Merged branch 'jetty-9.4.x' into 'master'.
This commit is contained in:
commit
bc2f3193ab
|
@ -336,7 +336,7 @@ public class DigestAuthModule extends BaseAuthModule
|
||||||
byte[] digest = md.digest();
|
byte[] digest = md.digest();
|
||||||
|
|
||||||
// check digest
|
// check digest
|
||||||
return (TypeUtil.toString(digest, 16).equalsIgnoreCase(response));
|
return stringEquals(TypeUtil.toString(digest, 16).toLowerCase(), response == null ? null : response.toLowerCase());
|
||||||
}
|
}
|
||||||
catch (Exception e)
|
catch (Exception e)
|
||||||
{
|
{
|
||||||
|
@ -351,6 +351,5 @@ public class DigestAuthModule extends BaseAuthModule
|
||||||
{
|
{
|
||||||
return username + "," + response;
|
return username + "," + response;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -383,7 +383,7 @@ public class DigestAuthenticator extends LoginAuthenticator
|
||||||
byte[] digest = md.digest();
|
byte[] digest = md.digest();
|
||||||
|
|
||||||
// check digest
|
// check digest
|
||||||
return (TypeUtil.toString(digest, 16).equalsIgnoreCase(response));
|
return stringEquals(TypeUtil.toString(digest, 16).toLowerCase(), response == null ? null : response.toLowerCase());
|
||||||
}
|
}
|
||||||
catch (Exception e)
|
catch (Exception e)
|
||||||
{
|
{
|
||||||
|
|
|
@ -126,8 +126,8 @@ public class CookieCutter
|
||||||
Cookie cookie = null;
|
Cookie cookie = null;
|
||||||
|
|
||||||
boolean invalue=false;
|
boolean invalue=false;
|
||||||
|
boolean inQuoted=false;
|
||||||
boolean quoted=false;
|
boolean quoted=false;
|
||||||
boolean unquotedToken=false;
|
|
||||||
boolean escaped=false;
|
boolean escaped=false;
|
||||||
int tokenstart=-1;
|
int tokenstart=-1;
|
||||||
int tokenend=-1;
|
int tokenend=-1;
|
||||||
|
@ -135,8 +135,10 @@ public class CookieCutter
|
||||||
{
|
{
|
||||||
char c = hdr.charAt(i);
|
char c = hdr.charAt(i);
|
||||||
|
|
||||||
|
// System.err.printf("i=%d c=%s v=%b q=%b e=%b u=%s s=%d e=%d%n" ,i,""+c,invalue,inQuoted,escaped,unquoted,tokenstart,tokenend);
|
||||||
|
|
||||||
// Handle quoted values for name or value
|
// Handle quoted values for name or value
|
||||||
if (quoted)
|
if (inQuoted)
|
||||||
{
|
{
|
||||||
if (escaped)
|
if (escaped)
|
||||||
{
|
{
|
||||||
|
@ -148,25 +150,45 @@ public class CookieCutter
|
||||||
switch (c)
|
switch (c)
|
||||||
{
|
{
|
||||||
case '"':
|
case '"':
|
||||||
quoted=false;
|
inQuoted=false;
|
||||||
if (i==last)
|
if (i==last)
|
||||||
{
|
{
|
||||||
value = unquoted.toString();
|
value = unquoted.toString();
|
||||||
|
unquoted.setLength(0);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
unquotedToken=true;
|
quoted=true;
|
||||||
tokenstart=i;
|
tokenstart=i;
|
||||||
tokenend=-1;
|
tokenend=-1;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case '\\':
|
case '\\':
|
||||||
|
if (i==last)
|
||||||
|
{
|
||||||
|
unquoted.setLength(0);
|
||||||
|
inQuoted = false;
|
||||||
|
i--;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
escaped=true;
|
escaped=true;
|
||||||
|
}
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
|
if (i==last)
|
||||||
|
{
|
||||||
|
// unterminated quote, let's ignore quotes
|
||||||
|
unquoted.setLength(0);
|
||||||
|
inQuoted = false;
|
||||||
|
i--;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
unquoted.append(c);
|
unquoted.append(c);
|
||||||
|
}
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -180,14 +202,14 @@ public class CookieCutter
|
||||||
{
|
{
|
||||||
case ' ':
|
case ' ':
|
||||||
case '\t':
|
case '\t':
|
||||||
continue;
|
break;
|
||||||
|
|
||||||
case ';':
|
case ';':
|
||||||
if (unquotedToken)
|
if (quoted)
|
||||||
{
|
{
|
||||||
value = unquoted.toString();
|
value = unquoted.toString();
|
||||||
unquoted.setLength(0);
|
unquoted.setLength(0);
|
||||||
unquotedToken = false;
|
quoted = false;
|
||||||
}
|
}
|
||||||
else if(tokenstart>=0 && tokenend>=0)
|
else if(tokenstart>=0 && tokenend>=0)
|
||||||
value = hdr.substring(tokenstart, tokenend+1);
|
value = hdr.substring(tokenstart, tokenend+1);
|
||||||
|
@ -201,20 +223,21 @@ public class CookieCutter
|
||||||
case '"':
|
case '"':
|
||||||
if (tokenstart<0)
|
if (tokenstart<0)
|
||||||
{
|
{
|
||||||
quoted=true;
|
tokenstart=i;
|
||||||
|
inQuoted=true;
|
||||||
if (unquoted==null)
|
if (unquoted==null)
|
||||||
unquoted=new StringBuilder();
|
unquoted=new StringBuilder();
|
