SSLCertificateSocketFactory.java revision 4ef6c9b6a16c9b65699705aaa64977fc60dd3331
19066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/* 29066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Copyright (C) 2008 The Android Open Source Project 39066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * 49066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Licensed under the Apache License, Version 2.0 (the "License"); 59066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * you may not use this file except in compliance with the License. 69066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * You may obtain a copy of the License at 79066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * 89066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * http://www.apache.org/licenses/LICENSE-2.0 99066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * 109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Unless required by applicable law or agreed to in writing, software 119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * distributed under the License is distributed on an "AS IS" BASIS, 129066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * See the License for the specific language governing permissions and 149066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * limitations under the License. 159066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */ 169066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 179066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectpackage android.net; 189066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 199066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport android.os.SystemProperties; 209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport android.util.Log; 219066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.io.IOException; 229066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.net.InetAddress; 239066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.net.Socket; 247ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstromimport java.net.SocketException; 259066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.KeyManagementException; 269066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.cert.X509Certificate; 274ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubinimport java.security.interfaces.ECPrivateKey; 289066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.SocketFactory; 297fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.HostnameVerifier; 307fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.HttpsURLConnection; 311b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komaloimport javax.net.ssl.KeyManager; 327fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLException; 337fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLPeerUnverifiedException; 347fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLSession; 359066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSocket; 369066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSocketFactory; 379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.TrustManager; 389066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.X509TrustManager; 393c7c351a6217ac48b741740167c201a679a0ca65Brian Carlstromimport org.apache.harmony.xnet.provider.jsse.OpenSSLContextImpl; 4060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnorimport org.apache.harmony.xnet.provider.jsse.OpenSSLSocketImpl; 419066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport org.apache.harmony.xnet.provider.jsse.SSLClientSessionCache; 429066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 439066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/** 4460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * SSLSocketFactory implementation with several extra features: 457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 4660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <ul> 4760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <li>Timeout specification for SSL handshake operations 487fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <li>Hostname verification in most cases (see WARNINGs below) 4960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <li>Optional SSL session caching with {@link SSLSessionCache} 509d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * <li>Optionally bypass all SSL certificate checks 5160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * </ul> 527fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 537fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * The handshake timeout does not apply to actual TCP socket connection. 547fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * If you want a connection timeout as well, use {@link #createSocket()} 557fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * and {@link Socket#connect(SocketAddress, int)}, after which you 567fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * must verify the identity of the server you are connected to. 577fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 587fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Most {@link SSLSocketFactory} implementations do not 597fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * verify the server's identity, allowing man-in-the-middle attacks.</b> 607fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * This implementation does check the server's certificate hostname, but only 617fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * for createSocket variants that specify a hostname. When using methods that 627fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * use {@link InetAddress} or which return an unconnected socket, you MUST 637fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * verify the server's identity yourself to ensure a secure connection.</p> 647fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 657fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p>One way to verify the server's identity is to use 667fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@link HttpsURLConnection#getDefaultHostnameVerifier()} to get a 677fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@link HostnameVerifier} to verify the certificate hostname. 687fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 697fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p>On development devices, "setprop socket.relaxsslcheck yes" bypasses all 707fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * SSL certificate and hostname checks for testing purposes. This setting 717fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * requires root access. 729066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */ 739066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectpublic class SSLCertificateSocketFactory extends SSLSocketFactory { 7460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private static final String TAG = "SSLCertificateSocketFactory"; 759066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 7660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private static final TrustManager[] INSECURE_TRUST_MANAGER = new TrustManager[] { 779066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project new X509TrustManager() { 7860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public X509Certificate[] getAcceptedIssuers() { return null; } 7960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public void checkClientTrusted(X509Certificate[] certs, String authType) { } 8060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public void checkServerTrusted(X509Certificate[] certs, String authType) { } 819066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 829066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project }; 839066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 847fc93c36ae235115727296780dbc35101622bbd4Dan Egnor private static final HostnameVerifier HOSTNAME_VERIFIER = 857fc93c36ae235115727296780dbc35101622bbd4Dan Egnor HttpsURLConnection.getDefaultHostnameVerifier(); 867fc93c36ae235115727296780dbc35101622bbd4Dan Egnor 8760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private SSLSocketFactory mInsecureFactory = null; 8860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private SSLSocketFactory mSecureFactory = null; 891b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo private TrustManager[] mTrustManagers = null; 901b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo private KeyManager[] mKeyManagers = null; 91f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson private byte[] mNpnProtocols = null; 924ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin private ECPrivateKey mChannelIdPrivateKey = null; 939066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 9460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private final int mHandshakeTimeoutMillis; 9560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private final