AdvancedSslSocketFactory.java 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. /* ownCloud Android client application
  2. * Copyright (C) 2012 Bartek Przybylski
  3. *
  4. * This program is free software: you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation, either version 3 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  16. *
  17. */
  18. package com.owncloud.android.network;
  19. import java.io.IOException;
  20. import java.net.InetAddress;
  21. import java.net.InetSocketAddress;
  22. import java.net.Socket;
  23. import java.net.SocketAddress;
  24. import java.net.UnknownHostException;
  25. import java.security.cert.X509Certificate;
  26. import java.util.Enumeration;
  27. import javax.net.SocketFactory;
  28. import javax.net.ssl.SSLContext;
  29. import javax.net.ssl.SSLException;
  30. import javax.net.ssl.SSLHandshakeException;
  31. import javax.net.ssl.SSLPeerUnverifiedException;
  32. import javax.net.ssl.SSLSession;
  33. import javax.net.ssl.SSLSessionContext;
  34. import javax.net.ssl.SSLSocket;
  35. import org.apache.commons.httpclient.ConnectTimeoutException;
  36. import org.apache.commons.httpclient.params.HttpConnectionParams;
  37. import org.apache.commons.httpclient.protocol.ProtocolSocketFactory;
  38. import org.apache.http.conn.ssl.X509HostnameVerifier;
  39. import android.util.Log;
  40. /**
  41. * AdvancedSSLProtocolSocketFactory allows to create SSL {@link Socket}s with
  42. * a custom SSLContext and an optional Hostname Verifier.
  43. *
  44. * @author David A. Velasco
  45. */
  46. public class AdvancedSslSocketFactory implements ProtocolSocketFactory {
  47. private static final String TAG = AdvancedSslSocketFactory.class.getSimpleName();
  48. private SSLContext mSslContext = null;
  49. private AdvancedX509TrustManager mTrustManager = null;
  50. private X509HostnameVerifier mHostnameVerifier = null;
  51. public SSLContext getSslContext() {
  52. return mSslContext;
  53. }
  54. /**
  55. * Constructor for AdvancedSSLProtocolSocketFactory.
  56. */
  57. public AdvancedSslSocketFactory(SSLContext sslContext, AdvancedX509TrustManager trustManager, X509HostnameVerifier hostnameVerifier) {
  58. if (sslContext == null)
  59. throw new IllegalArgumentException("AdvancedSslSocketFactory can not be created with a null SSLContext");
  60. if (trustManager == null)
  61. throw new IllegalArgumentException("AdvancedSslSocketFactory can not be created with a null Trust Manager");
  62. mSslContext = sslContext;
  63. mTrustManager = trustManager;
  64. mHostnameVerifier = hostnameVerifier;
  65. }
  66. /**
  67. * @see ProtocolSocketFactory#createSocket(java.lang.String,int,java.net.InetAddress,int)
  68. */
  69. public Socket createSocket(String host, int port, InetAddress clientHost, int clientPort) throws IOException, UnknownHostException {
  70. Socket socket = mSslContext.getSocketFactory().createSocket(host, port, clientHost, clientPort);
  71. verifyPeerIdentity(host, port, socket);
  72. return socket;
  73. }
  74. /**
  75. * Attempts to get a new socket connection to the given host within the
  76. * given time limit.
  77. *
  78. * @param host the host name/IP
  79. * @param port the port on the host
  80. * @param clientHost the local host name/IP to bind the socket to
  81. * @param clientPort the port on the local machine
  82. * @param params {@link HttpConnectionParams Http connection parameters}
  83. *
  84. * @return Socket a new socket
  85. *
  86. * @throws IOException if an I/O error occurs while creating the socket
  87. * @throws UnknownHostException if the IP address of the host cannot be
  88. * determined
  89. */
  90. public Socket createSocket(final String host, final int port,
  91. final InetAddress localAddress, final int localPort,
  92. final HttpConnectionParams params) throws IOException,
  93. UnknownHostException, ConnectTimeoutException {
  94. Log.d(TAG, "Creating SSL Socket with remote " + host + ":" + port + ", local " + localAddress + ":" + localPort + ", params: " + params);
  95. if (params == null) {
  96. throw new IllegalArgumentException("Parameters may not be null");
  97. }
  98. int timeout = params.getConnectionTimeout();
  99. SocketFactory socketfactory = mSslContext.getSocketFactory();
  100. Log.d(TAG, " ... with connection timeout " + timeout + " and socket timeout " + params.getSoTimeout());
  101. Socket socket = socketfactory.createSocket();
  102. SocketAddress localaddr = new InetSocketAddress(localAddress, localPort);
  103. SocketAddress remoteaddr = new InetSocketAddress(host, port);
  104. socket.setSoTimeout(params.getSoTimeout());
  105. socket.bind(localaddr);
  106. socket.connect(remoteaddr, timeout);
  107. verifyPeerIdentity(host, port, socket);
  108. return socket;
  109. }
  110. /**
  111. * @see ProtocolSocketFactory#createSocket(java.lang.String,int)
  112. */
  113. public Socket createSocket(String host, int port) throws IOException,
  114. UnknownHostException {
  115. Log.d(TAG, "Creating SSL Socket with remote " + host + ":" + port);
  116. Socket socket = mSslContext.getSocketFactory().createSocket(host, port);
  117. verifyPeerIdentity(host, port, socket);
  118. return socket;
  119. }
  120. public boolean equals(Object obj) {
  121. return ((obj != null) && obj.getClass().equals(
  122. AdvancedSslSocketFactory.class));
  123. }
  124. public int hashCode() {
  125. return AdvancedSslSocketFactory.class.hashCode();
  126. }
  127. public X509HostnameVerifier getHostNameVerifier() {
  128. return mHostnameVerifier;
  129. }
  130. public void setHostNameVerifier(X509HostnameVerifier hostnameVerifier) {
  131. mHostnameVerifier = hostnameVerifier;
  132. }
  133. /**
  134. * Verifies the identity of the server.