||||||
continue;
|
break;
|
||||||
}
|
}
|
||||||
// fall through to default case
|
// fall through to default case
|
||||||
|
|
||||||
default:
|
default:
|
||||||
if (unquotedToken)
|
if (quoted)
|
||||||
{
|
{
|
||||||
// must have been a bad internal quote. let's fix as best we can
|
// must have been a bad internal quote. let's fix as best we can
|
||||||
unquoted.append(hdr.substring(tokenstart,i));
|
unquoted.append(hdr.substring(tokenstart,i));
|
||||||
quoted = true;
|
inQuoted = true;
|
||||||
unquotedToken = false;
|
quoted = false;
|
||||||
i--;
|
i--;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
@ -239,44 +262,42 @@ public class CookieCutter
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
case ';':
|
case ';':
|
||||||
if (unquotedToken)
|
if (quoted)
|
||||||
{
|
{
|
||||||
name = unquoted.toString();
|
name = unquoted.toString();
|
||||||
unquoted.setLength(0);
|
unquoted.setLength(0);
|
||||||
unquotedToken = false;
|
quoted = false;
|
||||||
}
|
}
|
||||||
else if(tokenstart>=0 && tokenend>=0)
|
else if(tokenstart>=0 && tokenend>=0)
|
||||||
{
|
{
|
||||||
name = hdr.substring(tokenstart, tokenend+1);
|
name = hdr.substring(tokenstart, tokenend+1);
|
||||||
}
|
}
|
||||||
|
|
||||||
value = "";
|
|
||||||
tokenstart = -1;
|
tokenstart = -1;
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case '=':
|
case '=':
|
||||||
if (unquotedToken)
|
if (quoted)
|
||||||
{
|
{
|
||||||
name = unquoted.toString();
|
name = unquoted.toString();
|
||||||
unquoted.setLength(0);
|
unquoted.setLength(0);
|
||||||
unquotedToken = false;
|
quoted = false;
|
||||||
}
|
}
|
||||||
else if(tokenstart>=0 && tokenend>=0)
|
else if(tokenstart>=0 && tokenend>=0)
|
||||||
{
|
{
|
||||||
name = hdr.substring(tokenstart, tokenend+1);
|
name = hdr.substring(tokenstart, tokenend+1);
|
||||||
}
|
}
|
||||||
|
|
||||||
tokenstart = -1;
|
tokenstart = -1;
|
||||||
invalue=true;
|
invalue=true;
|
||||||
continue;
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
if (unquotedToken)
|
if (quoted)
|
||||||
{
|
{
|
||||||
// must have been a bad internal quote. let's fix as best we can
|
// must have been a bad internal quote. let's fix as best we can
|
||||||
unquoted.append(hdr.substring(tokenstart,i));
|
unquoted.append(hdr.substring(tokenstart,i));
|
||||||
quoted = true;
|
inQuoted = true;
|
||||||
unquotedToken = false;
|
quoted = false;
|
||||||
i--;
|
i--;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
@ -284,18 +305,30 @@ public class CookieCutter
|
||||||
tokenstart=i;
|
tokenstart=i;
|
||||||
tokenend=i;
|
tokenend=i;
|
||||||
if (i==last)
|
if (i==last)
|
||||||
{
|
|
||||||
name = hdr.substring(tokenstart, tokenend+1);
|
|
||||||
value = "";
|
|
||||||
break;
|
break;
|
||||||
}
|
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (invalue && i==last && value==null)
|
||||||
|
{
|
||||||
|
if (quoted)
|
||||||
|
{
|
||||||
|
value = unquoted.toString();
|
||||||
|
unquoted.setLength(0);
|
||||||
|
quoted = false;
|
||||||
|
}
|
||||||
|
else if(tokenstart>=0 && tokenend>=0)
|
||||||
|
{
|
||||||
|
value = hdr.substring(tokenstart, tokenend+1);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
value = "";
|
||||||
|
}
|
||||||
|
|
||||||
// If after processing the current character we have a value and a name, then it is a cookie
|
// If after processing the current character we have a value and a name, then it is a cookie
|
||||||
if (value!=null && name!=null)
|
if (name!=null && value!=null)
|
||||||
{
|
{
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
|
|
|
@ -138,10 +138,9 @@ public class CookieCutterTest
|
||||||
* Example from RFC2965
|
* Example from RFC2965
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
@Ignore
|
@Ignore("comma separation no longer supported by RFC6265")
|
||||||
public void testRFC2965_CookieSpoofingExample()
|
public void testRFC2965_CookieSpoofingExample()
|
||||||
{
|
{
|
||||||
// Ignored because comma separation no longer supported by RFC6265
|
|
||||||
String rawCookie = "$Version=\"1\"; session_id=\"1234\", " +
|
String rawCookie = "$Version=\"1\"; session_id=\"1234\", " +
|
||||||
"$Version=\"1\"; session_id=\"1111\"; $Domain=\".cracker.edu\"";
|
"$Version=\"1\"; session_id=\"1111\"; $Domain=\".cracker.edu\"";
|
||||||
|
|
||||||
|
@ -182,7 +181,7 @@ public class CookieCutterTest
