19066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/*
29066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Copyright (C) 2008 The Android Open Source Project
39066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
49066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Licensed under the Apache License, Version 2.0 (the "License");
59066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * you may not use this file except in compliance with the License.
69066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * You may obtain a copy of the License at
79066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
89066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *      http://www.apache.org/licenses/LICENSE-2.0
99066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Unless required by applicable law or agreed to in writing, software
119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * distributed under the License is distributed on an "AS IS" BASIS,
129066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * See the License for the specific language governing permissions and
149066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * limitations under the License.
159066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */
169066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
179066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectpackage android.net.http;
189066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
192269d1572e5fcfb725ea55f5764d8c3280d69f6dDianne Hackborn
209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.io.IOException;
21866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstromimport java.security.GeneralSecurityException;
22866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstromimport java.security.KeyManagementException;
239066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.cert.Certificate;
249066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.cert.CertificateException;
259066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.cert.X509Certificate;
2652cd299eef703030f8fcf7a92f413791301771ccJesse Wilsonimport javax.net.ssl.DefaultHostnameVerifier;
279066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLHandshakeException;
289066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSession;
299066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSocket;
3093ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurunimport javax.net.ssl.X509TrustManager;
3152cd299eef703030f8fcf7a92f413791301771ccJesse Wilsonimport org.apache.harmony.security.provider.cert.X509CertImpl;
3252cd299eef703030f8fcf7a92f413791301771ccJesse Wilsonimport org.apache.harmony.xnet.provider.jsse.SSLParametersImpl;
3393ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurunimport org.apache.harmony.xnet.provider.jsse.TrustManagerImpl;
349066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
359066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/**
369066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Class responsible for all server certificate validation functionality
3752cd299eef703030f8fcf7a92f413791301771ccJesse Wilson *
389066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * {@hide}
399066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */
4093ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurunpublic class CertificateChainValidator {
419066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
429066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
439066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * The singleton instance of the certificate chain validator
449066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     */
45886f3d69b79748fe937725e33b8bbb3d67ab82c7Bob Lee    private static final CertificateChainValidator sInstance
46886f3d69b79748fe937725e33b8bbb3d67ab82c7Bob Lee            = new CertificateChainValidator();
479066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4852cd299eef703030f8fcf7a92f413791301771ccJesse Wilson    private static final DefaultHostnameVerifier sVerifier
4952cd299eef703030f8fcf7a92f413791301771ccJesse Wilson            = new DefaultHostnameVerifier();
5052cd299eef703030f8fcf7a92f413791301771ccJesse Wilson
519066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
52c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * @return The singleton instance of the certificates chain validator
539066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     */
549066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    public static CertificateChainValidator getInstance() {
559066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        return sInstance;
569066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
579066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
589066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
59c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * Creates a new certificate chain validator. This is a private constructor.
609066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * If you need a Certificate chain validator, call getInstance().
619066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     */
62e97c2006bf7c391c933307e520a392e532aa5d6aBob Lee    private CertificateChainValidator() {}
639066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
649066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
659066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * Performs the handshake and server certificates validation
66c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * Notice a new chain will be rebuilt by tracing the issuer and subject
67c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * before calling checkServerTrusted().
68c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * And if the last traced certificate is self issued and it is expired, it
69c4e834dc47885c8dbd3a2911ce4b9fccde21c800Huahui Wu     * will be dropped.
709066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * @param sslSocket The secure connection socket
719066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * @param domain The website domain
729066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     * @return An SSL error object if there is an error and null otherwise
739066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     */
749066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    public SslError doHandshakeAndValidateServerCertificates(
759066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            HttpsConnection connection, SSLSocket sslSocket, String domain)
769066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            throws IOException {
77e103355d9332e2fab9d5c408e824ac8ab3b915a7Brian Carlstrom        // get a valid SSLSession, close the socket if we fail
7885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        SSLSession sslSession = sslSocket.getSession();
79e103355d9332e2fab9d5c408e824ac8ab3b915a7Brian Carlstrom        if (!sslSession.isValid()) {
80e103355d9332e2fab9d5c408e824ac8ab3b915a7Brian Carlstrom            closeSocketThrowException(sslSocket, "failed to perform SSL handshake");
819066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
829066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
839066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        // retrieve the chain of the server peer certificates
849066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        Certificate[] peerCertificates =
859066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            sslSocket.getSession().getPeerCertificates();
869066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
8785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        if (peerCertificates == null || peerCertificates.length == 0) {
889066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            closeSocketThrowException(
899066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project                sslSocket, "failed to retrieve peer certificates");
909066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        } else {
919066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            // update the SSL certificate associated with the connection
929066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            if (connection != null) {
9385ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu                if (peerCertificates[0] != null) {
949066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project                    connection.setCertificate(
9585ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu                        new SslCertificate((X509Certificate)peerCertificates[0]));
969066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project                }
979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
989066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
999066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1008234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu        return verifyServerDomainAndCertificates((X509Certificate[]) peerCertificates, domain, "RSA");
10185ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    }
10285ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
10385ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    /**
10485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * Similar to doHandshakeAndValidateServerCertificates but exposed to JNI for use
10585ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * by Chromium HTTPS stack to validate the cert chain.
