Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
Openfire
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
Openfire
Commits
81d23401
Commit
81d23401
authored
Nov 03, 2014
by
Dele Olajide
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Upgrade bouncycstle from 1.50 to 1.51
parent
b41dc3f6
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
30 additions
and
24 deletions
+30
-24
versions.txt
build/lib/versions.txt
+3
-3
OCSPChecker.java
src/java/org/jivesoftware/openfire/net/OCSPChecker.java
+25
-20
CertificateManager.java
src/java/org/jivesoftware/util/CertificateManager.java
+2
-1
No files found.
build/lib/versions.txt
View file @
81d23401
...
...
@@ -3,9 +3,9 @@ Name | Version
ant.jar | Jetty 6.1.0 (1.6.5) | Apache 2.0
ant-contrib.jar | 1.0b1 | Apache 2.0
ant-subdirtask.jar | Revision 1.4 (CVS) |
bcpg-jdk15on.jar | 1.5
0
| See http://www.bouncycastle.org/licence.html
bcpkix-jdk15on.jar | 1.5
0
| See http://www.bouncycastle.org/licence.html
bcprov-jdk15on.jar | 1.5
0
| See http://www.bouncycastle.org/licence.html
bcpg-jdk15on.jar | 1.5
1
| See http://www.bouncycastle.org/licence.html
bcpkix-jdk15on.jar | 1.5
1
| See http://www.bouncycastle.org/licence.html
bcprov-jdk15on.jar | 1.5
1
| See http://www.bouncycastle.org/licence.html
cglib.jar | 2.1.3 (JMock 2.1.0) |
commons-lang.jar | 2.3 | Apache 2.0
commons-logging.jar | Jetty 5.1.10 | Apache 2.0
...
...
src/java/org/jivesoftware/openfire/net/OCSPChecker.java
View file @
81d23401
...
...
@@ -32,6 +32,7 @@ import java.security.cert.PKIXParameters;
import
java.security.cert.TrustAnchor
;
import
java.security.cert.X509CertSelector
;
import
java.security.cert.X509Certificate
;
import
java.util.Collection
;
import
java.util.Collections
;
import
java.util.Iterator
;
...
...
@@ -40,21 +41,25 @@ import java.util.Set;
import
javax.security.auth.x500.X500Principal
;
import
org.bouncycastle.ocsp.BasicOCSPResp
;
import
org.bouncycastle.ocsp.CertificateID
;
import
org.bouncycastle.ocsp.CertificateStatus
;
import
org.bouncycastle.ocsp.OCSPReq
;
import
org.bouncycastle.ocsp.OCSPReqGenerator
;
import
org.bouncycastle.ocsp.OCSPResp
;
import
org.bouncycastle.ocsp.SingleResp
;
import
org.bouncycastle.cert.ocsp.BasicOCSPResp
;
import
org.bouncycastle.cert.ocsp.CertificateID
;
import
org.bouncycastle.cert.ocsp.CertificateStatus
;
import
org.bouncycastle.cert.ocsp.OCSPReq
;
import
org.bouncycastle.cert.ocsp.OCSPReqBuilder
;
import
org.bouncycastle.cert.ocsp.OCSPResp
;
import
org.bouncycastle.cert.ocsp.SingleResp
;
import
org.bouncycastle.cert.X509CertificateHolder
;
import
org.bouncycastle.operator.jcajce.JcaDigestCalculatorProviderBuilder
;
import
org.bouncycastle.operator.jcajce.JcaContentVerifierProviderBuilder
;
import
org.jivesoftware.util.JiveGlobals
;
import
org.slf4j.Logger
;
import
org.slf4j.LoggerFactory
;
/**
* A <code>PKIXCertPathChecker</code> that uses
* Online Certificate Status Protocol (OCSP)
*
* A <code>PKIXCertPathChecker</code> that uses
* Online Certificate Status Protocol (OCSP)
*
* See <a href="http://www.ietf.org/rfc/rfc2560.txt">RFC 2560</a>.
*
* @author Jay Kline
...
...
@@ -185,7 +190,7 @@ public class OCSPChecker extends PKIXCertPathChecker {
}
}
}
if
(
issuerCert
==
null
)
{
//No trust anchor was found matching the issuer
throw
new
CertPathValidatorException
(
"No trusted certificate for "
+
currCert
.
getIssuerDN
());
...
...
@@ -194,11 +199,11 @@ public class OCSPChecker extends PKIXCertPathChecker {
// Check cert stores if responder cert has not yet been found
if
(!
haveResponderCert
)
{
Log
.
debug
(
"OCSPChecker: Searching cert stores for responder's certificate"
);
if
(
responderSubjectName
!=
null
)
{
X509CertSelector
filter
=
new
X509CertSelector
();
filter
.
setSubject
(
responderSubjectName
.
getName
());
List
<
CertStore
>
certStores
=
pkixParams
.
getCertStores
();
for
(
CertStore
certStore
:
certStores
)
{
Iterator
i
=
certStore
.
getCertificates
(
filter
).
iterator
();
...