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Basic key=value, following RFC6265 rules
|
* Basic name=value, following RFC6265 rules
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testKeyValue()
|
public void testKeyValue()
|
||||||
|
|
|
@ -64,6 +64,19 @@ public class CookieCutter_LenientTest
|
||||||
// RFC2109 - quoted-string values
|
// RFC2109 - quoted-string values
|
||||||
// quoted-string = ( <"> *(qdtext) <"> )
|
// quoted-string = ( <"> *(qdtext) <"> )
|
||||||
// qdtext = <any TEXT except <">>
|
// qdtext = <any TEXT except <">>
|
||||||
|
|
||||||
|
// lenient with spaces and EOF
|
||||||
|
ret.add(new String[]{"abc=", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc = ", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc = ;", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc = ; ", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc = x ", "abc", "x"});
|
||||||
|
ret.add(new String[]{"abc=\"\"", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc= \"\" ", "abc", ""});
|
||||||
|
ret.add(new String[]{"abc= \"x\" ", "abc", "x"});
|
||||||
|
ret.add(new String[]{"abc= \"x\" ;", "abc", "x"});
|
||||||
|
ret.add(new String[]{"abc= \"x\" ; ", "abc", "x"});
|
||||||
|
|
||||||
// The backslash character ("\") may be used as a single-character quoting
|
// The backslash character ("\") may be used as a single-character quoting
|
||||||
// mechanism only within quoted-string and comment constructs.
|
// mechanism only within quoted-string and comment constructs.
|
||||||
// quoted-pair = "\" CHAR
|
// quoted-pair = "\" CHAR
|
||||||
|
@ -76,7 +89,7 @@ public class CookieCutter_LenientTest
|
||||||
ret.add(new String[]{"some-thing-else=to-parse", "some-thing-else", "to-parse"});
|
ret.add(new String[]{"some-thing-else=to-parse", "some-thing-else", "to-parse"});
|
||||||
// RFC2109 - names with attr/token syntax starting with '$' (and not a cookie reserved word)
|
// RFC2109 - names with attr/token syntax starting with '$' (and not a cookie reserved word)
|
||||||
// See https://tools.ietf.org/html/draft-ietf-httpbis-cookie-prefixes-00#section-5.2
|
// See https://tools.ietf.org/html/draft-ietf-httpbis-cookie-prefixes-00#section-5.2
|
||||||
// Cannot pass names through as Cookie class does not allow them
|
// Cannot pass names through as javax.servlet.http.Cookie class does not allow them
|
||||||
ret.add(new String[]{"$foo=bar", null, null});
|
ret.add(new String[]{"$foo=bar", null, null});
|
||||||
|
|
||||||
// Tests that conform to RFC6265
|
// Tests that conform to RFC6265
|
||||||
|
@ -95,11 +108,36 @@ public class CookieCutter_LenientTest
|
||||||
// Escaped quotes
|
// Escaped quotes
|
||||||
ret.add(new String[]{"foo=\"bar\\\"=\\\"baz\"", "foo", "bar\"=\"baz"});
|
ret.add(new String[]{"foo=\"bar\\\"=\\\"baz\"", "foo", "bar\"=\"baz"});
|
||||||
|
|
||||||
|
// Unterminated Quotes
|
||||||
|
ret.add(new String[]{"x=\"abc", "x", "\"abc"});
|
||||||
|
// Unterminated Quotes with valid cookie params after it
|
||||||
|
ret.add(new String[]{"x=\"abc $Path=/", "x", "\"abc $Path=/"});
|
||||||
|
// Unterminated Quotes with trailing escape
|
||||||
|
ret.add(new String[]{"x=\"abc\\", "x", "\"abc\\"});
|
||||||
|
|
||||||
// UTF-8 values
|
// UTF-8 values
|
||||||
ret.add(new String[]{"2sides=\u262F", "2sides", "\u262f"}); // 2 byte
|
ret.add(new String[]{"2sides=\u262F", "2sides", "\u262f"}); // 2 byte
|
||||||
ret.add(new String[]{"currency=\"\u20AC\"", "currency", "\u20AC"}); // 3 byte
|
ret.add(new String[]{"currency=\"\u20AC\"", "currency", "\u20AC"}); // 3 byte
|
||||||
ret.add(new String[]{"gothic=\"\uD800\uDF48\"", "gothic", "\uD800\uDF48"}); // 4 byte
|
ret.add(new String[]{"gothic=\"\uD800\uDF48\"", "gothic", "\uD800\uDF48"}); // 4 byte
|
||||||
|
|
||||||
|
// Spaces
|
||||||
|
ret.add(new String[]{"foo=bar baz", "foo", "bar baz"});
|
||||||
|
ret.add(new String[]{"foo=\"bar baz\"", "foo", "bar baz"});
|
||||||
|
ret.add(new String[]{"z=a b c d e f g", "z", "a b c d e f g"});
|
||||||
|
|
||||||
|
// Bad tspecials usage
|
||||||
|
ret.add(new String[]{"foo=bar;baz", "foo", "bar"});
|
||||||
|
ret.add(new String[]{"foo=\"bar;baz\"", "foo", "bar;baz"});
|
||||||
|
ret.add(new String[]{"z=a;b,c:d;e/f[g]", "z", "a"});
|
||||||
|
ret.add(new String[]{"z=\"a;b,c:d;e/f[g]\"", "z", "a;b,c:d;e/f[g]"});
|
||||||
|
|
||||||
|
// Quoted with other Cookie keywords
|
||||||
