@Override public boolean verify(String hostname, SSLSession session) { return hostnameVerifier.verify(hostname, session); } }
@Override public boolean verify(final String str, final SSLSession sslSession) { return delegate.verify(tHostname, sslSession); } };
@Override public boolean verify(String hostname, SSLSession session) { if (trustedHostname.equalsIgnoreCase(hostname)) { return true; } return delegate.verify(hostname, session); } }
@Override public boolean verify(String hostname, SSLSession session) { try { String principalName = session.getPeerPrincipal().getName(); if (hostname.equals(requestHostname) && principalName.equals(certPrincipalName)) return true; } catch (SSLPeerUnverifiedException e) { } return HttpsURLConnection.getDefaultHostnameVerifier().verify(hostname, session); } };
private void handleHandshakeFinished() { // Apply a custom host verifier if present. Do it for both handshaking and re-handshaking. if (customHostnameVerifier != null && !customHostnameVerifier.verify(serverHost, sslEngine.getSession())) { handleSslError(new SSLException("Server host name verification using " + customHostnameVerifier .getClass() + " has failed")); return; } if (state == State.HANDSHAKING) { state = State.DATA; upstreamFilter.onSslHandshakeCompleted(); } else if (state == State.REHANDSHAKING) { state = State.DATA; if (pendingApplicationWrite != null) { Runnable write = pendingApplicationWrite; // set pending write to null to cover the extremely improbable case that we start re-handshaking again pendingApplicationWrite = null; write.run(); } } }
if (hostnameVerifier.verify(nodeId, sslSession)) { final String clientId = sslSocket.getInetAddress().getHostName(); logger.debug("The request was verified with node '{}'. The hostname derived from the socket is '{}'. Authorizing Client to Load Balance data", nodeId, clientId);
public void upgradeToSSL(SSLSocketFactory sslSocketFactory, HostnameVerifier hostnameVerifier) throws IOException { SSLSocket sslSocket = sslSocketFactory.createSocket(this.socket); sslSocket.startHandshake(); socket = sslSocket; inputStream = new ByteArrayInputStream(sslSocket.getInputStream()); outputStream = new ByteArrayOutputStream(sslSocket.getOutputStream()); if (hostnameVerifier != null && !hostnameVerifier.verify(sslSocket.getInetAddress().getHostName(), sslSocket.getSession())) { throw new IdentityVerificationException("\"" + sslSocket.getInetAddress().getHostName() + "\" identity was not confirmed"); } }
return hv.verify("localhost", session);
@Test public void trustAllHosts() throws Exception { HttpsURLConnection connection = newHttpsConnection(); HttpsTrust.INSTANCE.trust(connection); assertThat(connection.getHostnameVerifier()).isNotNull(); assertThat(connection.getHostnameVerifier().verify("foo", null)).isTrue(); }
if (verifier == null) { throw new IllegalStateException("No HostnameVerifier set. Use connectionConfiguration.setHostnameVerifier() to configure."); } else if (!verifier.verify(getXMPPServiceDomain().toString(), sslSocket.getSession())) { throw new CertificateException("Hostname verification of certificate failed. Certificate does not authenticate " + getXMPPServiceDomain());
if (!address.hostnameVerifier().verify(address.url().host(), sslSocketSession)) { List<Certificate> peerCertificates = unverifiedHandshake.peerCertificates(); if (!peerCertificates.isEmpty()) {
@Override public boolean verify(String s, SSLSession sslSession) { return verifier.verify(s, sslSession); } }
private static void verifyPeerName(PGStream stream, Properties info, SSLSocket newConnection) throws PSQLException { HostnameVerifier hvn; String sslhostnameverifier = PGProperty.SSL_HOSTNAME_VERIFIER.get(info); if (sslhostnameverifier == null) { hvn = PGjdbcHostnameVerifier.INSTANCE; sslhostnameverifier = "PgjdbcHostnameVerifier"; } else { try { hvn = (HostnameVerifier) instantiate(sslhostnameverifier, info, false, null); } catch (Exception e) { throw new PSQLException( GT.tr("The HostnameVerifier class provided {0} could not be instantiated.", sslhostnameverifier), PSQLState.CONNECTION_FAILURE, e); } } if (hvn.verify(stream.getHostSpec().getHost(), newConnection.getSession())) { return; } throw new PSQLException( GT.tr("The hostname {0} could not be verified by hostnameverifier {1}.", stream.getHostSpec().getHost(), sslhostnameverifier), PSQLState.CONNECTION_FAILURE); }
@Override public boolean verify(String hostname, SSLSession session) { return hostnameVerifier.verify(hostname, session); }
if (!address.hostnameVerifier().verify(address.url().host(), sslSocket.getSession())) { X509Certificate cert = (X509Certificate) unverifiedHandshake.peerCertificates().get(0); throw new SSLPeerUnverifiedException("Hostname " + address.url().host() + " not verified:"
if (!address.hostnameVerifier().verify(address.url().host(), sslSocketSession)) { List<Certificate> peerCertificates = unverifiedHandshake.peerCertificates(); if (!peerCertificates.isEmpty()) {
@Override public void verify(String host, SSLSocket ssl) throws IOException { if (!verifier.verify(host, ssl.getSession())) throw new SSLException(Messages.MESSAGES.hostnameVerificationFailure()); }
@Override public boolean verify(String hostname, SSLSession session) { //return "api.dtworkroom.com".equals(hostname); HostnameVerifier hv=HttpsURLConnection.getDefaultHostnameVerifier(); return hv.verify("*.dtworkroom.com",session); } });
/** * Verifies the hostname against the peer certificates in a session. Falls back to extraHostnameVerifier if * there is no match. * * @param hostname the IP address or hostname of the expected server. * @param session the SSL session containing the certificates with the ACTUAL hostname/ipaddress. * @return true if the hostname matches, false otherwise. */ public boolean verify(String hostname, SSLSession session) { if (hostnameMatches(hostname, session)) { return true; } else { return extraHostnameVerifier != null && extraHostnameVerifier.verify(hostname, session); } } }
public void start() throws IOException, MqttException { super.start(); setEnabledCiphers(enabledCiphers); int soTimeout = socket.getSoTimeout(); // RTC 765: Set a timeout to avoid the SSL handshake being blocked indefinitely socket.setSoTimeout(this.handshakeTimeoutSecs*1000); ((SSLSocket)socket).startHandshake(); if (hostnameVerifier != null) { SSLSession session = ((SSLSocket)socket).getSession(); hostnameVerifier.verify(host, session); } // reset timeout to default value socket.setSoTimeout(soTimeout); }