SSLClientSessionCache mSessionCache; 969d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor private final boolean mSecure; 979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 9860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor /** @deprecated Use {@link #getDefault(int)} instead. */ 9928c742573ccaeb55c16bc02fb25fdd86b8d1f76aJesse Wilson @Deprecated 10060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public SSLCertificateSocketFactory(int handshakeTimeoutMillis) { 1019d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor this(handshakeTimeoutMillis, null, true); 1029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 1039066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 1049d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor private SSLCertificateSocketFactory( 105992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom int handshakeTimeoutMillis, SSLSessionCache cache, boolean secure) { 10660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor mHandshakeTimeoutMillis = handshakeTimeoutMillis; 10760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor mSessionCache = cache == null ? null : cache.mSessionCache; 1089d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor mSecure = secure; 1099066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 1109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 1119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project /** 1129d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * Returns a new socket factory instance with an optional handshake timeout. 1139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * 11460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 11560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * for none. The socket timeout is reset to 0 after the handshake. 1167fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @return a new SSLSocketFactory with the specified parameters 1179066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */ 11860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public static SocketFactory getDefault(int handshakeTimeoutMillis) { 1199d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor return new SSLCertificateSocketFactory(handshakeTimeoutMillis, null, true); 1209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 1219066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 1229066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project /** 1239d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * Returns a new socket factory instance with an optional handshake timeout 1249d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * and SSL session cache. 1259066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * 12660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 12760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * for none. The socket timeout is reset to 0 after the handshake. 128ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson * @param cache The {@link SSLSessionCache} to use, or null for no cache. 1297fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @return a new SSLSocketFactory with the specified parameters 13060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor */ 1319d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor public static SSLSocketFactory getDefault(int handshakeTimeoutMillis, SSLSessionCache cache) { 1329d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true); 1339d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor } 1349d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor 1359d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor /** 1369d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * Returns a new instance of a socket factory with all SSL security checks 1379d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * disabled, using an optional handshake timeout and SSL session cache. 1387fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 1397fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Warning:</b> Sockets created using this factory 1407fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * are vulnerable to man-in-the-middle attacks!</p> 1419d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * 1429d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 1439d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * for none. The socket timeout is reset to 0 after the handshake. 144ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson * @param cache The {@link SSLSessionCache} to use, or null for no cache. 1457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @return an insecure SSLSocketFactory with the specified parameters 1469d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor */ 1479d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor public static SSLSocketFactory getInsecure(int handshakeTimeoutMillis, SSLSessionCache cache) { 1489d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, false); 1499066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 1509066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 15160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor /** 15260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * Returns a socket factory (also named SSLSocketFactory, but in a different 15360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * namespace) for use with the Apache HTTP stack. 15460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * 15560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0 15660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * for none. The socket timeout is reset to 0 after the handshake. 157ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson * @param cache The {@link SSLSessionCache} to use, or null for no cache. 15860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * @return a new SocketFactory with the specified parameters 15960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor */ 16060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public static org.apache.http.conn.ssl.SSLSocketFactory getHttpSocketFactory( 161ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson int handshakeTimeoutMillis, SSLSessionCache cache) { 16260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return new org.apache.http.conn.ssl.SSLSocketFactory( 1639d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true)); 1649066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 1659066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 1667fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 1677fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * Verify the hostname of the certificate used by the other end of a 1687fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * connected socket. You MUST call this if you did not supply a hostname 1697fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * to {@link #createSocket()}. It is harmless to call this method 1707fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * redundantly if the hostname has already been verified. 1717fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 1727fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p>Wildcard certificates are allowed to verify any matching hostname, 1737fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * so "foo.bar.example.com" is verified if the peer has a certificate 1747fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * for "*.example.com". 1757fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 1767fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @param socket An SSL socket which has been connected to a server 1777fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @param hostname The expected hostname of the remote server 1787fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @throws IOException if something goes wrong handshaking with the server 1797fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @throws SSLPeerUnverifiedException if the server cannot prove its identity 1807fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 1817fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * @hide 1827fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 1837fc93c36ae235115727296780dbc35101622bbd4Dan Egnor public static void verifyHostname(Socket socket, String hostname) throws IOException { 1847fc93c36ae235115727296780dbc35101622bbd4Dan Egnor if (!