...
@@ -218,11 +223,11 @@ public class OCSPChecker extends PKIXCertPathChecker {
}
// Construct an OCSP Request
OCSPReq
Generator
gen
=
new
OCSPReqGenerato
r
();
OCSPReq
Builder
gen
=
new
OCSPReqBuilde
r
();
CertificateID
certID
=
new
CertificateID
(
CertificateID
.
HASH_SHA1
,
issuerCert
,
currCert
.
getSerialNumber
());
CertificateID
certID
=
new
CertificateID
(
new
JcaDigestCalculatorProviderBuilder
().
setProvider
(
"BC"
).
build
().
get
(
CertificateID
.
HASH_SHA1
),
new
X509CertificateHolder
(
issuerCert
.
getEncoded
())
,
currCert
.
getSerialNumber
());
gen
.
addRequest
(
certID
);
OCSPReq
ocspRequest
=
gen
.
generate
();
OCSPReq
ocspRequest
=
gen
.
build
();
URL
url
;
...
...
@@ -261,10 +266,10 @@ public class OCSPChecker extends PKIXCertPathChecker {
BigInteger
serialNumber
=
currCert
.
getSerialNumber
();
BasicOCSPResp
brep
=
(
BasicOCSPResp
)
ocspResponse
.
getResponseObject
();
try
{
if
(
!
brep
.
verify
(
responderCert
.
getPublicKey
(),
"BC"
))
{
if
(
!
brep
.
isSignatureValid
(
new
JcaContentVerifierProviderBuilder
().
setProvider
(
"BC"
).
build
(
responderCert
.
getPublicKey
())
))
{
throw
new
CertPathValidatorException
(
"OCSP response is not verified"
);
}
}
catch
(
NoSuchProvider
Exception
e
)
{
}
catch
(
Exception
e
)
{
throw
new
CertPathValidatorException
(
"OCSP response could not be verified ("
+
e
.
getMessage
()+
")"
,
null
,
cp
,
certIndex
);
}
SingleResp
[]
singleResp
=
brep
.
getResponses
();
...
...
@@ -278,11 +283,11 @@ public class OCSPChecker extends PKIXCertPathChecker {
serialNumber
.
toString
()
+
") is: good"
);
foundResponse
=
true
;
break
;
}
else
if
(
status
instanceof
org
.
bouncycastle
.
ocsp
.
RevokedStatus
)
{
}
else
if
(
status
instanceof
org
.
bouncycastle
.
cert
.
ocsp
.
RevokedStatus
)
{
Log
.
debug
(
"OCSPChecker: Status of certificate (with serial number "
+
serialNumber
.
toString
()
+
") is: revoked"
);
throw
new
CertPathValidatorException
(
"Certificate has been revoked"
,
null
,
cp
,
certIndex
);
}
else
if
(
status
instanceof
org
.
bouncycastle
.
ocsp
.
UnknownStatus
)
{
}
else
if
(
status
instanceof
org
.
bouncycastle
.
cert
.
ocsp
.
UnknownStatus
)
{
Log
.
debug
(
"OCSPChecker: Status of certificate (with serial number "
+
serialNumber
.
toString
()
+
") is: unknown"
);
throw
new
CertPathValidatorException
(
"Certificate's revocation status is unknown"
,
null
,
cp
,
certIndex
);
...
...
src/java/org/jivesoftware/util/CertificateManager.java
View file @
81d23401
...
...
@@ -72,6 +72,7 @@ import org.bouncycastle.asn1.ASN1InputStream;
import
org.bouncycastle.asn1.ASN1TaggedObject
;
import
org.bouncycastle.asn1.ASN1Encodable
;
import
org.bouncycastle.asn1.DERSequence
;
import
org.bouncycastle.asn1.ASN1ObjectIdentifier
;
import
org.bouncycastle.asn1.DERObjectIdentifier
;
import
org.bouncycastle.asn1.DEROutputStream
;
import
org.bouncycastle.asn1.ASN1Sequence
;
...
...
@@ -386,7 +387,7 @@ public class CertificateManager {
ASN1Sequence
otherNameSeq
=
(
ASN1Sequence
)
decoder
.
readObject
();
// Check the object identifier
DERObjectIdentifier
objectId
=
(
DER
ObjectIdentifier
)
otherNameSeq
.
getObjectAt
(
0
);
ASN1ObjectIdentifier
objectId
=
(
ASN1
ObjectIdentifier
)
otherNameSeq
.
getObjectAt
(
0
);
Log
.
debug
(
"Parsing otherName for subject alternative names: "
+
objectId
.
toString
()
);
if
(
!
OTHERNAME_XMPP_OID
.
equals
(
objectId
.
getId
()))
{
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment