`
hyshucom
  • 浏览: 809246 次
文章分类
社区版块
存档分类
最新评论

android中进行https连接的方式(源码)

 
阅读更多

如果不需要验证服务器端证书,直接照这里做

  1. publicclassDemoextendsActivity{
  2. /**Calledwhentheactivityisfirstcreated.*/
  3. privateTextViewtext;
  4. @Override
  5. publicvoidonCreate(BundlesavedInstanceState){
  6. super.onCreate(savedInstanceState);
  7. setContentView(R.layout.main);
  8. text=(TextView)findViewById(R.id.text);
  9. GetHttps();
  10. }
  11. privatevoidGetHttps(){
  12. Stringhttps="https://800wen.com/";
  13. try{
  14. SSLContextsc=SSLContext.getInstance("TLS");
  15. sc.init(null,newTrustManager[]{newMyTrustManager()},newSecureRandom());
  16. HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
  17. HttpsURLConnection.setDefaultHostnameVerifier(newMyHostnameVerifier());
  18. HttpsURLConnectionconn=(HttpsURLConnection)newURL(https).openConnection();
  19. conn.setDoOutput(true);
  20. conn.setDoInput(true);
  21. conn.connect();
  22. BufferedReaderbr=newBufferedReader(newInputStreamReader(conn.getInputStream()));
  23. StringBuffersb=newStringBuffer();
  24. Stringline;
  25. while((line=br.readLine())!=null)
  26. sb.append(line);
  27. text.setText(sb.toString());
  28. }catch(Exceptione){
  29. Log.e(this.getClass().getName(),e.getMessage());
  30. }
  31. }
  32. privateclassMyHostnameVerifierimplementsHostnameVerifier{
  33. @Override
  34. publicbooleanverify(Stringhostname,SSLSessionsession){
  35. //TODOAuto-generatedmethodstub
  36. returntrue;
  37. }
  38. }
  39. privateclassMyTrustManagerimplementsX509TrustManager{
  40. @Override
  41. publicvoidcheckClientTrusted(X509Certificate[]chain,StringauthType)
  42. throwsCertificateException{
  43. //TODOAuto-generatedmethodstub
  44. }
  45. @Override
  46. publicvoidcheckServerTrusted(X509Certificate[]chain,StringauthType)
  47. throwsCertificateException{
  48. //TODOAuto-generatedmethodstub
  49. }
  50. @Override
  51. publicX509Certificate[]getAcceptedIssuers(){
  52. //TODOAuto-generatedmethodstub
  53. returnnull;
  54. }
  55. }
  56. }

如果需要验证服务器端证书(这样能够防钓鱼),我是这样做的,还有些问题问大牛:
a. 导出公钥。在浏览器上用https访问tomcat,查看其证书,并另存为一个文件(存成了X.509格式:xxxx.cer)
b. 导入公钥。把xxxx.cer放在Android的assets文件夹中,以方便在运行时通过代码读取此证书,留了两个问题给大牛:

  1. AssetManageram=context.getAssets();
  2. InputStreamins=am.open("robusoft.cer");
  3. try{
  4. //读取证书
  5. CertificateFactorycerFactory=CertificateFactory.getInstance("X.509");//问1
  6. Certificatecer=cerFactory.generateCertificate(ins);
  7. //创建一个证书库,并将证书导入证书库
  8. KeyStorekeyStore=KeyStore.getInstance("PKCS12","BC");//问2
  9. keyStore.load(null,null);
  10. keyStore.setCertificateEntry("trust",cer);
  11. returnkeyStore;
  12. }finally{
  13. ins.close();
  14. }
  15. //把咱的证书库作为信任证书库
  16. SSLSocketFactorysocketFactory=newSSLSocketFactory(keystore);
  17. Schemesch=newScheme("https",socketFactory,443);
  18. //完工
  19. HttpClientmHttpClient=newDefaultHttpClient();
  20. mHttpClient.getConnectionManager().getSchemeRegistry().register(sch);

问1:这里用"PKCS12"不行

答1:PKCS12和JKS是keystore的type,不是Certificate的type,所以X.509不能用PKCS12代替


问2:这里用"JKS"不行。

答2:android平台上支持的keystore type好像只有PKCS12,不支持JKS,所以不能用JKS代替在PKCS12,不过在windows平台上是可以代替的


分享到:
评论

相关推荐

Global site tag (gtag.js) - Google Analytics