1068234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu     * @param certChain The bytes for certificates in ASN.1 DER encoded certificates format.
10785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * @param domain The full website hostname and domain
1088234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu     * @param authType The authentication type for the cert chain
10985ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * @return An SSL error object if there is an error and null otherwise
11085ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     */
11185ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    public static SslError verifyServerCertificates(
11285ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        byte[][] certChain, String domain, String authType)
11385ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        throws IOException {
11485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
11585ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        if (certChain == null || certChain.length == 0) {
11685ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            throw new IllegalArgumentException("bad certificate chain");
11785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        }
11885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
11985ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        X509Certificate[] serverCertificates = new X509Certificate[certChain.length];
12085ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
12185ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        for (int i = 0; i < certChain.length; ++i) {
12285ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            serverCertificates[i] = new X509CertImpl(certChain[i]);
12385ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        }
12485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
1258234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu        return verifyServerDomainAndCertificates(serverCertificates, domain, authType);
12685ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    }
12785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
12885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    /**
12993ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun     * Handles updates to credential storage.
13093ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun     */
13193ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun    public static void handleTrustStorageUpdate() {
13293ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun
133866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom        try {
134866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom            X509TrustManager x509TrustManager = SSLParametersImpl.getDefaultTrustManager();
135866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom            if( x509TrustManager instanceof TrustManagerImpl ) {
136866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom                TrustManagerImpl trustManager = (TrustManagerImpl) x509TrustManager;
137866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom                trustManager.handleTrustStorageUpdate();
138866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom            }
139866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom        } catch (KeyManagementException ignored) {
14093ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun        }
14193ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun    }
14293ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun
14393ba4fedebb78ba47c24e8472c8960ea8fdc933aSelim Gurun    /**
14485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * Common code of doHandshakeAndValidateServerCertificates and verifyServerCertificates.
1458234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu     * Calls DomainNamevalidator to verify the domain, and TrustManager to verify the certs.
14685ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * @param chain the cert chain in X509 cert format.
14785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * @param domain The full website hostname and domain
1488234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu     * @param authType The authentication type for the cert chain
14985ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     * @return An SSL error object if there is an error and null otherwise
15085ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu     */
15185ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu    private static SslError verifyServerDomainAndCertificates(
1528234bdb36a951c1265b2bc702c06bab09509a615Huahui Wu            X509Certificate[] chain, String domain, String authType)
15385ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            throws IOException {
1549066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        // check if the first certificate in the chain is for this site
15585ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        X509Certificate currCertificate = chain[0];
1569066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        if (currCertificate == null) {
15785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            throw new IllegalArgumentException("certificate for this site is null");
15885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu        }
1599066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
16052cd299eef703030f8fcf7a92f413791301771ccJesse Wilson        boolean valid = domain != null
16152cd299eef703030f8fcf7a92f413791301771ccJesse Wilson                && !domain.isEmpty()
16252cd299eef703030f8fcf7a92f413791301771ccJesse Wilson                && sVerifier.verify(domain, currCertificate);
16352cd299eef703030f8fcf7a92f413791301771ccJesse Wilson        if (!valid) {
16485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            if (HttpLog.LOGV) {
16585ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu                HttpLog.v("certificate not for this host: " + domain);
1669066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
16785ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            return new SslError(SslError.SSL_IDMISMATCH, currCertificate);
1689066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
1699066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1709066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        try {
171f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra            X509TrustManager x509TrustManager = SSLParametersImpl.getDefaultTrustManager();
172f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra            if (x509TrustManager instanceof TrustManagerImpl) {
173f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra                TrustManagerImpl trustManager = (TrustManagerImpl) x509TrustManager;
174f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra                trustManager.checkServerTrusted(chain, authType, domain);
175f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra            } else {
176f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra                x509TrustManager.checkServerTrusted(chain, authType);
177f743e54f2d761c742d99ac868705818616dcf74fGeremy Condra            }
17885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            return null;  // No errors.
179866666071bc49bd0c4fcd1776c9d9036d4e29fecBrian Carlstrom        } catch (GeneralSecurityException e) {
1809066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            if (HttpLog.LOGV) {
18185ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu                HttpLog.v("failed to validate the certificate chain, error: " +
1829066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project                    e.getMessage());
1839066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
18485ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu            return new SslError(SslError.SSL_UNTRUSTED, currCertificate);
1859066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
1869066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1879066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
18885ffa26f67efad30912e1561b5123b6f8f5827eeHuahui Wu
1899066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    private void closeSocketThrowException(
1909066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            SSLSocket socket, String errorMessage, String defaultErrorMessage)
1919066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            throws IOException {
1929066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        closeSocketThrowException(
1939066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            socket, errorMessage != null ? errorMessage : defaultErrorMessage);
1949066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1959066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1969066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    private void closeSocketThrowException(SSLSocket socket,
1979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            String errorMessage) throws IOException {
1989066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        if (HttpLog.LOGV) {
1999066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            HttpLog.v("validation error: " + errorMessage);
2009066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
2019066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
2029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        if (socket != null) {
2039066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            SSLSession session = socket.getSession();
2049066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            if (session != null) {
2059066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project                session.invalidate();
2069066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
2079066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
2089066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            socket.close();
2099066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
2109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
2119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        throw new SSLHandshakeException(errorMessage);
2129066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
2139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project}
214