(socket instanceof SSLSocket)) { 1857fc93c36ae235115727296780dbc35101622bbd4Dan Egnor throw new IllegalArgumentException("Attempt to verify non-SSL socket"); 1867fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 1877fc93c36ae235115727296780dbc35101622bbd4Dan Egnor 1887fc93c36ae235115727296780dbc35101622bbd4Dan Egnor if (!isSslCheckRelaxed()) { 1897fc93c36ae235115727296780dbc35101622bbd4Dan Egnor // The code at the start of OpenSSLSocketImpl.startHandshake() 1907fc93c36ae235115727296780dbc35101622bbd4Dan Egnor // ensures that the call is idempotent, so we can safely call it. 1917fc93c36ae235115727296780dbc35101622bbd4Dan Egnor SSLSocket ssl = (SSLSocket) socket; 1927fc93c36ae235115727296780dbc35101622bbd4Dan Egnor ssl.startHandshake(); 1937fc93c36ae235115727296780dbc35101622bbd4Dan Egnor 1947fc93c36ae235115727296780dbc35101622bbd4Dan Egnor SSLSession session = ssl.getSession(); 1957fc93c36ae235115727296780dbc35101622bbd4Dan Egnor if (session == null) { 1967fc93c36ae235115727296780dbc35101622bbd4Dan Egnor throw new SSLException("Cannot verify SSL socket without session"); 1977fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 1987fc93c36ae235115727296780dbc35101622bbd4Dan Egnor if (!HOSTNAME_VERIFIER.verify(hostname, session)) { 1997fc93c36ae235115727296780dbc35101622bbd4Dan Egnor throw new SSLPeerUnverifiedException("Cannot verify hostname: " + hostname); 2007fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 2017fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 2027fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 2037fc93c36ae235115727296780dbc35101622bbd4Dan Egnor 2041b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo private SSLSocketFactory makeSocketFactory( 2051b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo KeyManager[] keyManagers, TrustManager[] trustManagers) { 20660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor try { 2073c7c351a6217ac48b741740167c201a679a0ca65Brian Carlstrom OpenSSLContextImpl sslContext = new OpenSSLContextImpl(); 2081b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo sslContext.engineInit(keyManagers, trustManagers, null); 2092c42c8fbaf02be1f3ea6298077128d0c419526f0Brian Carlstrom sslContext.engineGetClientSessionContext().setPersistentCache(mSessionCache); 21060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return sslContext.engineGetSocketFactory(); 21160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor } catch (KeyManagementException e) { 21260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor Log.wtf(TAG, e); 21360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return (SSLSocketFactory) SSLSocketFactory.getDefault(); // Fallback 2149066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 21560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor } 2169066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 2177fc93c36ae235115727296780dbc35101622bbd4Dan Egnor private static boolean isSslCheckRelaxed() { 2187fc93c36ae235115727296780dbc35101622bbd4Dan Egnor return "1".equals(SystemProperties.get("ro.debuggable")) && 2197fc93c36ae235115727296780dbc35101622bbd4Dan Egnor "yes".equals(SystemProperties.get("socket.relaxsslcheck")); 2207fc93c36ae235115727296780dbc35101622bbd4Dan Egnor } 2217fc93c36ae235115727296780dbc35101622bbd4Dan Egnor 22260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor private synchronized SSLSocketFactory getDelegate() { 2239d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor // Relax the SSL check if instructed (for this factory, or systemwide) 2247fc93c36ae235115727296780dbc35101622bbd4Dan Egnor if (!mSecure || isSslCheckRelaxed()) { 22560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor if (mInsecureFactory == null) { 2269d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor if (mSecure) { 2279d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor Log.w(TAG, "*** BYPASSING SSL SECURITY CHECKS (socket.relaxsslcheck=yes) ***"); 2289d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor } else { 2299d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor Log.w(TAG, "Bypassing SSL security checks at caller's request"); 2309d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor } 2311b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mInsecureFactory = makeSocketFactory(mKeyManagers, INSECURE_TRUST_MANAGER); 2329066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 23360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return mInsecureFactory; 23460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor } else { 23560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor if (mSecureFactory == null) { 2361b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mSecureFactory = makeSocketFactory(mKeyManagers, mTrustManagers); 2379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 23860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return mSecureFactory; 2399066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 2409066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 2419066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 2427fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 2431b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo * Sets the {@link TrustManager}s to be used for connections made by this factory. 2441b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo */ 2451b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo public void setTrustManagers(TrustManager[] trustManager) { 2461b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mTrustManagers = trustManager; 2471b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo 2481b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo // Clear out all cached secure factories since configurations have changed. 2491b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mSecureFactory = null; 2501b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo // Note - insecure factories only ever use the INSECURE_TRUST_MANAGER so they need not 2511b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo // be cleared out here. 2521b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo } 2531b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo 2541b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo /** 255f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * Sets the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next 256f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * Protocol Negotiation (NPN)</a> protocols that this peer is interested in. 257f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * 258f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * <p>For servers this is the sequence of protocols to advertise as 259f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * supported, in order of preference. This list is sent unencrypted to 260f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * all clients that support NPN. 261f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * 262f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * <p>For clients this is a list of supported protocols to match against the 263f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * server's list. If there is no protocol supported by both client and 264f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * server then the first protocol in the client's list will be selected. 265f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * The order of the client's protocols is otherwise insignificant. 266f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * 2672108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson * @param npnProtocols a non-empty list of protocol byte arrays. All arrays 2682108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson * must be non-empty and of length less than 256. 269f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson */ 270f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson public void setNpnProtocols(byte[][] npnProtocols) { 271f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson this.mNpnProtocols = toNpnProtocolsList(npnProtocols); 272f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 273f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson 274f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson /** 275f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * Returns an array containing the concatenation of length-prefixed byte 276f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * strings. 