okhttp使用https自签名请求

由于苹果在2017实行全部请求必须https,公司的项目需要整改联网请求为https,现在把实现过程写出来。
首先建立httpsutils工具类

package com.xiaowen.ethome.utils.request;
import java.io.IOException;
import java.io.InputStream;
import java.security.KeyManagementException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.UnrecoverableKeyException;
import java.security.cert.CertificateException;
import java.security.cert.CertificateFactory;
import java.security.cert.X509Certificate;
import javax.net.ssl.HostnameVerifier;
import javax.net.ssl.KeyManager;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSession;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;

public class HttpsUtils
{
public static class SSLParams
{
    public SSLSocketFactory sSLSocketFactory;
    public X509TrustManager trustManager;
}

public static SSLParams getSslSocketFactory(InputStream[] certificates, InputStream bksFile, String password)
{
    SSLParams sslParams = new SSLParams();
    try
    {
        TrustManager[] trustManagers = prepareTrustManager(certificates);
        KeyManager[] keyManagers = prepareKeyManager(bksFile, password);
        SSLContext sslContext = SSLContext.getInstance("TLS");
        X509TrustManager trustManager = null;
        if (trustManagers != null)
        {
            trustManager = new MyTrustManager(chooseTrustManager(trustManagers));
        } else
        {
            trustManager = new UnSafeTrustManager();
        }
        sslContext.init(keyManagers, new TrustManager[]{trustManager},null);
        sslParams.sSLSocketFactory = sslContext.getSocketFactory();
        sslParams.trustManager = trustManager;
        return sslParams;
    } catch (NoSuchAlgorithmException e)
    {
        throw new AssertionError(e);
    } catch (KeyManagementException e)
    {
        throw new AssertionError(e);
    } catch (KeyStoreException e)
    {
        throw new AssertionError(e);
    }
}

private class UnSafeHostnameVerifier implements HostnameVerifier
{
    @Override
    public boolean verify(String hostname, SSLSession session)
    {
        return true;
    }
}

private static class UnSafeTrustManager implements X509TrustManager
{
    @Override
    public void checkClientTrusted(X509Certificate[] chain, String authType)
            throws CertificateException
    {
    }

    @Override
    public void checkServerTrusted(X509Certificate[] chain, String authType)
            throws CertificateException
    {
    }

    @Override
    public X509Certificate[] getAcceptedIssuers()
    {
        return new X509Certificate[]{};
    }
}

private static TrustManager[] prepareTrustManager(InputStream... certificates)
{
    if (certificates == null || certificates.length <= 0) return null;
    try
    {

        CertificateFactory certificateFactory = CertificateFactory.getInstance("X.509");
        KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
        keyStore.load(null);
        int index = 0;
        for (InputStream certificate : certificates)
        {
            String certificateAlias = Integer.toString(index++);
            keyStore.setCertificateEntry(certificateAlias, certificateFactory.generateCertificate(certificate));
            try
            {
                if (certificate != null)
                    certificate.close();
            } catch (IOException e)

            {
            }
        }
        TrustManagerFactory trustManagerFactory = null;

        trustManagerFactory = TrustManagerFactory.
                getInstance(TrustManagerFactory.getDefaultAlgorithm());
        trustManagerFactory.init(keyStore);

        TrustManager[] trustManagers = trustManagerFactory.getTrustManagers();

        return trustManagers;
    } catch (NoSuchAlgorithmException e)
    {
        e.printStackTrace();
    } catch (CertificateException e)
    {
        e.printStackTrace();
    } catch (KeyStoreException e)
    {
        e.printStackTrace();
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return null;

}

private static KeyManager[] prepareKeyManager(InputStream bksFile, String password)
{
    try
    {
        if (bksFile == null || password == null) return null;

        KeyStore clientKeyStore = KeyStore.getInstance("BKS");
        clientKeyStore.load(bksFile, password.toCharArray());
        KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
        keyManagerFactory.init(clientKeyStore, password.toCharArray());
        return keyManagerFactory.getKeyManagers();

    } catch (KeyStoreException e)
    {
        e.printStackTrace();
    } catch (NoSuchAlgorithmException e)
    {
        e.printStackTrace();
    } catch (UnrecoverableKeyException e)
    {
        e.printStackTrace();
    } catch (CertificateException e)
    {
        e.printStackTrace();
    } catch (IOException e)
    {
        e.printStackTrace();
    } catch (Exception e)
    {
        e.printStackTrace();
    }
    return null;
}

private static X509TrustManager chooseTrustManager(TrustManager[] trustManagers)
{
    for (TrustManager trustManager : trustManagers)
    {
        if (trustManager instanceof X509TrustManager)
        {
            return (X509TrustManager) trustManager;
        }
    }
    return null;
}


private static class MyTrustManager implements X509TrustManager
{
    private X509TrustManager defaultTrustManager;
    private X509TrustManager localTrustManager;

    public MyTrustManager(X509TrustManager localTrustManager) throws NoSuchAlgorithmException, KeyStoreException
    {
        TrustManagerFactory var4 = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
        var4.init((KeyStore) null);
        defaultTrustManager = chooseTrustManager(var4.getTrustManagers());
        this.localTrustManager = localTrustManager;
    }


    @Override
    public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException
    {

    }

    @Override
    public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException
    {
        try
        {
            defaultTrustManager.checkServerTrusted(chain, authType);
        } catch (CertificateException ce)
        {
            localTrustManager.checkServerTrusted(chain, authType);
        }
    }


    @Override
    public X509Certificate[] getAcceptedIssuers()
    {
        return new X509Certificate[0];
    }
}
}

获取支持https请求的builder

private OkHttpClient.Builder getSSLBuilder() {
        OkHttpClient.Builder builder = new OkHttpClient.Builder();
    InputStream inputStream=null;
    String localName= "testhost.cer";;
    try { inputStream=ETApplication.getInstance().getAssets().open(localName);
    } catch (IOException e) {
        LogUtils.logE("打开证书失败!");
        e.printStackTrace();
    }
    HttpsUtils.SSLParams sslParams = HttpsUtils.getSslSocketFactory(new InputStream[]{inputStream}, null, null);
    builder
            .hostnameVerifier(new HostnameVerifier() {
        @Override
        public boolean verify(String hostname, SSLSession session) {
            return true;
        }
    }).sslSocketFactory(sslParams.sSLSocketFactory, sslParams.trustManager);
    return builder;
}

然后用获取到的builder联网请求即可。
联网请求代码很简单,但是我在对接的时候还是遇到了问题,比如公司的本地服务器和测试服务器使用https请求都能成功,但是正式 的服务器请求却失败。代码都是一样,证书也没错,但是就是联网就抛出握手失败的异常如下图,但最蛋疼的是ios这边请求却正常,我就郁闷了。。。

okhttp使用https自签名请求_第1张图片
QQ图片20161208163559.png

最后百度谷歌,发现很有可能是服务器的设置问题,于是让后台招测试服务器与正式服务器的区别,后台也是没注意到,在对比jdk的时候以为两个都是jdk1.7就完事了,最后发现其实两个服务器一个使用的sun公司的jdk,一个使用的是openjdk,这样导致了android这边发送的请求到openjdk服务器,openjdk解析https请求出现错误,于是请求失败。最后把正式服务器的jdk更换后解决。。。

你可能感兴趣的:(okhttp使用https自签名请求)