SSLCertificateSocketFactory.java revision 4ef6c9b6a16c9b65699705aaa64977fc60dd3331
19066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/*
29066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Copyright (C) 2008 The Android Open Source Project
39066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
49066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Licensed under the Apache License, Version 2.0 (the "License");
59066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * you may not use this file except in compliance with the License.
69066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * You may obtain a copy of the License at
79066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
89066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *      http://www.apache.org/licenses/LICENSE-2.0
99066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project *
109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * Unless required by applicable law or agreed to in writing, software
119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * distributed under the License is distributed on an "AS IS" BASIS,
129066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * See the License for the specific language governing permissions and
149066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project * limitations under the License.
159066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */
169066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
179066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectpackage android.net;
189066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
199066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport android.os.SystemProperties;
209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport android.util.Log;
219066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.io.IOException;
229066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.net.InetAddress;
239066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.net.Socket;
247ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstromimport java.net.SocketException;
259066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.KeyManagementException;
269066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport java.security.cert.X509Certificate;
274ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubinimport java.security.interfaces.ECPrivateKey;
289066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.SocketFactory;
297fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.HostnameVerifier;
307fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.HttpsURLConnection;
311b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komaloimport javax.net.ssl.KeyManager;
327fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLException;
337fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLPeerUnverifiedException;
347fc93c36ae235115727296780dbc35101622bbd4Dan Egnorimport javax.net.ssl.SSLSession;
359066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSocket;
369066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.SSLSocketFactory;
379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.TrustManager;
389066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport javax.net.ssl.X509TrustManager;
393c7c351a6217ac48b741740167c201a679a0ca65Brian Carlstromimport org.apache.harmony.xnet.provider.jsse.OpenSSLContextImpl;
4060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnorimport org.apache.harmony.xnet.provider.jsse.OpenSSLSocketImpl;
419066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectimport org.apache.harmony.xnet.provider.jsse.SSLClientSessionCache;
429066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
439066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project/**
4460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * SSLSocketFactory implementation with several extra features:
457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor *
4660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <ul>
4760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <li>Timeout specification for SSL handshake operations
487fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <li>Hostname verification in most cases (see WARNINGs below)
4960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * <li>Optional SSL session caching with {@link SSLSessionCache}
509d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor * <li>Optionally bypass all SSL certificate checks
5160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor * </ul>
527fc93c36ae235115727296780dbc35101622bbd4Dan Egnor *
537fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * The handshake timeout does not apply to actual TCP socket connection.
547fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * If you want a connection timeout as well, use {@link #createSocket()}
557fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * and {@link Socket#connect(SocketAddress, int)}, after which you
567fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * must verify the identity of the server you are connected to.
577fc93c36ae235115727296780dbc35101622bbd4Dan Egnor *
587fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p class="caution"><b>Most {@link SSLSocketFactory} implementations do not
597fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * verify the server's identity, allowing man-in-the-middle attacks.</b>
607fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * This implementation does check the server's certificate hostname, but only
617fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * for createSocket variants that specify a hostname.  When using methods that
627fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * use {@link InetAddress} or which return an unconnected socket, you MUST
637fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * verify the server's identity yourself to ensure a secure connection.</p>
647fc93c36ae235115727296780dbc35101622bbd4Dan Egnor *
657fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p>One way to verify the server's identity is to use
667fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@link HttpsURLConnection#getDefaultHostnameVerifier()} to get a
677fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * {@link HostnameVerifier} to verify the certificate hostname.
687fc93c36ae235115727296780dbc35101622bbd4Dan Egnor *
697fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * <p>On development devices, "setprop socket.relaxsslcheck yes" bypasses all
707fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * SSL certificate and hostname checks for testing purposes.  This setting
717fc93c36ae235115727296780dbc35101622bbd4Dan Egnor * requires root access.