277f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson */ 278f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson static byte[] toNpnProtocolsList(byte[]... npnProtocols) { 2792108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson if (npnProtocols.length == 0) { 2802108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson throw new IllegalArgumentException("npnProtocols.length == 0"); 2812108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson } 282f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson int totalLength = 0; 283f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson for (byte[] s : npnProtocols) { 284f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson if (s.length == 0 || s.length > 255) { 285f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson throw new IllegalArgumentException("s.length == 0 || s.length > 255: " + s.length); 286f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 287f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson totalLength += 1 + s.length; 288f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 289f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson byte[] result = new byte[totalLength]; 290f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson int pos = 0; 291f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson for (byte[] s : npnProtocols) { 292f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson result[pos++] = (byte) s.length; 293f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson for (byte b : s) { 294f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson result[pos++] = b; 295f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 296f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 297f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson return result; 298f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 299f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson 300f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson /** 301f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * Returns the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next 302f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * Protocol Negotiation (NPN)</a> protocol selected by client and server, or 303f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * null if no protocol was negotiated. 304f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * 305f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson * @param socket a socket created by this factory. 306b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @throws IllegalArgumentException if the socket was not created by this factory. 307f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson */ 308f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson public byte[] getNpnSelectedProtocol(Socket socket) { 309b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath return castToOpenSSLSocket(socket).getNpnSelectedProtocol(); 310f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson } 311f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson 312f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson /** 3131b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo * Sets the {@link KeyManager}s to be used for connections made by this factory. 3141b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo */ 3151b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo public void setKeyManagers(KeyManager[] keyManagers) { 3161b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mKeyManagers = keyManagers; 3171b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo 3181b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo // Clear out any existing cached factories since configurations have changed. 3191b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mSecureFactory = null; 3201b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo mInsecureFactory = null; 3211b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo } 3221b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo 323b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath /** 3244ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * Sets the {@link ECPrivateKey} to be used for TLS Channel ID by connections made by this 3254ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * factory. 3264ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * 3274ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * @param privateKey private key (enables TLS Channel ID) or {@code null} for no key (disables 3284ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * TLS Channel ID). The private key has to be an Elliptic Curve (EC) key based on the 3294ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * NIST P-256 curve (aka SECG secp256r1 or ANSI X9.62 prime256v1). 3304ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * 3314ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin * @hide 3324ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin */ 3334ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin public void setChannelIdPrivateKey(ECPrivateKey privateKey) { 3344ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin mChannelIdPrivateKey = privateKey; 3354ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin } 3364ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin 3374ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin /** 338b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * Enables <a href="http://tools.ietf.org/html/rfc5077#section-3.2">session ticket</a> 339b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * support on the given socket. 340b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * 341b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @param socket a socket created by this factory 342b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @param useSessionTickets {@code true} to enable session ticket support on this socket. 343b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @throws IllegalArgumentException if the socket was not created by this factory. 344b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath */ 345b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath public void setUseSessionTickets(Socket socket, boolean useSessionTickets) { 346b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath castToOpenSSLSocket(socket).setUseSessionTickets(useSessionTickets); 347b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath } 348b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath 349b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath /** 350b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * Turns on <a href="http://tools.ietf.org/html/rfc6066#section-3">Server 351b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * Name Indication (SNI)</a> on a given socket. 352b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * 353b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @param socket a socket created by this factory. 354b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @param hostName the desired SNI hostname, null to disable. 355b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath * @throws IllegalArgumentException if the socket was not created by this factory. 356b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath */ 357b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath public void setHostname(Socket socket, String hostName) { 358b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath castToOpenSSLSocket(socket).setHostname(hostName); 359b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath } 360b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath 3617ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom /** 3627ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * Sets this socket's SO_SNDTIMEO write timeout in milliseconds. 3637ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * Use 0 for no timeout. 3647ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * To take effect, this option must be set before the blocking method was called. 3657ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * 3667ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * @param socket a socket created by this factory. 367992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom * @param timeout the desired write timeout in milliseconds. 3687ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom * @throws IllegalArgumentException if the socket was not created by this factory. 369992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom * 370992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom * @hide 3717ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom */ 3727ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom public void setSoWriteTimeout(Socket socket, int writeTimeoutMilliseconds) 3737ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom throws SocketException { 3747ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom castToOpenSSLSocket(socket).setSoWriteTimeout(writeTimeoutMilliseconds); 3757ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom } 3767ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom 377b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath private static OpenSSLSocketImpl castToOpenSSLSocket(Socket socket) { 378b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath if (!(socket instanceof OpenSSLSocketImpl)) { 379b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath throw new IllegalArgumentException("Socket not created by this factory: " 380b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath + socket); 381b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath } 382b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath 383b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath return (OpenSSLSocketImpl) socket; 384b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath } 3851b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo 3861b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo /** 3877fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@inheritDoc} 3887fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 389df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * <p>This method verifies the peer's certificate hostname after connecting 390df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * (unless created with {@link #getInsecure(int, SSLSessionCache)}). 