Https系列之四:https的SSL證書在Android端基於okhttp,Retrofit的使用

Https系列會在下面幾篇文章中分別做介紹:

一:https的簡單介紹及SSL證書的生成
二:https的SSL證書在服務器端的部署,基於tomcat,spring boot
三:讓服務器同時支持http、https,基於spring boot
四:https的SSL證書在Android端基於okhttp,Retrofit的使用vue

全部文章會優先在:
微信公衆號「顏家大少」中發佈
轉載請標明出處java


先來回顧一下

前面已分別介紹了https,SSL證書的生成,並完成了服務器端的https的部署
並提到一個重要的用於客戶端的證書:公鑰證書
在前面文章中,自簽名SSL證書對應的公鑰證書爲:mycer.cer(固然這名字是本身隨便定的);在阿里雲申請的CA證書中對應的公鑰證書爲:*.pem
若是有不清楚的,請看我以前介紹過的文章android

Android自帶的可信任的CA公鑰證書

還要說明一下,Android系統有自帶的安卓承認的證書頒發機構(如:Wosign)頒發的可信任的CA公鑰證書,大概有100多個,
可本身查看,各個手機的查看方法可能不同,在個人手機中,能在下面的位置中找到:
「設置」->」更多設置「->」系統安全「->」信任的憑據」
也就是說,若是你服務器的證書是安卓承認的證書頒發機構頒發的,那麼你並不須要在Android端額外安裝公鑰證書,不然,你就須要安裝。
注:在不一樣版本的Android系統上,可信任的CA證書多是不同的,若是你擔憂在別人的Android系統上可能此CA證書不被信任,那你統一都安裝也是沒問題的
我在阿里雲上申請的免費型DV SSL證書,是屬於安卓承認的證書頒發機構頒發的,不須要額外安裝,固然咱們的自簽名證書,是必須要安裝的
其實我在測試的過程當中,把自簽名證書和阿里雲上申請的免費型DV SSL證書都用一樣的方法安裝了,都是OK的spring

咱們下面就開始基於okhttp來安裝公鑰證書了

先看看個人okhttp和retrofit的gradle版本tomcat

compile 'com.squareup.okhttp3:okhttp:3.8.1'
compile 'com.squareup.retrofit2:retrofit:2.3.0'

增長一個OkhttpManager類

統一處理OkHttpClient的證書,完整的代碼以下:安全

import android.content.Context;
import java.io.IOException;
import java.io.InputStream;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
import java.security.cert.Certificate;
import java.security.cert.CertificateFactory;
import java.util.Arrays;
import java.util.Collection;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import okhttp3.OkHttpClient;

public class OkhttpManager {
    static private OkhttpManager mOkhttpManager=null;
    private InputStream mTrustrCertificate;
    static public OkhttpManager getInstance()
    {
        if(mOkhttpManager==null)
        {
            mOkhttpManager=new OkhttpManager();
        }
        return mOkhttpManager;
    }

    private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException {
        try {
            KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
            InputStream in = null; // By convention, 'null' creates an empty key store.
            keyStore.load(in, password);
            return keyStore;
        } catch (IOException e) {
            throw new AssertionError(e);
        }
    }

    private X509TrustManager trustManagerForCertificates(InputStream in)
            throws GeneralSecurityException {
        CertificateFactory certificateFactory = CertificateFactory.getInstance("X.509");
        Collection<? extends Certificate> certificates = certificateFactory.generateCertificates(in);
        if (certificates.isEmpty()) {
            throw new IllegalArgumentException("expected non-empty set of trusted certificates");
        }

        // Put the certificates a key store.
        char[] password = "password".toCharArray(); // Any password will work.
        KeyStore keyStore = newEmptyKeyStore(password);
        int index = 0;
        for (Certificate certificate : certificates) {
            String certificateAlias = Integer.toString(index++);
            keyStore.setCertificateEntry(certificateAlias, certificate);
        }

