Я использую измененную версию кода ниже для аутентификации сертификата клиента SSL.Это работало в JDK 8, недавно я перешел на JDK 11, теперь с тем же кодом аутентификация не удалась.Если я переключаюсь на JDK 8, это работает.Какие-либо изменения в JDK 11 для обработки аутентификации сертификата клиента SSL?Любые советы, как заставить этот код работать, JDK будут полезны.
package org.example.test;
import org.apache.http.HttpEntity;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpGet;
import org.apache.http.config.Registry;
import org.apache.http.config.RegistryBuilder;
import org.apache.http.conn.HttpClientConnectionManager;
import org.apache.http.conn.socket.ConnectionSocketFactory;
import org.apache.http.conn.socket.PlainConnectionSocketFactory;
import org.apache.http.conn.ssl.SSLConnectionSocketFactory;
import org.apache.http.conn.ssl.SSLContexts;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.HttpClientBuilder;
import org.apache.http.impl.conn.BasicHttpClientConnectionManager;
import org.apache.http.util.EntityUtils;
import org.junit.Test;
import javax.net.ssl.SSLContext;
import java.io.FileInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.security.*;
import java.security.cert.CertificateException;
/**
* Demonstrate connecting to a server secured with client-side SSL certificates.
*/
public class ConnectIT {
/**
* Path to your client-side SSL certificate in the PKCS12 format, as generated by OpenSSL.
*/
final String KEY_STORE_PATH = "/path/to/pkcs12file.p12";
/**
* PKCS12 file passphrase.
*/
final String KEY_STORE_PASSWORD = "correct horse battery staple";
/**
* URL to connect to. That is, a server for which the above certificate is required.
*/
final String URL = "https://secure.example.org";
@Test
public void sslConnect() throws KeyStoreException, IOException, CertificateException,
NoSuchAlgorithmException, KeyManagementException, UnrecoverableKeyException {
// Load the key store, containing the client-side certificate.
KeyStore keyStore = KeyStore.getInstance("pkcs12");
InputStream keyStoreInput = new FileInputStream(KEY_STORE_PATH);
keyStore.load(keyStoreInput, KEY_STORE_PASSWORD.toCharArray());
System.out.println("Key store has " + keyStore.size() + " keys");
// Create an SSL context with our private key store.
// We are only loading the key-material here, but if your server uses a self-signed certificate,
// you will need to load the trust-material (a JKS key-store containing the server's public SSL
// certificate) as well.
SSLContext sslContext = SSLContexts.custom()
.loadKeyMaterial(keyStore, KEY_STORE_PASSWORD.toCharArray())
.useTLS()
.build();
// Prepare the HTTPClient.
HttpClientBuilder builder = HttpClientBuilder.create();
SSLConnectionSocketFactory sslConnectionFactory = new SSLConnectionSocketFactory(
sslContext, SSLConnectionSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
builder.setSSLSocketFactory(sslConnectionFactory);
Registry<ConnectionSocketFactory> registry = RegistryBuilder.<ConnectionSocketFactory>create()
.register("https", sslConnectionFactory)
.register("http", new PlainConnectionSocketFactory())
.build();
HttpClientConnectionManager ccm = new BasicHttpClientConnectionManager(registry);
builder.setConnectionManager(ccm);
// Perform a sample HTTP request.
try (CloseableHttpClient httpClient = builder.build()) {
HttpGet httpget = new HttpGet(URL);
try (CloseableHttpResponse response = httpClient.execute(httpget)) {
HttpEntity entity = response.getEntity();
System.out.println("----------------------------------------");
System.out.println(response.getStatusLine());
if (entity != null) {
System.out.println("Response content length: " + entity.getContentLength());
System.out.printf(EntityUtils.toString(entity));
}
EntityUtils.consume(entity);
}
}
}
}
Спасибо