-
- All Superinterfaces:
- TrustManager
- All Known Implementing Classes:
- X509ExtendedTrustManager
public interface X509TrustManager extends TrustManager
Instance of this interface manage which X509 certificates may be used to authenticate the remote side of a secure socket. Decisions may be based on trusted certificate authorities, certificate revocation lists, online status checking or other means.- Since:
- 1.4
-
-
Method Summary
Methods Modifier and Type Method and Description void
checkClientTrusted(X509Certificate[] chain, String authType)
Given the partial or complete certificate chain provided by the peer, build a certificate path to a trusted root and return if it can be validated and is trusted for client SSL authentication based on the authentication type.void
checkServerTrusted(X509Certificate[] chain, String authType)
Given the partial or complete certificate chain provided by the peer, build a certificate path to a trusted root and return if it can be validated and is trusted for server SSL authentication based on the authentication type.X509Certificate[]
getAcceptedIssuers()
Return an array of certificate authority certificates which are trusted for authenticating peers.
-
-
-
Method Detail
-
checkClientTrusted
void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException
Given the partial or complete certificate chain provided by the peer, build a certificate path to a trusted root and return if it can be validated and is trusted for client SSL authentication based on the authentication type.The authentication type is determined by the actual certificate used. For instance, if RSAPublicKey is used, the authType should be "RSA". Checking is case-sensitive.
- Parameters:
chain
- the peer certificate chainauthType
- the authentication type based on the client certificate- Throws:
IllegalArgumentException
- if null or zero-length chain is passed in for the chain parameter or if null or zero-length string is passed in for the authType parameterCertificateException
- if the certificate chain is not trusted by this TrustManager.
-
checkServerTrusted
void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException
Given the partial or complete certificate chain provided by the peer, build a certificate path to a trusted root and return if it can be validated and is trusted for server SSL authentication based on the authentication type.The authentication type is the key exchange algorithm portion of the cipher suites represented as a String, such as "RSA", "DHE_DSS". Note: for some exportable cipher suites, the key exchange algorithm is determined at run time during the handshake. For instance, for TLS_RSA_EXPORT_WITH_RC4_40_MD5, the authType should be RSA_EXPORT when an ephemeral RSA key is used for the key exchange, and RSA when the key from the server certificate is used. Checking is case-sensitive.
- Parameters:
chain
- the peer certificate chainauthType
- the key exchange algorithm used- Throws:
IllegalArgumentException
- if null or zero-length chain is passed in for the chain parameter or if null or zero-length string is passed in for the authType parameterCertificateException
- if the certificate chain is not trusted by this TrustManager.
-
getAcceptedIssuers
X509Certificate[] getAcceptedIssuers()
Return an array of certificate authority certificates which are trusted for authenticating peers.- Returns:
- a non-null (possibly empty) array of acceptable CA issuer certificates.
-
-
Document created the 11/06/2005, last modified the 04/03/2020
Source of the printed document:https://www.gaudry.be/en/java-api-rf-javax/net/ssl/x509trustmanager.html
The infobrol is a personal site whose content is my sole responsibility. The text is available under CreativeCommons license (BY-NC-SA). More info on the terms of use and the author.
References
These references and links indicate documents consulted during the writing of this page, or which may provide additional information, but the authors of these sources can not be held responsible for the content of this page.
The author This site is solely responsible for the way in which the various concepts, and the freedoms that are taken with the reference works, are presented here. Remember that you must cross multiple source information to reduce the risk of errors.