blob: f816caa6da2f77eac5fbabe78d5290b1387716d3 [file] [log] [blame]
/*
* Copyright (C) 2008 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.net;
import android.util.Log;
import android.util.Config;
import android.net.http.DomainNameChecker;
import android.os.SystemProperties;
import javax.net.SocketFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import java.io.IOException;
import java.net.InetAddress;
import java.net.Socket;
import java.security.NoSuchAlgorithmException;
import java.security.KeyManagementException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.GeneralSecurityException;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
public class SSLCertificateSocketFactory extends SSLSocketFactory {
private static final boolean DBG = true;
private static final String LOG_TAG = "SSLCertificateSocketFactory";
private static X509TrustManager sDefaultTrustManager;
private final int socketReadTimeoutForSslHandshake;
static {
try {
TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
tmf.init((KeyStore)null);
TrustManager[] tms = tmf.getTrustManagers();
if (tms != null) {
for (TrustManager tm : tms) {
if (tm instanceof X509TrustManager) {
sDefaultTrustManager = (X509TrustManager)tm;
break;
}
}
}
} catch (NoSuchAlgorithmException e) {
Log.e(LOG_TAG, "Unable to get X509 Trust Manager ", e);
} catch (KeyStoreException e) {
Log.e(LOG_TAG, "Key Store exception while initializing TrustManagerFactory ", e);
}
}
private static final TrustManager[] TRUST_MANAGER = new TrustManager[] {
new X509TrustManager() {
public X509Certificate[] getAcceptedIssuers() {
return null;
}
public void checkClientTrusted(X509Certificate[] certs,
String authType) { }
public void checkServerTrusted(X509Certificate[] certs,
String authType) { }
}
};
private SSLSocketFactory factory;
public SSLCertificateSocketFactory(int socketReadTimeoutForSslHandshake)
throws NoSuchAlgorithmException, KeyManagementException {
SSLContext context = SSLContext.getInstance("TLS");
context.init(null, TRUST_MANAGER, new java.security.SecureRandom());
factory = (SSLSocketFactory) context.getSocketFactory();
this.socketReadTimeoutForSslHandshake = socketReadTimeoutForSslHandshake;
}
/**
* Returns a default instantiation of a new socket factory which
* only allows SSL connections with valid certificates.
*
* @param socketReadTimeoutForSslHandshake the socket read timeout used for performing
* ssl handshake. The socket read timeout is set back to 0 after the handshake.
* @return a new SocketFactory, or null on error
*/
public static SocketFactory getDefault(int socketReadTimeoutForSslHandshake) {
try {
return new SSLCertificateSocketFactory(socketReadTimeoutForSslHandshake);
} catch (NoSuchAlgorithmException e) {
Log.e(LOG_TAG,
"SSLCertifcateSocketFactory.getDefault" +
" NoSuchAlgorithmException " , e);
return null;
} catch (KeyManagementException e) {
Log.e(LOG_TAG,
"SSLCertifcateSocketFactory.getDefault" +
" KeyManagementException " , e);
return null;
}
}
private boolean hasValidCertificateChain(Certificate[] certs)
throws IOException {
if (sDefaultTrustManager == null) {
if (Config.LOGD) {
Log.d(LOG_TAG,"hasValidCertificateChain():" +
" null default trust manager!");
}
throw new IOException("null default trust manager");
}
boolean trusted = (certs != null && (certs.length > 0));
if (trusted) {
try {
// the authtype we pass in doesn't actually matter
sDefaultTrustManager.checkServerTrusted((X509Certificate[]) certs, "RSA");
} catch (GeneralSecurityException e) {
String exceptionMessage = e != null ? e.getMessage() : "none";
if (Config.LOGD) {
Log.d(LOG_TAG,"hasValidCertificateChain(): sec. exception: "
+ exceptionMessage);
}
trusted = false;
}
}
return trusted;
}
private void validateSocket(SSLSocket sslSock, String destHost)
throws IOException
{
if (Config.LOGV) {
Log.v(LOG_TAG,"validateSocket() to host "+destHost);
}
String relaxSslCheck = SystemProperties.get("socket.relaxsslcheck");
String secure = SystemProperties.get("ro.secure");
// only allow relaxing the ssl check on non-secure builds where the relaxation is
// specifically requested.
if ("0".equals(secure) && "yes".equals(relaxSslCheck)) {
if (Config.LOGD) {
Log.d(LOG_TAG,"sys prop socket.relaxsslcheck is set," +
" ignoring invalid certs");
}
return;
}
Certificate[] certs = null;
sslSock.setUseClientMode(true);
sslSock.startHandshake();
certs = sslSock.getSession().getPeerCertificates();
// check that the root certificate in the chain belongs to
// a CA we trust
if (certs == null) {
Log.e(LOG_TAG,
"[SSLCertificateSocketFactory] no trusted root CA");
throw new IOException("no trusted root CA");
}
if (Config.LOGV) {
Log.v(LOG_TAG,"validateSocket # certs = " +certs.length);
}
if (!hasValidCertificateChain(certs)) {
if (Config.LOGD) {
Log.d(LOG_TAG,"validateSocket(): certificate untrusted!");
}
throw new IOException("Certificate untrusted");
}
X509Certificate lastChainCert = (X509Certificate) certs[0];
if (!DomainNameChecker.match(lastChainCert, destHost)) {
if (Config.LOGD) {
Log.d(LOG_TAG,"validateSocket(): domain name check failed");
}
throw new IOException("Domain Name check failed");
}
}
public Socket createSocket(Socket socket, String s, int i, boolean flag)
throws IOException
{
throw new IOException("Cannot validate certification without a hostname");
}
public Socket createSocket(InetAddress inaddr, int i, InetAddress inaddr2, int j)
throws IOException
{
throw new IOException("Cannot validate certification without a hostname");
}
public Socket createSocket(InetAddress inaddr, int i) throws IOException {
throw new IOException("Cannot validate certification without a hostname");
}
public Socket createSocket(String s, int i, InetAddress inaddr, int j) throws IOException {
SSLSocket sslSock = (SSLSocket) factory.createSocket(s, i, inaddr, j);
if (socketReadTimeoutForSslHandshake >= 0) {
sslSock.setSoTimeout(socketReadTimeoutForSslHandshake);
}
validateSocket(sslSock,s);
sslSock.setSoTimeout(0);
return sslSock;
}
public Socket createSocket(String s, int i) throws IOException {
SSLSocket sslSock = (SSLSocket) factory.createSocket(s, i);
if (socketReadTimeoutForSslHandshake >= 0) {
sslSock.setSoTimeout(socketReadTimeoutForSslHandshake);
}
validateSocket(sslSock,s);
sslSock.setSoTimeout(0);
return sslSock;
}
public String[] getDefaultCipherSuites() {
return factory.getSupportedCipherSuites();
}
public String[] getSupportedCipherSuites() {
return factory.getSupportedCipherSuites();
}
}