Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
8f4648f7
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
8f4648f7
编写于
5月 14, 2008
作者:
V
vinnie
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
6383078: OCSP checking does not work on end-entity certificate
Reviewed-by: mullan
上级
71cf834c
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
18 addition
and
11 deletion
+18
-11
src/share/classes/sun/security/provider/certpath/OCSPChecker.java
...e/classes/sun/security/provider/certpath/OCSPChecker.java
+18
-11
未找到文件。
src/share/classes/sun/security/provider/certpath/OCSPChecker.java
浏览文件 @
8f4648f7
...
...
@@ -102,7 +102,7 @@ class OCSPChecker extends PKIXCertPathChecker {
*/
public
void
init
(
boolean
forward
)
throws
CertPathValidatorException
{
if
(!
forward
)
{
remainingCerts
=
certs
.
length
;
remainingCerts
=
certs
.
length
+
1
;
}
else
{
throw
new
CertPathValidatorException
(
"Forward checking not supported"
);
...
...
@@ -131,14 +131,22 @@ class OCSPChecker extends PKIXCertPathChecker {
InputStream
in
=
null
;
OutputStream
out
=
null
;
// Decrement the certificate counter
remainingCerts
--;
try
{
// Examine OCSP properties
X509Certificate
responderCert
=
null
;
boolean
seekResponderCert
=
false
;
X500Principal
responderSubjectName
=
null
;
X500Principal
responderIssuerName
=
null
;
BigInteger
responderSerialNumber
=
null
;
boolean
seekIssuerCert
=
true
;
X509CertImpl
issuerCertImpl
=
null
;
X509CertImpl
currCertImpl
=
X509CertImpl
.
toImpl
((
X509Certificate
)
cert
);
/*
* OCSP security property values, in the following order:
* 1. ocsp.responderURL
...
...
@@ -148,6 +156,9 @@ class OCSPChecker extends PKIXCertPathChecker {
*/
String
[]
properties
=
getOCSPProperties
();
// Check whether OCSP is feasible before seeking cert information
URL
url
=
getOCSPServerURL
(
currCertImpl
,
properties
);
// When responder's subject name is set then the issuer/serial
// properties are ignored
if
(
properties
[
1
]
!=
null
)
{
...
...
@@ -172,14 +183,9 @@ class OCSPChecker extends PKIXCertPathChecker {
seekResponderCert
=
true
;
}
boolean
seekIssuerCert
=
true
;
X509CertImpl
issuerCertImpl
=
null
;
X509CertImpl
currCertImpl
=
X509CertImpl
.
toImpl
((
X509Certificate
)
cert
);
remainingCerts
--;
// Set the issuer certificate
if
(
remainingCerts
!=
0
)
{
// Set the issuer certificate to the next cert in the chain
// (unless we're processing the final cert).
if
(
remainingCerts
<
certs
.
length
)
{
issuerCertImpl
=
X509CertImpl
.
toImpl
(
certs
[
remainingCerts
]);
seekIssuerCert
=
false
;
// done
...
...
@@ -312,7 +318,8 @@ class OCSPChecker extends PKIXCertPathChecker {
// Construct an OCSP Request
OCSPRequest
ocspRequest
=
new
OCSPRequest
(
currCertImpl
,
issuerCertImpl
);
URL
url
=
getOCSPServerURL
(
currCertImpl
,
properties
);
// Use the URL to the OCSP service that was created earlier
HttpURLConnection
con
=
(
HttpURLConnection
)
url
.
openConnection
();
if
(
DEBUG
!=
null
)
{
DEBUG
.
println
(
"connecting to OCSP service at: "
+
url
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录