blob: 12e8791e1312c0a9a6956048a5557dd144b624c4 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package android.net;
18
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080019import android.os.SystemProperties;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020import android.util.Log;
Kenny Root12e75222013-04-23 22:34:24 -070021import com.android.org.conscrypt.OpenSSLContextImpl;
22import com.android.org.conscrypt.OpenSSLSocketImpl;
23import com.android.org.conscrypt.SSLClientSessionCache;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080024import java.io.IOException;
25import java.net.InetAddress;
26import java.net.Socket;
Brian Carlstrom7ab7a8b2012-09-21 16:33:50 -070027import java.net.SocketException;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import java.security.KeyManagementException;
Alex Klyubinac5eb032013-03-12 10:30:59 -070029import java.security.PrivateKey;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080030import java.security.cert.X509Certificate;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080031import javax.net.SocketFactory;
Dan Egnor7fc93c32010-06-29 17:51:28 -070032import javax.net.ssl.HostnameVerifier;
33import javax.net.ssl.HttpsURLConnection;
Ben Komalo1b528062011-05-03 09:40:15 -070034import javax.net.ssl.KeyManager;
Dan Egnor7fc93c32010-06-29 17:51:28 -070035import javax.net.ssl.SSLException;
36import javax.net.ssl.SSLPeerUnverifiedException;
37import javax.net.ssl.SSLSession;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import javax.net.ssl.SSLSocket;
39import javax.net.ssl.SSLSocketFactory;
40import javax.net.ssl.TrustManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080041import javax.net.ssl.X509TrustManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080042
43/**
Dan Egnor60586f22010-02-08 21:56:38 -080044 * SSLSocketFactory implementation with several extra features:
Dan Egnor7fc93c32010-06-29 17:51:28 -070045 *
Dan Egnor60586f22010-02-08 21:56:38 -080046 * <ul>
47 * <li>Timeout specification for SSL handshake operations
Dan Egnor7fc93c32010-06-29 17:51:28 -070048 * <li>Hostname verification in most cases (see WARNINGs below)
Dan Egnor60586f22010-02-08 21:56:38 -080049 * <li>Optional SSL session caching with {@link SSLSessionCache}
Dan Egnor9d4b5752010-02-13 20:34:51 -080050 * <li>Optionally bypass all SSL certificate checks
Dan Egnor60586f22010-02-08 21:56:38 -080051 * </ul>
Dan Egnor7fc93c32010-06-29 17:51:28 -070052 *
53 * The handshake timeout does not apply to actual TCP socket connection.
54 * If you want a connection timeout as well, use {@link #createSocket()}
55 * and {@link Socket#connect(SocketAddress, int)}, after which you
56 * must verify the identity of the server you are connected to.
57 *
58 * <p class="caution"><b>Most {@link SSLSocketFactory} implementations do not
59 * verify the server's identity, allowing man-in-the-middle attacks.</b>
60 * This implementation does check the server's certificate hostname, but only
61 * for createSocket variants that specify a hostname. When using methods that
62 * use {@link InetAddress} or which return an unconnected socket, you MUST
63 * verify the server's identity yourself to ensure a secure connection.</p>
64 *
65 * <p>One way to verify the server's identity is to use
66 * {@link HttpsURLConnection#getDefaultHostnameVerifier()} to get a
67 * {@link HostnameVerifier} to verify the certificate hostname.
68 *
69 * <p>On development devices, "setprop socket.relaxsslcheck yes" bypasses all
70 * SSL certificate and hostname checks for testing purposes. This setting
71 * requires root access.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080072 */
73public class SSLCertificateSocketFactory extends SSLSocketFactory {
Dan Egnor60586f22010-02-08 21:56:38 -080074 private static final String TAG = "SSLCertificateSocketFactory";
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080075
Dan Egnor60586f22010-02-08 21:56:38 -080076 private static final TrustManager[] INSECURE_TRUST_MANAGER = new TrustManager[] {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080077 new X509TrustManager() {
Dan Egnor60586f22010-02-08 21:56:38 -080078 public X509Certificate[] getAcceptedIssuers() { return null; }
79 public void checkClientTrusted(X509Certificate[] certs, String authType) { }
80 public void checkServerTrusted(X509Certificate[] certs, String authType) { }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080081 }
82 };
83
Dan Egnor60586f22010-02-08 21:56:38 -080084 private SSLSocketFactory mInsecureFactory = null;
85 private SSLSocketFactory mSecureFactory = null;
Ben Komalo1b528062011-05-03 09:40:15 -070086 private TrustManager[] mTrustManagers = null;
87 private KeyManager[] mKeyManagers = null;
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -040088 private byte[] mNpnProtocols = null;
Kenny Root100d7292013-06-25 12:00:34 -070089 private byte[] mAlpnProtocols = null;
Alex Klyubinac5eb032013-03-12 10:30:59 -070090 private PrivateKey mChannelIdPrivateKey = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080091
Dan Egnor60586f22010-02-08 21:56:38 -080092 private final int mHandshakeTimeoutMillis;
93 private final SSLClientSessionCache mSessionCache;
Dan Egnor9d4b5752010-02-13 20:34:51 -080094 private final boolean mSecure;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080095
Dan Egnor60586f22010-02-08 21:56:38 -080096 /** @deprecated Use {@link #getDefault(int)} instead. */
Jesse Wilson28c74252010-11-04 14:09:18 -070097 @Deprecated
Dan Egnor60586f22010-02-08 21:56:38 -080098 public SSLCertificateSocketFactory(int handshakeTimeoutMillis) {
Dan Egnor9d4b5752010-02-13 20:34:51 -080099 this(handshakeTimeoutMillis, null, true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800100 }
101
Dan Egnor9d4b5752010-02-13 20:34:51 -0800102 private SSLCertificateSocketFactory(
Brian Carlstrom992f2382012-09-26 14:33:47 -0700103 int handshakeTimeoutMillis, SSLSessionCache cache, boolean secure) {
Dan Egnor60586f22010-02-08 21:56:38 -0800104 mHandshakeTimeoutMillis = handshakeTimeoutMillis;
105 mSessionCache = cache == null ? null : cache.mSessionCache;
Dan Egnor9d4b5752010-02-13 20:34:51 -0800106 mSecure = secure;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800107 }
108
109 /**
Dan Egnor9d4b5752010-02-13 20:34:51 -0800110 * Returns a new socket factory instance with an optional handshake timeout.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800111 *
Dan Egnor60586f22010-02-08 21:56:38 -0800112 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
113 * for none. The socket timeout is reset to 0 after the handshake.
Dan Egnor7fc93c32010-06-29 17:51:28 -0700114 * @return a new SSLSocketFactory with the specified parameters
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800115 */
Dan Egnor60586f22010-02-08 21:56:38 -0800116 public static SocketFactory getDefault(int handshakeTimeoutMillis) {
Dan Egnor9d4b5752010-02-13 20:34:51 -0800117 return new SSLCertificateSocketFactory(handshakeTimeoutMillis, null, true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800118 }
119
120 /**
Dan Egnor9d4b5752010-02-13 20:34:51 -0800121 * Returns a new socket factory instance with an optional handshake timeout
122 * and SSL session cache.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800123 *
Dan Egnor60586f22010-02-08 21:56:38 -0800124 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
125 * for none. The socket timeout is reset to 0 after the handshake.
Jesse Wilsonff556992011-03-23 16:43:39 -0700126 * @param cache The {@link SSLSessionCache} to use, or null for no cache.
Dan Egnor7fc93c32010-06-29 17:51:28 -0700127 * @return a new SSLSocketFactory with the specified parameters
Dan Egnor60586f22010-02-08 21:56:38 -0800128 */
Dan Egnor9d4b5752010-02-13 20:34:51 -0800129 public static SSLSocketFactory getDefault(int handshakeTimeoutMillis, SSLSessionCache cache) {
130 return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true);
131 }
132
133 /**
134 * Returns a new instance of a socket factory with all SSL security checks
135 * disabled, using an optional handshake timeout and SSL session cache.
Dan Egnor7fc93c32010-06-29 17:51:28 -0700136 *
137 * <p class="caution"><b>Warning:</b> Sockets created using this factory
Costin Manolache007392a2013-10-11 11:43:33 -0700138 * are vulnerable to man-in-the-middle attacks!</p>. The caller must implement
139 * its own verification.
Dan Egnor9d4b5752010-02-13 20:34:51 -0800140 *
141 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
142 * for none. The socket timeout is reset to 0 after the handshake.
Jesse Wilsonff556992011-03-23 16:43:39 -0700143 * @param cache The {@link SSLSessionCache} to use, or null for no cache.
Dan Egnor7fc93c32010-06-29 17:51:28 -0700144 * @return an insecure SSLSocketFactory with the specified parameters
Dan Egnor9d4b5752010-02-13 20:34:51 -0800145 */
146 public static SSLSocketFactory getInsecure(int handshakeTimeoutMillis, SSLSessionCache cache) {
147 return new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, false);
Dan Egnor60586f22010-02-08 21:56:38 -0800148 }
149
150 /**
151 * Returns a socket factory (also named SSLSocketFactory, but in a different
152 * namespace) for use with the Apache HTTP stack.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800153 *
Dan Egnor60586f22010-02-08 21:56:38 -0800154 * @param handshakeTimeoutMillis to use for SSL connection handshake, or 0
155 * for none. The socket timeout is reset to 0 after the handshake.
Jesse Wilsonff556992011-03-23 16:43:39 -0700156 * @param cache The {@link SSLSessionCache} to use, or null for no cache.
Dan Egnor60586f22010-02-08 21:56:38 -0800157 * @return a new SocketFactory with the specified parameters
158 */
159 public static org.apache.http.conn.ssl.SSLSocketFactory getHttpSocketFactory(
Jesse Wilsonff556992011-03-23 16:43:39 -0700160 int handshakeTimeoutMillis, SSLSessionCache cache) {
Dan Egnor60586f22010-02-08 21:56:38 -0800161 return new org.apache.http.conn.ssl.SSLSocketFactory(
Dan Egnor9d4b5752010-02-13 20:34:51 -0800162 new SSLCertificateSocketFactory(handshakeTimeoutMillis, cache, true));
Dan Egnor60586f22010-02-08 21:56:38 -0800163 }
164
Dan Egnor7fc93c32010-06-29 17:51:28 -0700165 /**
166 * Verify the hostname of the certificate used by the other end of a
167 * connected socket. You MUST call this if you did not supply a hostname
168 * to {@link #createSocket()}. It is harmless to call this method
169 * redundantly if the hostname has already been verified.
170 *
171 * <p>Wildcard certificates are allowed to verify any matching hostname,
172 * so "foo.bar.example.com" is verified if the peer has a certificate
173 * for "*.example.com".
174 *
175 * @param socket An SSL socket which has been connected to a server
176 * @param hostname The expected hostname of the remote server
177 * @throws IOException if something goes wrong handshaking with the server
178 * @throws SSLPeerUnverifiedException if the server cannot prove its identity
179 *
180 * @hide
181 */
182 public static void verifyHostname(Socket socket, String hostname) throws IOException {
183 if (!(socket instanceof SSLSocket)) {
184 throw new IllegalArgumentException("Attempt to verify non-SSL socket");
185 }
186
187 if (!isSslCheckRelaxed()) {
188 // The code at the start of OpenSSLSocketImpl.startHandshake()
189 // ensures that the call is idempotent, so we can safely call it.
190 SSLSocket ssl = (SSLSocket) socket;
191 ssl.startHandshake();
192
193 SSLSession session = ssl.getSession();
194 if (session == null) {
195 throw new SSLException("Cannot verify SSL socket without session");
196 }
Kenny Root928ee1e2013-07-23 20:36:03 -0700197 if (!HttpsURLConnection.getDefaultHostnameVerifier().verify(hostname, session)) {
Dan Egnor7fc93c32010-06-29 17:51:28 -0700198 throw new SSLPeerUnverifiedException("Cannot verify hostname: " + hostname);
199 }
200 }
201 }
202
Ben Komalo1b528062011-05-03 09:40:15 -0700203 private SSLSocketFactory makeSocketFactory(
204 KeyManager[] keyManagers, TrustManager[] trustManagers) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800205 try {
Brian Carlstrom3c7c3512010-08-04 15:44:39 -0700206 OpenSSLContextImpl sslContext = new OpenSSLContextImpl();
Ben Komalo1b528062011-05-03 09:40:15 -0700207 sslContext.engineInit(keyManagers, trustManagers, null);
Brian Carlstrom2c42c8f2010-09-14 00:11:14 -0700208 sslContext.engineGetClientSessionContext().setPersistentCache(mSessionCache);
Dan Egnor60586f22010-02-08 21:56:38 -0800209 return sslContext.engineGetSocketFactory();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800210 } catch (KeyManagementException e) {
Dan Egnor60586f22010-02-08 21:56:38 -0800211 Log.wtf(TAG, e);
212 return (SSLSocketFactory) SSLSocketFactory.getDefault(); // Fallback
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800213 }
214 }
215
Dan Egnor7fc93c32010-06-29 17:51:28 -0700216 private static boolean isSslCheckRelaxed() {
217 return "1".equals(SystemProperties.get("ro.debuggable")) &&
218 "yes".equals(SystemProperties.get("socket.relaxsslcheck"));
219 }
220
Dan Egnor60586f22010-02-08 21:56:38 -0800221 private synchronized SSLSocketFactory getDelegate() {
Dan Egnor9d4b5752010-02-13 20:34:51 -0800222 // Relax the SSL check if instructed (for this factory, or systemwide)
Dan Egnor7fc93c32010-06-29 17:51:28 -0700223 if (!mSecure || isSslCheckRelaxed()) {
Dan Egnor60586f22010-02-08 21:56:38 -0800224 if (mInsecureFactory == null) {
Dan Egnor9d4b5752010-02-13 20:34:51 -0800225 if (mSecure) {
226 Log.w(TAG, "*** BYPASSING SSL SECURITY CHECKS (socket.relaxsslcheck=yes) ***");
Dan Egnor9d4b5752010-02-13 20:34:51 -0800227 }
Ben Komalo1b528062011-05-03 09:40:15 -0700228 mInsecureFactory = makeSocketFactory(mKeyManagers, INSECURE_TRUST_MANAGER);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800229 }
Dan Egnor60586f22010-02-08 21:56:38 -0800230 return mInsecureFactory;
231 } else {
232 if (mSecureFactory == null) {
Ben Komalo1b528062011-05-03 09:40:15 -0700233 mSecureFactory = makeSocketFactory(mKeyManagers, mTrustManagers);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800234 }
Dan Egnor60586f22010-02-08 21:56:38 -0800235 return mSecureFactory;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800236 }
237 }
238
Dan Egnor7fc93c32010-06-29 17:51:28 -0700239 /**
Ben Komalo1b528062011-05-03 09:40:15 -0700240 * Sets the {@link TrustManager}s to be used for connections made by this factory.
Ben Komalo1b528062011-05-03 09:40:15 -0700241 */
242 public void setTrustManagers(TrustManager[] trustManager) {
243 mTrustManagers = trustManager;
244
245 // Clear out all cached secure factories since configurations have changed.