729066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project */
739066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Projectpublic class SSLCertificateSocketFactory extends SSLSocketFactory {
7460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private static final String TAG = "SSLCertificateSocketFactory";
759066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
7660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private static final TrustManager[] INSECURE_TRUST_MANAGER = new TrustManager[] {
779066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        new X509TrustManager() {
7860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            public X509Certificate[] getAcceptedIssuers() { return null; }
7960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            public void checkClientTrusted(X509Certificate[] certs, String authType) { }
8060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            public void checkServerTrusted(X509Certificate[] certs, String authType) { }
819066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
829066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    };
839066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
847fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    private static final HostnameVerifier HOSTNAME_VERIFIER =
857fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        HttpsURLConnection.getDefaultHostnameVerifier();
867fc93c36ae235115727296780dbc35101622bbd4Dan Egnor
8760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private SSLSocketFactory mInsecureFactory = null;
8860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private SSLSocketFactory mSecureFactory = null;
891b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    private TrustManager[] mTrustManagers = null;
901b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    private KeyManager[] mKeyManagers = null;
91f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    private byte[] mNpnProtocols = null;
924ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin    private ECPrivateKey mChannelIdPrivateKey = null;
939066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
9460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private final int mHandshakeTimeoutMillis;
9560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private final SSLClientSessionCache mSessionCache;
969d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    private final boolean mSecure;
979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
9860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    /** @deprecated Use {@link #getDefault(int)} instead. */
9928c742573ccaeb55c16bc02fb25fdd86b8d1f76aJesse Wilson    @Deprecated
10060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public SSLCertificateSocketFactory(int handshakeTimeoutMillis) {
1019d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        this(handshakeTimeoutMillis, null, true);
1029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1039066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1049d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    private SSLCertificateSocketFactory(
105992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom            int handshakeTimeoutMillis, SSLSessionCache cache, boolean secure) {
10660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        mHandshakeTimeoutMillis = handshakeTimeoutMillis;
10760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        mSessionCache = cache == null ? null : cache.mSessionCache;
1089d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        mSecure = secure;
1099066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1109066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1119066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
1129d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * Returns a new socket factory instance with an optional handshake timeout.
1139066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     *
11460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
11560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     *         for none.  The socket timeout is reset to 0 after the handshake.
1167fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @return a new SSLSocketFactory with the specified parameters
1179066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     */
11860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public static SocketFactory getDefault(int handshakeTimeoutMillis) {
1199d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        return new SSLCertificateSocketFactory(handshakeTimeoutMillis, null, true);
1209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1219066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1229066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    /**
1239d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * Returns a new socket factory instance with an optional handshake timeout
1249d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * and SSL session cache.
1259066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project     *
12660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
12760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     *         for none.  The socket timeout is reset to 0 after the handshake.
128ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson     * @param cache The {@link SSLSessionCache} to use, or null for no cache.
1297fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @return a new SSLSocketFactory with the specified parameters
13060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     */
1319d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    public static SSLSocketFactory getDefault(int handshakeTimeoutMillis, SSLSessionCache cache) {
1329d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true);
1339d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    }
1349d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor
1359d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    /**
1369d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * Returns a new instance of a socket factory with all SSL security checks
1379d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * disabled, using an optional handshake timeout and SSL session cache.
1387fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
1397fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * <p class="caution"><b>Warning:</b> Sockets created using this factory
1407fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * are vulnerable to man-in-the-middle attacks!</p>
1419d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     *
1429d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
1439d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     *         for none.  The socket timeout is reset to 0 after the handshake.
144ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson     * @param cache The {@link SSLSessionCache} to use, or null for no cache.
1457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @return an insecure SSLSocketFactory with the specified parameters
1469d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor     */
1479d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor    public static SSLSocketFactory getInsecure(int handshakeTimeoutMillis, SSLSessionCache cache) {
1489d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, false);
1499066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1509066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
15160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    /**
15260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * Returns a socket factory (also named SSLSocketFactory, but in a different
15360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * namespace) for use with the Apache HTTP stack.
15460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     *
15560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
15660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     *         for none.  The socket timeout is reset to 0 after the handshake.
157ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson     * @param cache The {@link SSLSessionCache} to use, or null for no cache.
15860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     * @return a new SocketFactory with the specified parameters
15960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor     */
16060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public static org.apache.http.conn.ssl.SSLSocketFactory getHttpSocketFactory(
161ff5569948fda346d95d4615de6578f82d9614be3Jesse Wilson            int handshakeTimeoutMillis, SSLSessionCache cache) {
16260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return new org.apache.http.conn.ssl.SSLSocketFactory(
1639d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true));
1649066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
1659066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
1667fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
1677fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * Verify the hostname of the certificate used by the other end of a
1687fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * connected socket.  You MUST call this if you did not supply a hostname
1697fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * to {@link #createSocket()}.  It is harmless to call this method
1707fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * redundantly if the hostname has already been verified.
1717fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
1727fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * <p>Wildcard certificates are allowed to verify any matching hostname,
1737fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * so "foo.bar.example.com" is verified if the peer has a certificate
1747fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * for "*.example.com".
1757fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
1767fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @param socket An SSL socket which has been connected to a server
1777fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @param hostname The expected hostname of the remote server
1787fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @throws IOException if something goes wrong handshaking with the server
1797fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @throws SSLPeerUnverifiedException if the server cannot prove its identity
1807fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
1817fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * @hide
1827fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
1837fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    public static void verifyHostname(Socket socket, String hostname) throws IOException {
1847fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        if (!(socket instanceof SSLSocket)) {
1857fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            throw new IllegalArgumentException("Attempt to verify non-SSL socket");
1867fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        }
1877fc93c36ae235115727296780dbc35101622bbd4Dan Egnor
1887fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        if (!isSslCheckRelaxed()) {
1897fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            // The code at the start of OpenSSLSocketImpl.startHandshake()
1907fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            // ensures that the call is idempotent, so we can safely call it.
1917fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            SSLSocket ssl = (SSLSocket) socket;
1927fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            ssl.startHandshake();
1937fc93c36ae235115727296780dbc35101622bbd4Dan Egnor
1947fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            SSLSession session = ssl.getSession();
1957fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            if (session == null) {
1967fc93c36ae235115727296780dbc35101622bbd4Dan Egnor                throw new SSLException("Cannot verify SSL socket without session");
1977fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            }
1987fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            if (!HOSTNAME_VERIFIER.verify(hostname, session)) {
1997fc93c36ae235115727296780dbc35101622bbd4Dan Egnor                throw new SSLPeerUnverifiedException("Cannot verify hostname: " + hostname);
2007fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            }
2017fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        }
2027fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    }
2037fc93c36ae235115727296780dbc35101622bbd4Dan Egnor
2041b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    private SSLSocketFactory makeSocketFactory(
2051b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo            KeyManager[] keyManagers, TrustManager[] trustManagers) {
20660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        try {
2073c7c351a6217ac48b741740167c201a679a0ca65Brian Carlstrom            OpenSSLContextImpl sslContext = new OpenSSLContextImpl();
2081b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo            sslContext.engineInit(keyManagers, trustManagers, null);
2092c42c8fbaf02be1f3ea6298077128d0c419526f0Brian Carlstrom            sslContext.engineGetClientSessionContext().setPersistentCache(mSessionCache);
21060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            return sslContext.engineGetSocketFactory();
21160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        } catch (KeyManagementException e) {
21260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            Log.wtf(TAG, e);
21360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            return (SSLSocketFactory) SSLSocketFactory.getDefault();  // Fallback
2149066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
21560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    }
2169066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
2177fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    private static boolean isSslCheckRelaxed() {
2187fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        return "1".equals(SystemProperties.get("ro.debuggable")) &&
2197fc93c36ae235115727296780dbc35101622bbd4Dan Egnor            "yes".equals(SystemProperties.get("socket.relaxsslcheck"));
2207fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    }
2217fc93c36ae235115727296780dbc35101622bbd4Dan Egnor
22260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    private synchronized SSLSocketFactory getDelegate() {
2239d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor        // Relax the SSL check if instructed (for this factory, or systemwide)
2247fc93c36ae235115727296780dbc35101622bbd4Dan Egnor        if (!mSecure || isSslCheckRelaxed()) {
22560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            if (mInsecureFactory == null) {
2269d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                if (mSecure) {
2279d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                    Log.w(TAG, "*** BYPASSING SSL SECURITY CHECKS (socket.relaxsslcheck=yes) ***");
2289d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                } else {
2299d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                    Log.w(TAG, "Bypassing SSL security checks at caller's request");