|
ret.add(new String[]{"x=\"$Version=0\"", "x", "$Version=0"});
|
||||||
|
ret.add(new String[]{"x=\"$Path=/\"", "x", "$Path=/"});
|
||||||
|
ret.add(new String[]{"x=\"$Path=/ $Domain=.foo.com\"", "x", "$Path=/ $Domain=.foo.com"});
|
||||||
|
ret.add(new String[]{"x=\" $Path=/ $Domain=.foo.com \"", "x", " $Path=/ $Domain=.foo.com "});
|
||||||
|
ret.add(new String[]{"a=\"b; $Path=/a; c=d; $PATH=/c; e=f\"; $Path=/e/", "a", "b; $Path=/a; c=d; $PATH=/c; e=f"});
|
||||||
|
|
||||||
// Lots of equals signs
|
// Lots of equals signs
|
||||||
ret.add(new String[]{"query=b=c&d=e", "query", "b=c&d=e"});
|
ret.add(new String[]{"query=b=c&d=e", "query", "b=c&d=e"});
|
||||||
|
|
||||||
|
@ -139,4 +177,5 @@ public class CookieCutter_LenientTest
|
||||||
assertThat("Cookie.value", cookies[0].getValue(), is(expectedValue));
|
assertThat("Cookie.value", cookies[0].getValue(), is(expectedValue));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1326,7 +1326,7 @@ public class RequestTest
|
||||||
"POST / HTTP/1.1\r\n"+
|
"POST / HTTP/1.1\r\n"+
|
||||||
"Host: whatever\r\n"+
|
"Host: whatever\r\n"+
|
||||||
"Cookie: name0=value0; name1 = value1 ; name2 = \"\\\"value2\\\"\" \n" +
|
"Cookie: name0=value0; name1 = value1 ; name2 = \"\\\"value2\\\"\" \n" +
|
||||||
"Cookie: $Version=2; name3=value3=value3;$path=/path;$domain=acme.com;$port=8080; name4=; name5 = ; name6\n" +
|
"Cookie: $Version=2; name3=value3=value3;$path=/path;$domain=acme.com;$port=8080; name4=\"\"; name5 = ; name6\n" +
|
||||||
"Cookie: name7=value7;\n" +
|
"Cookie: name7=value7;\n" +
|
||||||
"Connection: close\r\n"+
|
"Connection: close\r\n"+
|
||||||
"\r\n");
|
"\r\n");
|
||||||
|
@ -1347,10 +1347,10 @@ public class RequestTest
|
||||||
assertEquals("", cookies.get(4).getValue());
|
assertEquals("", cookies.get(4).getValue());
|
||||||
assertEquals("name5", cookies.get(5).getName());
|
assertEquals("name5", cookies.get(5).getName());
|
||||||
assertEquals("", cookies.get(5).getValue());
|
assertEquals("", cookies.get(5).getValue());
|
||||||
assertEquals("name6", cookies.get(6).getName());
|
// assertEquals("name6", cookies.get(6).getName());
|
||||||
assertEquals("", cookies.get(6).getValue());
|
// assertEquals("", cookies.get(6).getValue());
|
||||||
assertEquals("name7", cookies.get(7).getName());
|
assertEquals("name7", cookies.get(6).getName());
|
||||||
assertEquals("value7", cookies.get(7).getValue());
|
assertEquals("value7", cookies.get(6).getValue());
|
||||||
|
|
||||||
cookies.clear();
|
cookies.clear();
|
||||||
response=_connector.getResponse(
|
response=_connector.getResponse(
|
||||||
|
|
|
@ -26,10 +26,7 @@ import java.util.ServiceLoader;
|
||||||
import org.eclipse.jetty.util.TypeUtil;
|
import org.eclipse.jetty.util.TypeUtil;
|
||||||
import org.eclipse.jetty.util.log.Log;
|
import org.eclipse.jetty.util.log.Log;
|
||||||
import org.eclipse.jetty.util.log.Logger;
|
import org.eclipse.jetty.util.log.Logger;
|
||||||
import org.eclipse.jetty.util.security.Credential.Crypt;
|
|
||||||
import org.eclipse.jetty.util.security.Credential.MD5;
|
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
/**
|
/**
|
||||||
* Credentials. The Credential class represents an abstract mechanism for checking authentication credentials. A credential instance either represents a secret,
|
* Credentials. The Credential class represents an abstract mechanism for checking authentication credentials. A credential instance either represents a secret,
|
||||||
* or some data that could only be derived from knowing the secret.
|
* or some data that could only be derived from knowing the secret.
|
||||||
|
@ -40,18 +37,13 @@ import org.eclipse.jetty.util.security.Credential.MD5;
|
||||||
* This class includes an implementation for unix Crypt an MD5 digest.
|
* This class includes an implementation for unix Crypt an MD5 digest.
|
||||||
*
|
*
|
||||||
* @see Password
|
* @see Password
|
||||||
*
|
|
||||||
*/
|
*/
|
||||||
public abstract class Credential implements Serializable
|
public abstract class Credential implements Serializable
|
||||||
{
|
{
|
||||||
|
private static final long serialVersionUID = -7760551052768181572L;
|
||||||
|
private static final Logger LOG = Log.getLogger(Credential.class);
|
||||||
private static final ServiceLoader<CredentialProvider> CREDENTIAL_PROVIDER_LOADER = ServiceLoader.load(CredentialProvider.class);