        // Use it to build an X509 trust manager.
        KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
        keyManagerFactory.init(keyStore, password);
        TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
        trustManagerFactory.init(keyStore);
        TrustManager[] trustManagers = trustManagerFactory.getTrustManagers();
        if (trustManagers.length != 1 || !(trustManagers[0] instanceof X509TrustManager)) {
            throw new IllegalStateException("Unexpected default trust managers:" + Arrays.toString(trustManagers));
        }
        return (X509TrustManager) trustManagers[0];
    }

    public void setTrustrCertificates(InputStream in)
    {
        mTrustrCertificate=in;
    }

    public InputStream getTrustrCertificates()
    {
        return mTrustrCertificate;
    }

    public OkHttpClient build()
    {
        OkHttpClient okHttpClient=null;
        if(getTrustrCertificates()!=null)
        {
            X509TrustManager trustManager;
            SSLSocketFactory sslSocketFactory;
            try {
                trustManager = trustManagerForCertificates(getTrustrCertificates());
                SSLContext sslContext = SSLContext.getInstance("TLS");
                sslContext.init(null, new TrustManager[] { trustManager }, null);
                sslSocketFactory = sslContext.getSocketFactory();
            } catch (GeneralSecurityException e) {
                throw new RuntimeException(e);
            }
            okHttpClient=new OkHttpClient.Builder()
                    .sslSocketFactory(sslSocketFactory, trustManager)
                    .build();
        }
        else
        {
            okHttpClient=new OkHttpClient.Builder()
                                         .build();
        }
        return okHttpClient;
    }

}

代碼解釋

代碼很多,其實最核心的代碼爲:服務器

public OkHttpClient build()
{
.......
 trustManager = trustManagerForCertificates(getTrustrCertificates());
 .......
  okHttpClient=new OkHttpClient.Builder()
                    .sslSocketFactory(sslSocketFactory, trustManager)
                    .build();
 ..........
 return okHttpClient;
}

也就是經過微信

void setTrustrCertificates(InputStream in)

把本身的證書對應的文件set進去markdown

而後經過app

trustManager =trustManagerForCertificates(getTrustrCertificates());

okHttpClient=new OkHttpClient.Builder()
                    .sslSocketFactory(sslSocketFactory, trustManager)
                    .build();

就能生成安裝好了可信任證書的okHttpClient

OkhttpManager說完了,接下來,就是:

Activity中使用OkhttpManager

1:先把公鑰證書文件(如:自簽名的mycer.cer或CA證書的:*.pem)放到assets下,
若是使用AndroidStudio的同窗,可能沒有assets文件夾,本身建此文件夾,如個人爲:app\src\main\assets

2:直接貼Activity主要的代碼:

public class MyActivity extends AppCompatActivity {
@Override
    protected void onCreate(@Nullable Bundle savedInstanceState) {
       super.onCreate(savedInstanceState);
       try {
            OkhttpManager.getInstance().setTrustrCertificates(getAssets().open("mycer.cer");
            OkHttpClient mOkhttpClient= OkhttpManager.getInstance().build();
        } catch (IOException e) {
            e.printStackTrace();
        }
}

簡單吧,主要代碼就那兩句,就生成了已安裝公鑰證書」mycer.cer」的mOkhttpClient
接下來的mOkhttpClient怎樣使用,你們都應該清楚了吧,若是不清楚只能看OkHttpClient的基礎內容了

好了,OkHttpClient搞掂了

接下來就到Retrofit了

你們應該知到Retrofit默認是以OkHttpClient來做爲傳輸的,既然OkHttpClient搞掂了,那Retrofit就簡單了
仍是直接貼代碼:

Retrofit retrofit = new Retrofit.Builder()
                .client(mOkhttpClient)
                .baseUrl("your_serverl_url")
                .build();

看,只需在Retrofit中多加一句

.client(mOkhttpClient)

就把已安裝了證書的mOkhttpClient做爲Retrofit的傳輸了


更多內容,請關注微信公衆號:顏家大少
這裏寫圖片描述

相關文章
相關標籤/搜索