246 mSecureFactory = null;
247 // Note - insecure factories only ever use the INSECURE_TRUST_MANAGER so they need not
248 // be cleared out here.
249 }
250
251 /**
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400252 * Sets the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next
253 * Protocol Negotiation (NPN)</a> protocols that this peer is interested in.
254 *
255 * <p>For servers this is the sequence of protocols to advertise as
256 * supported, in order of preference. This list is sent unencrypted to
257 * all clients that support NPN.
258 *
259 * <p>For clients this is a list of supported protocols to match against the
260 * server's list. If there is no protocol supported by both client and
261 * server then the first protocol in the client's list will be selected.
262 * The order of the client's protocols is otherwise insignificant.
263 *
Jesse Wilson2108ead2012-05-17 13:46:17 -0400264 * @param npnProtocols a non-empty list of protocol byte arrays. All arrays
265 * must be non-empty and of length less than 256.
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400266 */
267 public void setNpnProtocols(byte[][] npnProtocols) {
Kenny Root100d7292013-06-25 12:00:34 -0700268 this.mNpnProtocols = toLengthPrefixedList(npnProtocols);
269 }
270
271 /**
272 * Sets the
273 * <a href="http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-01">
274 * Application Layer Protocol Negotiation (ALPN)</a> protocols that this peer
275 * is interested in.
276 *
277 * <p>For servers this is the sequence of protocols to advertise as
278 * supported, in order of preference. This list is sent unencrypted to
279 * all clients that support ALPN.
280 *
281 * <p>For clients this is a list of supported protocols to match against the
282 * server's list. If there is no protocol supported by both client and
283 * server then the first protocol in the client's list will be selected.
284 * The order of the client's protocols is otherwise insignificant.
285 *
286 * @param protocols a non-empty list of protocol byte arrays. All arrays
287 * must be non-empty and of length less than 256.
288 * @hide
289 */
290 public void setAlpnProtocols(byte[][] protocols) {
291 this.mAlpnProtocols = toLengthPrefixedList(protocols);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400292 }
293
294 /**
295 * Returns an array containing the concatenation of length-prefixed byte
296 * strings.
297 */
Kenny Root100d7292013-06-25 12:00:34 -0700298 static byte[] toLengthPrefixedList(byte[]... items) {
299 if (items.length == 0) {
300 throw new IllegalArgumentException("items.length == 0");
Jesse Wilson2108ead2012-05-17 13:46:17 -0400301 }
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400302 int totalLength = 0;
Kenny Root100d7292013-06-25 12:00:34 -0700303 for (byte[] s : items) {
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400304 if (s.length == 0 || s.length > 255) {
305 throw new IllegalArgumentException("s.length == 0 || s.length > 255: " + s.length);
306 }
307 totalLength += 1 + s.length;
308 }
309 byte[] result = new byte[totalLength];
310 int pos = 0;
Kenny Root100d7292013-06-25 12:00:34 -0700311 for (byte[] s : items) {
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400312 result[pos++] = (byte) s.length;
313 for (byte b : s) {
314 result[pos++] = b;
315 }
316 }
317 return result;
318 }
319
320 /**
321 * Returns the <a href="http://technotes.googlecode.com/git/nextprotoneg.html">Next
322 * Protocol Negotiation (NPN)</a> protocol selected by client and server, or
323 * null if no protocol was negotiated.
324 *
325 * @param socket a socket created by this factory.
Narayan Kamathb4db9622012-09-17 17:59:00 +0100326 * @throws IllegalArgumentException if the socket was not created by this factory.
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400327 */
328 public byte[] getNpnSelectedProtocol(Socket socket) {
Narayan Kamathb4db9622012-09-17 17:59:00 +0100329 return castToOpenSSLSocket(socket).getNpnSelectedProtocol();
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400330 }
331
332 /**
Kenny Root100d7292013-06-25 12:00:34 -0700333 * Returns the
334 * <a href="http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-01">Application
335 * Layer Protocol Negotiation (ALPN)</a> protocol selected by client and server, or null
336 * if no protocol was negotiated.