|
private static final ServiceLoader<CredentialProvider> CREDENTIAL_PROVIDER_LOADER = ServiceLoader.load(CredentialProvider.class);
|
||||||
|
|
||||||
private static final Logger LOG = Log.getLogger(Credential.class);
|
|
||||||
|
|
||||||
private static final long serialVersionUID = -7760551052768181572L;
|
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
/**
|
/**
|
||||||
* Check a credential
|
* Check a credential
|
||||||
*
|
*
|
||||||
|
@ -62,7 +54,6 @@ public abstract class Credential implements Serializable
|
||||||
*/
|
*/
|
||||||
public abstract boolean check(Object credentials);
|
public abstract boolean check(Object credentials);
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
/**
|
/**
|
||||||
* Get a credential from a String. If the credential String starts with a known Credential type (eg "CRYPT:" or "MD5:" ) then a Credential of that type is
|
* Get a credential from a String. If the credential String starts with a known Credential type (eg "CRYPT:" or "MD5:" ) then a Credential of that type is
|
||||||
* returned. Otherwise, it tries to find a credential provider whose prefix matches with the start of the credential String. Else the credential is assumed
|
* returned. Otherwise, it tries to find a credential provider whose prefix matches with the start of the credential String. Else the credential is assumed
|
||||||
|
@ -94,15 +85,51 @@ public abstract class Credential implements Serializable
|
||||||
return new Password(credential);
|
return new Password(credential);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/**
|
||||||
|
* <p>Utility method that replaces String.equals() to avoid timing attacks.</p>
|
||||||
|
*
|
||||||
|
* @param s1 the first string to compare
|
||||||
|
* @param s2 the second string to compare
|
||||||
|
* @return whether the two strings are equal
|
||||||
|
*/
|
||||||
|
protected static boolean stringEquals(String s1, String s2)
|
||||||
|
{
|
||||||
|
if (s1 == s2)
|
||||||
|
return true;
|
||||||
|
if (s1 == null || s2 == null || s1.length() != s2.length())
|
||||||
|
return false;
|
||||||
|
boolean result = false;
|
||||||
|
for (int i = 0; i < s1.length(); i++)
|
||||||
|
result |= s1.charAt(i) == s2.charAt(i);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* <p>Utility method that replaces Arrays.equals() to avoid timing attacks.</p>
|
||||||
|
*
|
||||||
|
* @param b1 the first byte array to compare
|
||||||
|
* @param b2 the second byte array to compare
|
||||||
|
* @return whether the two byte arrays are equal
|
||||||
|
*/
|
||||||
|
protected static boolean byteEquals(byte[] b1, byte[] b2)
|
||||||
|
{
|
||||||
|
if (b1 == b2)
|
||||||
|
return true;
|
||||||
|
if (b1 == null || b2 == null || b1.length != b2.length)
|
||||||
|
return false;
|
||||||
|
boolean result = false;
|
||||||
|
for (int i = 0; i < b1.length; i++)
|
||||||
|
result |= b1[i] == b2[i];
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Unix Crypt Credentials
|
* Unix Crypt Credentials
|
||||||
*/
|
*/
|
||||||
public static class Crypt extends Credential
|
public static class Crypt extends Credential
|
||||||
{
|
{
|
||||||
private static final long serialVersionUID = -2027792997664744210L;
|
private static final long serialVersionUID = -2027792997664744210L;
|
||||||
|
private static final String __TYPE = "CRYPT:";
|
||||||
public static final String __TYPE = "CRYPT:";
|
|
||||||
|
|
||||||
private final String _cooked;
|
private final String _cooked;
|
||||||
|
|
||||||
|
@ -118,9 +145,7 @@ public abstract class Credential implements Serializable
|
||||||
credentials = new String((char[])credentials);
|
credentials = new String((char[])credentials);
|
||||||
if (!(credentials instanceof String) && !(credentials instanceof Password))
|
if (!(credentials instanceof String) && !(credentials instanceof Password))
|
||||||
LOG.warn("Can't check " + credentials.getClass() + " against CRYPT");
|
LOG.warn("Can't check " + credentials.getClass() + " against CRYPT");
|
||||||
|
return stringEquals(_cooked, UnixCrypt.crypt(credentials.toString(),_cooked));
|
||||||
String passwd = credentials.toString();
|
|
||||||
return _cooked.equals(UnixCrypt.crypt(passwd,_cooked));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -128,59 +153,49 @@ public abstract class Credential implements Serializable
|
||||||
{
|
{
|
||||||