2309d4b57545300c6de1722094404ae09bf0f6be937Dan Egnor                }
2311b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo                mInsecureFactory = makeSocketFactory(mKeyManagers, INSECURE_TRUST_MANAGER);
2329066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
23360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            return mInsecureFactory;
23460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        } else {
23560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            if (mSecureFactory == null) {
2361b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo                mSecureFactory = makeSocketFactory(mKeyManagers, mTrustManagers);
2379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project            }
23860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            return mSecureFactory;
2399066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project        }
2409066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
2419066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
2427fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
2431b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo     * Sets the {@link TrustManager}s to be used for connections made by this factory.
2441b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo     */
2451b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    public void setTrustManagers(TrustManager[] trustManager) {
2461b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        mTrustManagers = trustManager;
2471b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo
2481b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        // Clear out all cached secure factories since configurations have changed.
2491b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        mSecureFactory = null;
2501b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        // Note - insecure factories only ever use the INSECURE_TRUST_MANAGER so they need not
2511b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        // be cleared out here.
2521b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    }
2531b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo
2541b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    /**
255f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * Sets the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next
256f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * Protocol Negotiation (NPN)</a> protocols that this peer is interested in.
257f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     *
258f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * <p>For servers this is the sequence of protocols to advertise as
259f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * supported, in order of preference. This list is sent unencrypted to
260f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * all clients that support NPN.
261f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     *
262f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * <p>For clients this is a list of supported protocols to match against the
263f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * server's list. If there is no protocol supported by both client and
264f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * server then the first protocol in the client's list will be selected.
265f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * The order of the client's protocols is otherwise insignificant.
266f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     *
2672108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson     * @param npnProtocols a non-empty list of protocol byte arrays. All arrays
2682108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson     *     must be non-empty and of length less than 256.
269f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     */
270f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    public void setNpnProtocols(byte[][] npnProtocols) {
271f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        this.mNpnProtocols = toNpnProtocolsList(npnProtocols);
272f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    }
273f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson
274f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    /**
275f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * Returns an array containing the concatenation of length-prefixed byte
276f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * strings.
277f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     */
278f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    static byte[] toNpnProtocolsList(byte[]... npnProtocols) {
2792108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson        if (npnProtocols.length == 0) {
2802108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson            throw new IllegalArgumentException("npnProtocols.length == 0");
2812108ead7f125536874d6de6ca1c0c4cffbf61b44Jesse Wilson        }
282f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        int totalLength = 0;
283f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        for (byte[] s : npnProtocols) {
284f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            if (s.length == 0 || s.length > 255) {
285f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson                throw new IllegalArgumentException("s.length == 0 || s.length > 255: " + s.length);
286f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            }
287f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            totalLength += 1 + s.length;
288f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        }
289f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        byte[] result = new byte[totalLength];
290f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        int pos = 0;
291f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        for (byte[] s : npnProtocols) {
292f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            result[pos++] = (byte) s.length;
293f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            for (byte b : s) {
294f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson                result[pos++] = b;
295f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson            }
296f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        }
297f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        return result;
298f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    }
299f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson
300f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    /**
301f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * Returns the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next
302f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * Protocol Negotiation (NPN)</a> protocol selected by client and server, or
303f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * null if no protocol was negotiated.
304f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     *
305f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     * @param socket a socket created by this factory.
306b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @throws IllegalArgumentException if the socket was not created by this factory.
