1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
package de.torui.coflsky.websocket;
/*
* Copyright (C) 2015 Neo Visionaries Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific
* language governing permissions and limitations under the
* License.
*/
import java.security.KeyManagementException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Provider;
import java.security.cert.X509Certificate;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509TrustManager;
/**
* A factory class which creates an {@link SSLContext} that
* naively accepts all certificates without verification.
*
* <pre>
* // Create an SSL context that naively accepts all certificates.
* SSLContext context = NaiveSSLContext.getInstance("TLS");
*
* // Create a socket factory from the SSL context.
* SSLSocketFactory factory = context.getSocketFactory();
*
* // Create a socket from the socket factory.
* SSLSocket socket = factory.createSocket("www.example.com", 443);
* </pre>
*
* @author Takahiko Kawasaki
*/
public class NaiveSSLContext
{
private NaiveSSLContext()
{
}
/**
* Get an SSLContext that implements the specified secure
* socket protocol and naively accepts all certificates
* without verification.
*/
public static SSLContext getInstance(String protocol) throws NoSuchAlgorithmException
{
return init(SSLContext.getInstance(protocol));
}
/**
* Get an SSLContext that implements the specified secure
* socket protocol and naively accepts all certificates
* without verification.
*/
public static SSLContext getInstance(String protocol, Provider provider) throws NoSuchAlgorithmException
{
return init(SSLContext.getInstance(protocol, provider));
}
/**
* Get an SSLContext that implements the specified secure
* socket protocol and naively accepts all certificates
* without verification.
*/
public static SSLContext getInstance(String protocol, String provider) throws NoSuchAlgorithmException, NoSuchProviderException
{
return init(SSLContext.getInstance(protocol, provider));
}
/**
* Set NaiveTrustManager to the given context.
*/
private static SSLContext init(SSLContext context)
{
try
{
// Set NaiveTrustManager.
context.init(null, new TrustManager[] { new NaiveTrustManager() }, null);
}
catch (KeyManagementException e)
{
throw new RuntimeException("Failed to initialize an SSLContext.", e);
}
return context;
}
/**
* A {@link TrustManager} which trusts all certificates naively.
*/
private static class NaiveTrustManager implements X509TrustManager
{
@Override
public X509Certificate[] getAcceptedIssuers()
{
return null;
}
public void checkClientTrusted(X509Certificate[] certs, String authType)
{
}
public void checkServerTrusted(X509Certificate[] certs, String authType)
{
}
}
}
|