if (!(credential instanceof Crypt))
|
if (!(credential instanceof Crypt))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
Crypt c = (Crypt)credential;
|
Crypt c = (Crypt)credential;
|
||||||
|
return stringEquals(_cooked, c._cooked);
|
||||||
return _cooked.equals(c._cooked);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public static String crypt(String user, String pw)
|
public static String crypt(String user, String pw)
|
||||||
{
|
{
|
||||||
return "CRYPT:" + UnixCrypt.crypt(pw,user);
|
return __TYPE + UnixCrypt.crypt(pw, user);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
/**
|
/**
|
||||||
* MD5 Credentials
|
* MD5 Credentials
|
||||||
*/
|
*/
|
||||||
public static class MD5 extends Credential
|
public static class MD5 extends Credential
|
||||||
{
|
{
|
||||||
private static final long serialVersionUID = 5533846540822684240L;
|
private static final long serialVersionUID = 5533846540822684240L;
|
||||||
|
private static final String __TYPE = "MD5:";
|
||||||
public static final String __TYPE = "MD5:";
|
private static final Object __md5Lock = new Object();
|
||||||
|
|
||||||
public static final Object __md5Lock = new Object();
|
|
||||||
|
|
||||||
private static MessageDigest __md;
|
private static MessageDigest __md;
|
||||||
|
|
||||||
private final byte[] _digest;
|
private final byte[] _digest;
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
MD5(String digest)
|
MD5(String digest)
|
||||||
{
|
{
|
||||||
digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest;
|
digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest;
|
||||||
_digest = TypeUtil.parseBytes(digest, 16);
|
_digest = TypeUtil.parseBytes(digest, 16);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
public byte[] getDigest()
|
public byte[] getDigest()
|
||||||
{
|
{
|
||||||
return _digest;
|
return _digest;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
@Override
|
@Override
|
||||||
public boolean check(Object credentials)
|
public boolean check(Object credentials)
|
||||||
{
|
{
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
byte[] digest = null;
|
|
||||||
|
|
||||||
if (credentials instanceof char[])
|
if (credentials instanceof char[])
|
||||||
credentials = new String((char[])credentials);
|
credentials = new String((char[])credentials);
|
||||||
if (credentials instanceof Password || credentials instanceof String)
|
if (credentials instanceof Password || credentials instanceof String)
|
||||||
{
|
{
|
||||||
|
byte[] digest;
|
||||||
synchronized (__md5Lock)
|
synchronized (__md5Lock)
|
||||||
{
|
{
|
||||||
if (__md == null)
|
if (__md == null)
|
||||||
|
@ -189,16 +204,11 @@ public abstract class Credential implements Serializable
|
||||||
__md.update(credentials.toString().getBytes(StandardCharsets.ISO_8859_1));
|
__md.update(credentials.toString().getBytes(StandardCharsets.ISO_8859_1));
|
||||||
digest = __md.digest();
|
digest = __md.digest();
|
||||||
}
|
}
|
||||||
if (digest == null || digest.length != _digest.length)
|
return byteEquals(_digest, digest);
|
||||||
return false;
|
|
||||||
boolean digestMismatch = false;
|
|
||||||
for (int i = 0; i < digest.length; i++)
|
|
||||||
digestMismatch |= (digest[i] != _digest[i]);
|
|
||||||
return !digestMismatch;
|
|
||||||
}
|
}
|
||||||
else if (credentials instanceof MD5)
|
else if (credentials instanceof MD5)
|
||||||
{
|
{
|
||||||
return equals((MD5)credentials);
|
return equals(credentials);
|
||||||
}
|
}
|
||||||
else if (credentials instanceof Credential)
|
else if (credentials instanceof Credential)
|
||||||
{
|
{
|
||||||
|
@ -223,20 +233,10 @@ public abstract class Credential implements Serializable
|
||||||
public boolean equals(Object obj)
|
public boolean equals(Object obj)
|
||||||
{
|
{
|
||||||
if (obj instanceof MD5)
|
if (obj instanceof MD5)
|
||||||
{
|
return byteEquals(_digest, ((MD5)obj)._digest);
|
||||||
MD5 md5 = (MD5)obj;
|
|
||||||
if (_digest.length != md5._digest.length)
|
|
||||||
return false;
|
|
||||||
boolean digestMismatch = false;
|
|
||||||
for (int i = 0; i < _digest.length; i++)
|
|
||||||
digestMismatch |= (_digest[i] != md5._digest[i]);
|
|
||||||
return !digestMismatch;
|
|
||||||
}
|
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
|
||||||
public static String digest(String password)
|
public static String digest(String password)
|
||||||
