(
engine
!=
null
)
{
SSLSession
session
=
engine
.
getHandshakeSession
();
if
(
session
==
null
)
{
...
...
@@ -1171,9 +1172,8 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
String
identityAlg
=
engine
.
getSSLParameters
().
getEndpointIdentificationAlgorithm
();
if
(
identityAlg
!=
null
&&
identityAlg
.
length
()
!=
0
)
{
String
hostname
=
session
.
getPeerHost
();
X509TrustManagerImpl
.
checkIdentity
(
hostname
,
chain
[
0
],
identityAlg
);
X509TrustManagerImpl
.
checkIdentity
(
session
,
chain
,
identityAlg
,
checkClientTrusted
);
}
// try the best to check the algorithm constraints
...
...
@@ -1197,12 +1197,13 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
constraints
=
new
SSLAlgorithmConstraints
(
engine
,
true
);
}
checkAlgorithmConstraints
(
chain
,
constraints
,
isClient
);
checkAlgorithmConstraints
(
chain
,
constraints
,
checkClientTrusted
);
}
}
private
void
checkAlgorithmConstraints
(
X509Certificate
[]
chain
,
AlgorithmConstraints
constraints
,
boolean
isClient
)
throws
CertificateException
{
AlgorithmConstraints
constraints
,
boolean
checkClientTrusted
)
throws
CertificateException
{
try
{
// Does the certificate chain end with a trusted certificate?
...
...
@@ -1222,7 +1223,8 @@ final class AbstractTrustManagerWrapper extends X509ExtendedTrustManager
if
(
checkedLength
>=
0
)
{
AlgorithmChecker
checker
=
new
AlgorithmChecker
(
constraints
,
null
,
(
isClient
?
Validator
.
VAR_TLS_CLIENT
:
Validator
.
VAR_TLS_SERVER
));
(
checkClientTrusted
?
Validator
.
VAR_TLS_CLIENT
:
Validator
.
VAR_TLS_SERVER
));
checker
.
init
(
false
);
for
(
int
i
=
checkedLength
;
i
>=
0
;
i
--)
{
Certificate
cert
=
chain
[
i
];
...
...
src/share/classes/sun/security/ssl/X509TrustManagerImpl.java
浏览文件 @
318c59ff
...
...
@@ -145,7 +145,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
private
Validator
checkTrustedInit
(
X509Certificate
[]
chain
,
String
authType
,
boolean
isClient
)
{
String
authType
,
boolean
checkClientTrusted
)
{
if
(
chain
==
null
||
chain
.
length
==
0
)
{
throw
new
IllegalArgumentException
(
"null or zero-length certificate chain"
);
...
...
@@ -157,7 +157,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
Validator
v
=
null
;
if
(
isClient
)
{
if
(
checkClientTrusted
)
{
v
=
clientValidator
;
if
(
v
==
null
)
{
synchronized
(
this
)
{
...
...
@@ -187,9 +187,10 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
private
void
checkTrusted
(
X509Certificate
[]
chain
,
String
authType
,
Socket
socket
,
boolean
isClient
)
throws
CertificateException
{
Validator
v
=
checkTrustedInit
(
chain
,
authType
,
isClient
);
private
void
checkTrusted
(
X509Certificate
[]
chain
,
String
authType
,
Socket
socket
,
boolean
checkClientTrusted
)
throws
CertificateException
{
Validator
v
=
checkTrustedInit
(
chain
,
authType
,
checkClientTrusted
);
AlgorithmConstraints
constraints
=
null
;
if
((
socket
!=
null
)
&&
socket
.
isConnected
()
&&
...
...
@@ -205,8 +206,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
String
identityAlg
=
sslSocket
.
getSSLParameters
().
getEndpointIdentificationAlgorithm
();
if
(
identityAlg
!=
null
&&
identityAlg
.
length
()
!=
0
)
{
checkIdentity
(
session
,
chain
[
0
],
identityAlg
,
isClient
,
getRequestedServerNames
(
socket
));
checkIdentity
(
session
,
chain
,
identityAlg
,
checkClientTrusted
);
}
// create the algorithm constraints
...
...
@@ -231,7 +231,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
X509Certificate
[]
trustedChain
=
null
;
if
(
isClient
)
{
if
(
checkClientTrusted
)
{
trustedChain
=
validate
(
v
,
chain
,
constraints
,
null
);
}
else
{
trustedChain
=
validate
(
v
,
chain
,
constraints
,
authType
);
...
...