307f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson     */
308f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    public byte[] getNpnSelectedProtocol(Socket socket) {
309b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        return castToOpenSSLSocket(socket).getNpnSelectedProtocol();
310f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    }
311f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson
312f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson    /**
3131b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo     * Sets the {@link KeyManager}s to be used for connections made by this factory.
3141b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo     */
3151b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    public void setKeyManagers(KeyManager[] keyManagers) {
3161b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        mKeyManagers = keyManagers;
3171b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo
3181b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        // Clear out any existing cached factories since configurations have changed.
3191b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        mSecureFactory = null;
3201b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo        mInsecureFactory = null;
3211b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    }
3221b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo
323b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    /**
3244ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     * Sets the {@link ECPrivateKey} to be used for TLS Channel ID by connections made by this
3254ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     * factory.
3264ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     *
3274ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     * @param privateKey private key (enables TLS Channel ID) or {@code null} for no key (disables
3284ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     *        TLS Channel ID). The private key has to be an Elliptic Curve (EC) key based on the
3294ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     *        NIST P-256 curve (aka SECG secp256r1 or ANSI X9.62 prime256v1).
3304ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     *
3314ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     * @hide
3324ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin     */
3334ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin    public void setChannelIdPrivateKey(ECPrivateKey privateKey) {
3344ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        mChannelIdPrivateKey = privateKey;
3354ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin    }
3364ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin
3374ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin    /**
338b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * Enables <a href="http://tools.ietf.org/html/rfc5077#section-3.2">session ticket</a>
339b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * support on the given socket.
340b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     *
341b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @param socket a socket created by this factory
342b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @param useSessionTickets {@code true} to enable session ticket support on this socket.
343b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @throws IllegalArgumentException if the socket was not created by this factory.
344b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     */
345b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    public void setUseSessionTickets(Socket socket, boolean useSessionTickets) {
346b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        castToOpenSSLSocket(socket).setUseSessionTickets(useSessionTickets);
347b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    }
348b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath
349b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    /**
350b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * Turns on <a href="http://tools.ietf.org/html/rfc6066#section-3">Server
351b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * Name Indication (SNI)</a> on a given socket.
352b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     *
353b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @param socket a socket created by this factory.
354b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @param hostName the desired SNI hostname, null to disable.
355b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     * @throws IllegalArgumentException if the socket was not created by this factory.
356b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath     */
357b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    public void setHostname(Socket socket, String hostName) {
358b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        castToOpenSSLSocket(socket).setHostname(hostName);
359b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    }
360b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath
3617ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom    /**
3627ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     * Sets this socket's SO_SNDTIMEO write timeout in milliseconds.
3637ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     * Use 0 for no timeout.
3647ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     * To take effect, this option must be set before the blocking method was called.
3657ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     *
3667ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     * @param socket a socket created by this factory.
367992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom     * @param timeout the desired write timeout in milliseconds.
3687ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     * @throws IllegalArgumentException if the socket was not created by this factory.
369992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom     *
370992f238d13fff7c21b60ef6958784a4ed2156784Brian Carlstrom     * @hide
3717ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom     */
3727ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom    public void setSoWriteTimeout(Socket socket, int writeTimeoutMilliseconds)
3737ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom            throws SocketException {
3747ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom        castToOpenSSLSocket(socket).setSoWriteTimeout(writeTimeoutMilliseconds);
3757ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom    }
3767ab7a8b582b29d34ec0fdbd0c727e225f350bb30Brian Carlstrom
377b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    private static OpenSSLSocketImpl castToOpenSSLSocket(Socket socket) {
378b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        if (!(socket instanceof OpenSSLSocketImpl)) {
379b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath            throw new IllegalArgumentException("Socket not created by this factory: "
380b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath                    + socket);
381b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        }
382b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath
383b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath        return (OpenSSLSocketImpl) socket;
384b4db962da0fecd9a6f2714148bbdea023610842fNarayan Kamath    }
3851b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo
3861b52806e21270ccbe90d27f3dd93cbee1a81d09eBen Komalo    /**
3877fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * {@inheritDoc}
3887fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
389df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * <p>This method verifies the peer's certificate hostname after connecting
390df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
3917fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
39260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
39360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket(Socket k, String host, int port, boolean close) throws IOException {
39460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(k, host, port, close);
395f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
39660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
3974ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
398df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        if (mSecure) {
399df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler            verifyHostname(s, host);
400df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        }
40160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
4029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4039066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4047fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
4057fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * Creates a new socket which is not connected to any remote host.
4067fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * You must use {@link Socket#connect} to connect the socket.
4077fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
4087fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * <p class="caution"><b>Warning:</b> Hostname verification is not performed
4097fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * with this method.  You MUST verify the server's identity after connecting
4107fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * the socket to avoid man-in-the-middle attacks.</p>
4117fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
41260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
41360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket() throws IOException {
41460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket();
415f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
41660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
4174ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
41860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
4199066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4209066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4217fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
4227fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * {@inheritDoc}
4237fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
4247fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * <p class="caution"><b>Warning:</b> Hostname verification is not performed
4257fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * with this method.  You MUST verify the server's identity after connecting
4267fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * the socket to avoid man-in-the-middle attacks.</p>
4277fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
42860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
42960586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket(InetAddress addr, int port, InetAddress localAddr, int localPort)
43060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            throws IOException {
43160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(
43260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor                addr, port, localAddr, localPort);
433f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
43460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
4354ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
43660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
4379066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4389066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4397fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
4407fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * {@inheritDoc}
4417fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
4427fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * <p class="caution"><b>Warning:</b> Hostname verification is not performed
4437fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * with this method.  You MUST verify the server's identity after connecting
4447fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * the socket to avoid man-in-the-middle attacks.</p>
4457fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
44660586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
44760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket(InetAddress addr, int port) throws IOException {
44860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(addr, port);
449f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
45060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
4514ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
45260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
4539066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4549066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4557fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
4567fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * {@inheritDoc}
4577fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
458df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * <p>This method verifies the peer's certificate hostname after connecting
459df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
4607fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
46160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
46260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket(String host, int port, InetAddress localAddr, int localPort)
46360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor            throws IOException {
46460586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(
46560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor                host, port, localAddr, localPort);
466f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
46760586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
4684ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
469df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        if (mSecure) {
470df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler            verifyHostname(s, host);
471df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        }
47260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
47360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    }
4749066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
4757fc93c36ae235115727296780dbc35101622bbd4Dan Egnor    /**
4767fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     * {@inheritDoc}
4777fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     *
478df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * <p>This method verifies the peer's certificate hostname after connecting
479df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler     * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
4807fc93c36ae235115727296780dbc35101622bbd4Dan Egnor     */
48160586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
48260586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    public Socket createSocket(String host, int port) throws IOException {
48360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(host, port);
484f5fb5e80963abeabdf0ff10dcee068344235082eJesse Wilson        s.setNpnProtocols(mNpnProtocols);
48560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        s.setHandshakeTimeout(mHandshakeTimeoutMillis);
4864ef6c9b6a16c9b65699705aaa64977fc60dd3331Alex Klyubin        s.setChannelIdPrivateKey(mChannelIdPrivateKey);
487df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        if (mSecure) {
488df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler            verifyHostname(s, host);
489df27c0c26209fe04de332497beafcafc1fbaad2bAndrew Stadler        }
49060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return s;
4919066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4929066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
49360586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
4949066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    public String[] getDefaultCipherSuites() {
49560586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return getDelegate().getSupportedCipherSuites();
4969066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
4979066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project
49860586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor    @Override
4999066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    public String[] getSupportedCipherSuites() {
50060586f2ec65d16d185767fce4311d3ed0e9112acDan Egnor        return getDelegate().getSupportedCipherSuites();
5019066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project    }
5029066cfe9886ac131c34d59ed0e2d287b0e3c0087The Android Open Source Project}
503