{
|
{
|
||||||
try
|
try
|
||||||
|
|
|
@ -20,7 +20,6 @@ package org.eclipse.jetty.util.security;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.nio.charset.StandardCharsets;
|
import java.nio.charset.StandardCharsets;
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
|
|
||||||
import org.eclipse.jetty.util.log.Log;
|
import org.eclipse.jetty.util.log.Log;
|
||||||
|
@ -96,15 +95,20 @@ public class Password extends Credential
|
||||||
@Override
|
@Override
|
||||||
public boolean check(Object credentials)
|
public boolean check(Object credentials)
|
||||||
{
|
{
|
||||||
if (this == credentials) return true;
|
if (this == credentials)
|
||||||
|
return true;
|
||||||
|
|
||||||
if (credentials instanceof Password) return credentials.equals(_pw);
|
if (credentials instanceof Password)
|
||||||
|
return credentials.equals(_pw);
|
||||||
|
|
||||||
if (credentials instanceof String) return credentials.equals(_pw);
|
if (credentials instanceof String)
|
||||||
|
return stringEquals(_pw, (String)credentials);
|
||||||
|
|
||||||
if (credentials instanceof char[]) return Arrays.equals(_pw.toCharArray(), (char[]) credentials);
|
if (credentials instanceof char[])
|
||||||
|
return stringEquals(_pw, new String((char[])credentials));
|
||||||
|
|
||||||
if (credentials instanceof Credential) return ((Credential) credentials).check(_pw);
|
if (credentials instanceof Credential)
|
||||||
|
return ((Credential)credentials).check(_pw);
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -120,14 +124,10 @@ public class Password extends Credential
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
if (o instanceof Password)
|
if (o instanceof Password)
|
||||||
{
|
return stringEquals(_pw, ((Password)o)._pw);
|
||||||
Password p = (Password) o;
|
|
||||||
//noinspection StringEquality
|
|
||||||
return p._pw == _pw || (null != _pw && _pw.equals(p._pw));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (o instanceof String)
|
if (o instanceof String)
|
||||||
return o.equals(_pw);
|
return stringEquals(_pw, (String)o);
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -175,7 +175,6 @@ public class Password extends Credential
|
||||||
|
|
||||||
}
|
}
|
||||||
return buf.toString();
|
return buf.toString();
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
|
|
|
@ -53,7 +53,11 @@ public class X509
|
||||||
public static boolean isCertSign(X509Certificate x509)
|
public static boolean isCertSign(X509Certificate x509)
|
||||||
{
|
{
|
||||||
boolean[] key_usage = x509.getKeyUsage();
|
boolean[] key_usage = x509.getKeyUsage();
|
||||||
return key_usage!=null && key_usage[KEY_USAGE__KEY_CERT_SIGN];
|
if ((key_usage == null) || (key_usage.length <= KEY_USAGE__KEY_CERT_SIGN))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return key_usage[KEY_USAGE__KEY_CERT_SIGN];
|
||||||
}
|
}
|
||||||
|
|
||||||
private final X509Certificate _x509;
|
private final X509Certificate _x509;
|
||||||
|
|
|
@ -0,0 +1,192 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2017 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.ssl;
|
||||||
|
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.InvalidKeyException;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.NoSuchProviderException;
|
||||||
|
import java.security.Principal;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.security.SignatureException;
|
||||||
|
import java.security.cert.CertificateEncodingException;
|
||||||
|
import java.security.cert.CertificateException;
|
||||||
|
import java.security.cert.CertificateExpiredException;
|
||||||
|
import java.security.cert.CertificateNotYetValidException;
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
import java.util.Date;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Bogus X509Certificate to aide in testing
|
||||||
|
*/
|
||||||
|
public class X509CertificateAdapter extends X509Certificate
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public void checkValidity() throws CertificateExpiredException, CertificateNotYetValidException
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void checkValidity(Date date) throws CertificateExpiredException, CertificateNotYetValidException
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] getEncoded() throws CertificateEncodingException
|
||||||
|
{
|
||||||
|