@@ -242,9 +242,10 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
}
private
void
checkTrusted
(
X509Certificate
[]
chain
,
String
authType
,
SSLEngine
engine
,
boolean
isClient
)
throws
CertificateException
{
Validator
v
=
checkTrustedInit
(
chain
,
authType
,
isClient
);
private
void
checkTrusted
(
X509Certificate
[]
chain
,
String
authType
,
SSLEngine
engine
,
boolean
checkClientTrusted
)
throws
CertificateException
{
Validator
v
=
checkTrustedInit
(
chain
,
authType
,
checkClientTrusted
);
AlgorithmConstraints
constraints
=
null
;
if
(
engine
!=
null
)
{
...
...
@@ -257,8 +258,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
String
identityAlg
=
engine
.
getSSLParameters
().
getEndpointIdentificationAlgorithm
();
if
(
identityAlg
!=
null
&&
identityAlg
.
length
()
!=
0
)
{
checkIdentity
(
session
,
chain
[
0
],
identityAlg
,
isClient
,
getRequestedServerNames
(
engine
));
checkIdentity
(
session
,
chain
,
identityAlg
,
checkClientTrusted
);
}
// create the algorithm constraints
...
...
@@ -283,7 +283,7 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
X509Certificate
[]
trustedChain
=
null
;
if
(
isClient
)
{
if
(
checkClientTrusted
)
{
trustedChain
=
validate
(
v
,
chain
,
constraints
,
null
);
}
else
{
trustedChain
=
validate
(
v
,
chain
,
constraints
,
authType
);
...
...
@@ -373,13 +373,8 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
if
(
socket
!=
null
&&
socket
.
isConnected
()
&&
socket
instanceof
SSLSocket
)
{
SSLSocket
sslSocket
=
(
SSLSocket
)
socket
;
SSLSession
session
=
sslSocket
.
getHandshakeSession
();
if
(
session
!=
null
&&
(
session
instanceof
ExtendedSSLSession
))
{
ExtendedSSLSession
extSession
=
(
ExtendedSSLSession
)
session
;
return
extSession
.
getRequestedServerNames
();
}
return
getRequestedServerNames
(
((
SSLSocket
)
socket
).
getHandshakeSession
());
}
return
Collections
.<
SNIServerName
>
emptyList
();
...
...
@@ -388,12 +383,16 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
// Also used by X509KeyManagerImpl
static
List
<
SNIServerName
>
getRequestedServerNames
(
SSLEngine
engine
)
{
if
(
engine
!=
null
)
{
SSLSession
session
=
engine
.
getHandshakeSession
();
return
getRequestedServerNames
(
engine
.
getHandshakeSession
());
}
if
(
session
!=
null
&&
(
session
instanceof
ExtendedSSLSession
))
{
ExtendedSSLSession
extSession
=
(
ExtendedSSLSession
)
session
;
return
extSession
.
getRequestedServerNames
();
}
return
Collections
.<
SNIServerName
>
emptyList
();
}
private
static
List
<
SNIServerName
>
getRequestedServerNames
(
SSLSession
session
)
{
if
(
session
!=
null
&&
(
session
instanceof
ExtendedSSLSession
))
{
return
((
ExtendedSSLSession
)
session
).
getRequestedServerNames
();
}
return
Collections
.<
SNIServerName
>
emptyList
();
...
...
@@ -414,22 +413,23 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
* the identity checking aginst the server_name extension if present, and
* may failove to peer host checking.
*/
private
static
void
checkIdentity
(
SSLSession
session
,
X509Certificate
cert
,
static
void
checkIdentity
(
SSLSession
session
,
X509Certificate
[]
trustedChain
,
String
algorithm
,
boolean
isClient
,
List
<
SNIServerName
>
sniNames
)
throws
CertificateException
{
boolean
checkClientTrusted
)
throws
CertificateException
{
boolean
identifiable
=
false
;
String
peerHost
=
session
.
getPeerHost
();
if
(
isClient
)
{
String
hostname
=
getHostNameInSNI
(
sniNames
);
if
(
hostname
!=
null
)
{
if
(!
checkClientTrusted
)
{
List
<
SNIServerName
>
sniNames
=
getRequestedServerNames
(
session
);
String
sniHostName
=
getHostNameInSNI
(
sniNames
);
if
(
sniHostName
!=
null
)
{
try
{
checkIdentity
(
hostname
,
cert
,
algorithm
);
checkIdentity
(
sniHostName
,
trustedChain
[
0
],
algorithm
);
identifiable
=
true
;
}
catch
(
CertificateException
ce
)
{
if
(
hostn
ame
.
equalsIgnoreCase
(
peerHost
))
{
if
(
sniHostN
ame
.
equalsIgnoreCase
(
peerHost
))
{
throw
ce
;
}
...
...
@@ -439,7 +439,8 @@ final class X509TrustManagerImpl extends X509ExtendedTrustManager
}
if
(!
identifiable
)
{
checkIdentity
(
peerHost
,
cert
,
algorithm
);
checkIdentity
(
peerHost
,
trustedChain
[
0
],
algorithm
);
}
}
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录