  135. *
  136. * The server certificate is verified first.
  137. *
  138. * Then, the host name is compared with the content of the server certificate using the current host name verifier, if any.
  139. * @param socket
  140. */
  141. private void verifyPeerIdentity(String host, int port, Socket socket) throws IOException {
  142. try {
  143. CertificateCombinedException failInHandshake = null;
  144. /// 1. VERIFY THE SERVER CERTIFICATE through the registered TrustManager (that should be an instance of AdvancedX509TrustManager)
  145. try {
  146. SSLSocket sock = (SSLSocket) socket; // a new SSLSession instance is created as a "side effect"
  147. sock.startHandshake();
  148. } catch (RuntimeException e) {
  149. if (e instanceof CertificateCombinedException) {
  150. failInHandshake = (CertificateCombinedException) e;
  151. } else {
  152. Throwable cause = e.getCause();
  153. Throwable previousCause = null;
  154. while (cause != null && cause != previousCause && !(cause instanceof CertificateCombinedException)) {
  155. previousCause = cause;
  156. cause = cause.getCause();
  157. }
  158. if (cause != null && cause instanceof CertificateCombinedException) {
  159. failInHandshake = (CertificateCombinedException)cause;
  160. }
  161. }
  162. if (failInHandshake == null) {
  163. throw e;
  164. }
  165. failInHandshake.setHostInUrl(host);
  166. }
  167. /// 2. VERIFY HOSTNAME
  168. SSLSession newSession = null;
  169. boolean verifiedHostname = true;
  170. if (mHostnameVerifier != null) {
  171. if (failInHandshake != null) {
  172. /// 2.1 : a new SSLSession instance was NOT created in the handshake
  173. X509Certificate serverCert = failInHandshake.getServerCertificate();
  174. try {
  175. mHostnameVerifier.verify(host, serverCert);
  176. } catch (SSLException e) {
  177. verifiedHostname = false;
  178. }
  179. } else {
  180. /// 2.2 : a new SSLSession instance was created in the handshake
  181. newSession = ((SSLSocket)socket).getSession();
  182. if (!mTrustManager.isKnownServer((X509Certificate)(newSession.getPeerCertificates()[0]))) {
  183. verifiedHostname = mHostnameVerifier.verify(host, newSession);
  184. }
  185. }
  186. }
  187. /// 3. Combine the exceptions to throw, if any
  188. if (!verifiedHostname) {
  189. SSLPeerUnverifiedException pue = new SSLPeerUnverifiedException("Names in the server certificate do not match to " + host + " in the URL");
  190. if (failInHandshake == null) {
  191. failInHandshake = new CertificateCombinedException((X509Certificate) newSession.getPeerCertificates()[0]);
  192. failInHandshake.setHostInUrl(host);
  193. }
  194. failInHandshake.setSslPeerUnverifiedException(pue);
  195. pue.initCause(failInHandshake);
  196. throw pue;
  197. } else if (failInHandshake != null) {
  198. SSLHandshakeException hse = new SSLHandshakeException("Server certificate could not be verified");
  199. hse.initCause(failInHandshake);
  200. throw hse;
  201. }
  202. } catch (IOException io) {
  203. try {
  204. socket.close();
  205. } catch (Exception x) {
  206. // NOTHING - irrelevant exception for the caller
  207. }
  208. throw io;
  209. }
  210. }
  211. }