3917fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 39260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 39360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket(Socket k, String host, int port, boolean close) throws IOException { 39460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(k, host, port, close); 395f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 39660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 3974ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 398df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler if (mSecure) { 399df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler verifyHostname(s, host); 400df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler } 40160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 4029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4039066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 4047fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 4057fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * Creates a new socket which is not connected to any remote host. 4067fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * You must use {@link Socket#connect} to connect the socket. 4077fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 4087fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Warning:</b> Hostname verification is not performed 4097fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * with this method. You MUST verify the server's identity after connecting 4107fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * the socket to avoid man-in-the-middle attacks.</p> 4117fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 41260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 41360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket() throws IOException { 41460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(); 415f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 41660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 4174ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 41860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 4199066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 4217fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 4227fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@inheritDoc} 4237fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 4247fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Warning:</b> Hostname verification is not performed 4257fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * with this method. You MUST verify the server's identity after connecting 4267fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * the socket to avoid man-in-the-middle attacks.</p> 4277fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 42860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 42960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket(InetAddress addr, int port, InetAddress localAddr, int localPort) 43060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor throws IOException { 43160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket( 43260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor addr, port, localAddr, localPort); 433f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 43460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 4354ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 43660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 4379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4389066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 4397fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 4407fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@inheritDoc} 4417fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 4427fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Warning:</b> Hostname verification is not performed 4437fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * with this method. You MUST verify the server's identity after connecting 4447fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * the socket to avoid man-in-the-middle attacks.</p> 4457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 44660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 44760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket(InetAddress addr, int port) throws IOException { 44860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(addr, port); 449f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 45060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 4514ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 45260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 4539066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4549066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 4557fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 4567fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@inheritDoc} 4577fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 458df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * <p>This method verifies the peer's certificate hostname after connecting 459df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * (unless created with {@link #getInsecure(int, SSLSessionCache)}). 4607fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 46160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 46260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket(String host, int port, InetAddress localAddr, int localPort) 46360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor throws IOException { 46460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket( 46560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor host, port, localAddr, localPort); 466f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 46760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 4684ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 469df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler if (mSecure) { 470df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler verifyHostname(s, host); 471df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler } 47260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 47360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor } 4749066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 4757fc93c36ae235115727296780dbc35101622bbd4Dan Egnor /** 4767fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@inheritDoc} 4777fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * 478df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * <p>This method verifies the peer's certificate hostname after connecting 479df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler * (unless created with {@link #getInsecure(int, SSLSessionCache)}). 4807fc93c36ae235115727296780dbc35101622bbd4Dan Egnor */ 48160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 48260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor public Socket createSocket(String host, int port) throws IOException { 48360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(host, port); 484f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson s.setNpnProtocols(mNpnProtocols); 48560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor s.setHandshakeTimeout(mHandshakeTimeoutMillis); 4864ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin s.setChannelIdPrivateKey(mChannelIdPrivateKey); 487df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler if (mSecure) { 488df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler verifyHostname(s, host); 489df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler } 49060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return s; 4919066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4929066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 49360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 4949066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project public String[] getDefaultCipherSuites() { 49560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return getDelegate().getSupportedCipherSuites(); 4969066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 4979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project 49860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor @Override 4999066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project public String[] getSupportedCipherSuites() { 50060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor return getDelegate().getSupportedCipherSuites(); 5019066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project } 5029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project} 503