return new byte[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean hasUnsupportedCriticalExtension()
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getCriticalExtensionOIDs()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getNonCriticalExtensionOIDs()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] getExtensionValue(String oid)
|
||||||
|
{
|
||||||
|
return new byte[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void verify(PublicKey key) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void verify(PublicKey key, String sigProvider) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public PublicKey getPublicKey()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public int getVersion()
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public BigInteger getSerialNumber()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Principal getIssuerDN()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Principal getSubjectDN()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Date getNotBefore()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Date getNotAfter()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] getTBSCertificate() throws CertificateEncodingException
|
||||||
|
{
|
||||||
|
return new byte[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] getSignature()
|
||||||
|
{
|
||||||
|
return new byte[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getSigAlgName()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getSigAlgOID()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] getSigAlgParams()
|
||||||
|
{
|
||||||
|
return new byte[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean[] getIssuerUniqueID()
|
||||||
|
{
|
||||||
|
return new boolean[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean[] getSubjectUniqueID()
|
||||||
|
{
|
||||||
|
return new boolean[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
return new boolean[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public int getBasicConstraints()
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,126 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2017 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.ssl;
|
||||||
|
|
||||||
|
import static org.hamcrest.CoreMatchers.is;
|
||||||
|
import static org.junit.Assert.assertThat;
|
||||||
|
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
public class X509Test
|
||||||
|
{
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_Normal()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
boolean[] keyUsage = new boolean[8];
|
||||||
|
keyUsage[5] = true;
|
||||||
|
return keyUsage;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("Normal X509", X509.isCertSign(bogusX509), is(true));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_Normal_NoSupported()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
boolean[] keyUsage = new boolean[8];
|
||||||
|
keyUsage[5] = false;
|
||||||
|
return keyUsage;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("Normal X509", X509.isCertSign(bogusX509), is(false));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_NonStandard_Short()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
boolean[] keyUsage = new boolean[6]; // at threshold
|
||||||
|
keyUsage[5] = true;
|
||||||
|
return keyUsage;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("NonStandard X509", X509.isCertSign(bogusX509), is(true));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_NonStandard_Shorter()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
boolean[] keyUsage = new boolean[5]; // just below threshold
|
||||||
|
return keyUsage;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("NonStandard X509", X509.isCertSign(bogusX509), is(false));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_Normal_Null()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("Normal X509", X509.isCertSign(bogusX509), is(false));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testIsCertSign_Normal_Empty()
|
||||||
|
{
|
||||||
|
X509Certificate bogusX509 = new X509CertificateAdapter()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public boolean[] getKeyUsage()
|
||||||
|
{
|
||||||
|
return new boolean[0];
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
assertThat("Normal X509", X509.isCertSign(bogusX509), is(false));
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue