forked from mirror/monocles_chat_clean
Wozu einen eigenen MemorizingTrustManager? #27
Labels
No labels
update fork
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
thedevstack/PiratX#27
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Warum wird
55e1901f1e/src/main/java/eu/siacs/conversations/services/MemorizingTrustManager.javabenötigt?java.security.cert.CertificateException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510)
at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87)
at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118)
at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420)
at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0)
at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609)
at org.conscrypt.Platform.checkServerTrusted(Platform.java:437)
at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643)
at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567)
at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099)
at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706)
at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230)
at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209)
at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547)
at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304)
at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540)
at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486)
at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696)
at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566)
at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680)
at java.lang.Thread.run(Thread.java:1012)
Caused by: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510)
at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87)
at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118)
at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420)
at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0)
at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609)
at org.conscrypt.Platform.checkServerTrusted(Platform.java:437)
at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643)
at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567)
at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099)
at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706)
at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230)
at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209)
at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547)
at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304)
at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540)
at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486)
at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696)
at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566)
at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680)
at java.lang.Thread.run(Thread.java:1012)
Erklären kann ich es noch nicht, aber wenn die Änderungen dort via cherry-pick (
codeberg.org/monocles/monocles_chat@749db4e793) übernommen werden, scheint es irgendwie wichtig zu sein.Der wirft auch Exceptions beim Aufruf von https://google.de - seltsam