> On 24 Mar 2015, at 14:12, Sean Mullan <sean.mul...@oracle.com> wrote:
> 
> On 03/24/2015 08:53 AM, Jan Willem Janssen wrote:
>> 
>> When a X509TrustManager validates an endpoint certificate containing a
>> critical custom extension the sun.security.validator.EndEntityChecker
>> will always fail. While this is correct behaviour, and according to
>> the spec, there appears no way of adding support for custom critical
>> extensions on endpoint certificates?!
> 
> The CertPath API allows you to create your own PKIXCertPathChecker to process 
> custom extensions. This could then be added to the 
> CertPathTrustManagerParameters (via the addCertPathChecker method of 
> PKIXParameters), but it looks like there is no hook in the EndEntityChecker 
> to call the PKIXCertPathCheckers.

Yes, that is also what I was doing, but was a little surprised that 
EndEntityChecker didn’t take any of those custom PKIXCertPathCheckers into 
consideration.

> I'll file a bug.

Thanks for the clarification, Sean!

--
Met vriendelijke groeten | Kind regards

Jan Willem Janssen | Software Architect
+31 631 765 814

My world is revolving around INAETICS and Amdatu

Luminis Technologies B.V.
Churchillplein 1
7314 BZ   Apeldoorn
+31 88 586 46 00

http://www.luminis-technologies.com
http://www.luminis.eu

KvK (CoC) 09 16 28 93
BTW (VAT) NL8169.78.566.B.01

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to