1 /* 2 * Copyright (C) 2012 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package android.net.http; 18 19 import android.annotation.SystemApi; 20 import android.security.net.config.UserCertificateSource; 21 22 import com.android.org.conscrypt.TrustManagerImpl; 23 24 import java.lang.reflect.Field; 25 import java.lang.reflect.InvocationTargetException; 26 import java.lang.reflect.Method; 27 import java.security.cert.CertificateException; 28 import java.security.cert.X509Certificate; 29 import java.util.List; 30 31 import javax.net.ssl.X509TrustManager; 32 33 /** 34 * X509TrustManager wrapper exposing Android-added features. 35 * <p> 36 * The checkServerTrusted method allows callers to perform additional 37 * verification of certificate chains after they have been successfully verified 38 * by the platform. 39 * </p> 40 */ 41 public class X509TrustManagerExtensions { 42 43 private final TrustManagerImpl mDelegate; 44 // Methods to use when mDelegate is not a TrustManagerImpl and duck typing is being used. 45 private final X509TrustManager mTrustManager; 46 private final Method mCheckServerTrusted; 47 private final Method mIsSameTrustConfiguration; 48 49 /** 50 * Constructs a new X509TrustManagerExtensions wrapper. 51 * 52 * @param tm A {@link X509TrustManager} as returned by TrustManagerFactory.getInstance(); 53 * @throws IllegalArgumentException If tm is an unsupported TrustManager type. 54 */ 55 public X509TrustManagerExtensions(X509TrustManager tm) throws IllegalArgumentException { 56 if (tm instanceof TrustManagerImpl) { 57 mDelegate = (TrustManagerImpl) tm; 58 mTrustManager = null; 59 mCheckServerTrusted = null; 60 mIsSameTrustConfiguration = null; 61 return; 62 } 63 // Use duck typing if possible. 64 mDelegate = null; 65 mTrustManager = tm; 66 // Check that the hostname aware checkServerTrusted is present. 67 try { 68 mCheckServerTrusted = tm.getClass().getMethod("checkServerTrusted", 69 X509Certificate[].class, 70 String.class, 71 String.class); 72 } catch (NoSuchMethodException e) { 73 throw new IllegalArgumentException("Required method" 74 + " checkServerTrusted(X509Certificate[], String, String, String) missing"); 75 } 76 // Get the option isSameTrustConfiguration method. 77 Method isSameTrustConfiguration = null; 78 try { 79 isSameTrustConfiguration = tm.getClass().getMethod("isSameTrustConfiguration", 80 String.class, 81 String.class); 82 } catch (ReflectiveOperationException ignored) { 83 } 84 mIsSameTrustConfiguration = isSameTrustConfiguration; 85 } 86 87 /** 88 * Verifies the given certificate chain. 89 * 90 * <p>See {@link X509TrustManager#checkServerTrusted(X509Certificate[], String)} for a 91 * description of the chain and authType parameters. The final parameter, host, should be the 92 * hostname of the server.</p> 93 * 94 * @throws CertificateException if the chain does not verify correctly. 95 * @return the properly ordered chain used for verification as a list of X509Certificates. 96 */ 97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, 98 String host) throws CertificateException { 99 if (mDelegate != null) { 100 return mDelegate.checkServerTrusted(chain, authType, host); 101 } else { 102 try { 103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, 104 authType, host); 105 } catch (IllegalAccessException e) { 106 throw new CertificateException("Failed to call checkServerTrusted", e); 107 } catch (InvocationTargetException e) { 108 if (e.getCause() instanceof CertificateException) { 109 throw (CertificateException) e.getCause(); 110 } 111 if (e.getCause() instanceof RuntimeException) { 112 throw (RuntimeException) e.getCause(); 113 } 114 throw new CertificateException("checkServerTrusted failed", e.getCause()); 115 } 116 } 117 } 118 119 /** 120 * Checks whether a CA certificate is added by an user. 121 * 122 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to 123 * chain up to user-added CA certificates, this method can be used to perform additional 124 * policies for user-added CA certificates. 125 * 126 * @return {@code true} to indicate that the certificate authority exists in the user added 127 * certificate store, {@code false} otherwise. 128 */ 129 public boolean isUserAddedCertificate(X509Certificate cert) { 130 return UserCertificateSource.getInstance().findBySubjectAndPublicKey(cert) != null; 131 } 132 133 /** 134 * Returns {@code true} if the TrustManager uses the same trust configuration for the provided 135 * hostnames. 136 * 137 * @hide 138 */ 139 @SystemApi 140 public boolean isSameTrustConfiguration(String hostname1, String hostname2) { 141 if (mIsSameTrustConfiguration == null) { 142 return true; 143 } 144 try { 145 return (Boolean) mIsSameTrustConfiguration.invoke(mTrustManager, hostname1, hostname2); 146 } catch (IllegalAccessException e) { 147 throw new RuntimeException("Failed to call isSameTrustConfiguration", e); 148 } catch (InvocationTargetException e) { 149 if (e.getCause() instanceof RuntimeException) { 150 throw (RuntimeException) e.getCause(); 151 } else { 152 throw new RuntimeException("isSameTrustConfiguration failed", e.getCause()); 153 } 154 } 155 } 156 } 157