1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/mobile/android/thirdparty/ch/boye/httpclientandroidlib/conn/ssl/X509HostnameVerifier.java Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,84 @@ 1.4 +/* 1.5 + * ==================================================================== 1.6 + * Licensed to the Apache Software Foundation (ASF) under one 1.7 + * or more contributor license agreements. See the NOTICE file 1.8 + * distributed with this work for additional information 1.9 + * regarding copyright ownership. The ASF licenses this file 1.10 + * to you under the Apache License, Version 2.0 (the 1.11 + * "License"); you may not use this file except in compliance 1.12 + * with the License. You may obtain a copy of the License at 1.13 + * 1.14 + * http://www.apache.org/licenses/LICENSE-2.0 1.15 + * 1.16 + * Unless required by applicable law or agreed to in writing, 1.17 + * software distributed under the License is distributed on an 1.18 + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 1.19 + * KIND, either express or implied. See the License for the 1.20 + * specific language governing permissions and limitations 1.21 + * under the License. 1.22 + * ==================================================================== 1.23 + * 1.24 + * This software consists of voluntary contributions made by many 1.25 + * individuals on behalf of the Apache Software Foundation. For more 1.26 + * information on the Apache Software Foundation, please see 1.27 + * <http://www.apache.org/>. 1.28 + * 1.29 + */ 1.30 + 1.31 +package ch.boye.httpclientandroidlib.conn.ssl; 1.32 + 1.33 +import javax.net.ssl.HostnameVerifier; 1.34 +import javax.net.ssl.SSLException; 1.35 +import javax.net.ssl.SSLSocket; 1.36 +import java.io.IOException; 1.37 +import java.security.cert.X509Certificate; 1.38 + 1.39 +/** 1.40 + * Interface for checking if a hostname matches the names stored inside the 1.41 + * server's X.509 certificate. This interface extends 1.42 + * {@link javax.net.ssl.HostnameVerifier}, but it is recommended to use 1.43 + * methods added by X509HostnameVerifier. 1.44 + * 1.45 + * @since 4.0 1.46 + */ 1.47 +public interface X509HostnameVerifier extends HostnameVerifier { 1.48 + 1.49 + /** 1.50 + * Verifies that the host name is an acceptable match with the server's 1.51 + * authentication scheme based on the given {@link SSLSocket}. 1.52 + * 1.53 + * @param host the host. 1.54 + * @param ssl the SSL socket. 1.55 + * @throws IOException if an I/O error occurs or the verification process 1.56 + * fails. 1.57 + */ 1.58 + void verify(String host, SSLSocket ssl) throws IOException; 1.59 + 1.60 + /** 1.61 + * Verifies that the host name is an acceptable match with the server's 1.62 + * authentication scheme based on the given {@link X509Certificate}. 1.63 + * 1.64 + * @param host the host. 1.65 + * @param cert the certificate. 1.66 + * @throws SSLException if the verification process fails. 1.67 + */ 1.68 + void verify(String host, X509Certificate cert) throws SSLException; 1.69 + 1.70 + /** 1.71 + * Checks to see if the supplied hostname matches any of the supplied CNs 1.72 + * or "DNS" Subject-Alts. Most implementations only look at the first CN, 1.73 + * and ignore any additional CNs. Most implementations do look at all of 1.74 + * the "DNS" Subject-Alts. The CNs or Subject-Alts may contain wildcards 1.75 + * according to RFC 2818. 1.76 + * 1.77 + * @param cns CN fields, in order, as extracted from the X.509 1.78 + * certificate. 1.79 + * @param subjectAlts Subject-Alt fields of type 2 ("DNS"), as extracted 1.80 + * from the X.509 certificate. 1.81 + * @param host The hostname to verify. 1.82 + * @throws SSLException if the verification process fails. 1.83 + */ 1.84 + void verify(String host, String[] cns, String[] subjectAlts) 1.85 + throws SSLException; 1.86 + 1.87 +}