org.apache.http.conn.ssl
Interface X509HostnameVerifier
- All Superinterfaces:
- javax.net.ssl.HostnameVerifier
- All Known Implementing Classes:
- AbstractVerifier, AllowAllHostnameVerifier, BrowserCompatHostnameVerifier, StrictHostnameVerifier
public interface X509HostnameVerifier
- extends javax.net.ssl.HostnameVerifier
Interface for checking if a hostname matches the names stored inside the
server's X.509 certificate. Implements javax.net.ssl.HostnameVerifier, but
we don't actually use that interface. Instead we added some methods that
take String parameters (instead of javax.net.ssl.HostnameVerifier's
SSLSession). JUnit is a lot easier this way! :-)
We provide the HostnameVerifier.DEFAULT, HostnameVerifier.STRICT, and
HostnameVerifier.ALLOW_ALL implementations. But feel free to define
your own implementation!
Inspired by Sebastian Hauer's original StrictSSLProtocolSocketFactory in the
HttpClient "contrib" repository.
- Since:
- 4.0 (8-Dec-2006)
- Author:
- Julius Davies, Sebastian Hauer
Method Summary |
boolean |
verify(java.lang.String host,
javax.net.ssl.SSLSession session)
|
void |
verify(java.lang.String host,
javax.net.ssl.SSLSocket ssl)
|
void |
verify(java.lang.String host,
java.lang.String[] cns,
java.lang.String[] subjectAlts)
Checks to see if the supplied hostname matches any of the supplied CNs
or "DNS" Subject-Alts. |
void |
verify(java.lang.String host,
java.security.cert.X509Certificate cert)
|
verify
boolean verify(java.lang.String host,
javax.net.ssl.SSLSession session)
- Specified by:
verify
in interface javax.net.ssl.HostnameVerifier
verify
void verify(java.lang.String host,
javax.net.ssl.SSLSocket ssl)
throws java.io.IOException
- Throws:
java.io.IOException
verify
void verify(java.lang.String host,
java.security.cert.X509Certificate cert)
throws javax.net.ssl.SSLException
- Throws:
javax.net.ssl.SSLException
verify
void verify(java.lang.String host,
java.lang.String[] cns,
java.lang.String[] subjectAlts)
throws javax.net.ssl.SSLException
- Checks to see if the supplied hostname matches any of the supplied CNs
or "DNS" Subject-Alts. Most implementations only look at the first CN,
and ignore any additional CNs. Most implementations do look at all of
the "DNS" Subject-Alts. The CNs or Subject-Alts may contain wildcards
according to RFC 2818.
- Parameters:
cns
- CN fields, in order, as extracted from the X.509
certificate.subjectAlts
- Subject-Alt fields of type 2 ("DNS"), as extracted
from the X.509 certificate.host
- The hostname to verify.
- Throws:
javax.net.ssl.SSLException
- If verification failed.
Copyright © 1999-2008 Apache Software Foundation. All Rights Reserved.