337 *
338 * @param socket a socket created by this factory.
339 * @throws IllegalArgumentException if the socket was not created by this factory.
340 * @hide
341 */
342 public byte[] getAlpnSelectedProtocol(Socket socket) {
343 return castToOpenSSLSocket(socket).getAlpnSelectedProtocol();
344 }
345
346 /**
Ben Komalo1b528062011-05-03 09:40:15 -0700347 * Sets the {@link KeyManager}s to be used for connections made by this factory.
Ben Komalo1b528062011-05-03 09:40:15 -0700348 */
349 public void setKeyManagers(KeyManager[] keyManagers) {
350 mKeyManagers = keyManagers;
351
352 // Clear out any existing cached factories since configurations have changed.
353 mSecureFactory = null;
354 mInsecureFactory = null;
355 }
356
Narayan Kamathb4db9622012-09-17 17:59:00 +0100357 /**
Alex Klyubinac5eb032013-03-12 10:30:59 -0700358 * Sets the private key to be used for TLS Channel ID by connections made by this
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800359 * factory.
360 *
361 * @param privateKey private key (enables TLS Channel ID) or {@code null} for no key (disables
362 * TLS Channel ID). The private key has to be an Elliptic Curve (EC) key based on the
363 * NIST P-256 curve (aka SECG secp256r1 or ANSI X9.62 prime256v1).
364 *
365 * @hide
366 */
Alex Klyubinac5eb032013-03-12 10:30:59 -0700367 public void setChannelIdPrivateKey(PrivateKey privateKey) {
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800368 mChannelIdPrivateKey = privateKey;
369 }
370
371 /**
Narayan Kamathb4db9622012-09-17 17:59:00 +0100372 * Enables <a href="http://tools.ietf.org/html/rfc5077#section-3.2">session ticket</a>
373 * support on the given socket.
374 *
375 * @param socket a socket created by this factory
376 * @param useSessionTickets {@code true} to enable session ticket support on this socket.
377 * @throws IllegalArgumentException if the socket was not created by this factory.
378 */
379 public void setUseSessionTickets(Socket socket, boolean useSessionTickets) {
380 castToOpenSSLSocket(socket).setUseSessionTickets(useSessionTickets);
381 }
382
383 /**
384 * Turns on <a href="http://tools.ietf.org/html/rfc6066#section-3">Server
385 * Name Indication (SNI)</a> on a given socket.
386 *
387 * @param socket a socket created by this factory.
388 * @param hostName the desired SNI hostname, null to disable.
389 * @throws IllegalArgumentException if the socket was not created by this factory.
390 */
391 public void setHostname(Socket socket, String hostName) {
392 castToOpenSSLSocket(socket).setHostname(hostName);
393 }
394
Brian Carlstrom7ab7a8b2012-09-21 16:33:50 -0700395 /**
396 * Sets this socket's SO_SNDTIMEO write timeout in milliseconds.
397 * Use 0 for no timeout.
398 * To take effect, this option must be set before the blocking method was called.
399 *
400 * @param socket a socket created by this factory.
Brian Carlstrom992f2382012-09-26 14:33:47 -0700401 * @param timeout the desired write timeout in milliseconds.
Brian Carlstrom7ab7a8b2012-09-21 16:33:50 -0700402 * @throws IllegalArgumentException if the socket was not created by this factory.
Brian Carlstrom992f2382012-09-26 14:33:47 -0700403 *
404 * @hide
Brian Carlstrom7ab7a8b2012-09-21 16:33:50 -0700405 */
406 public void setSoWriteTimeout(Socket socket, int writeTimeoutMilliseconds)
407 throws SocketException {
408 castToOpenSSLSocket(socket).setSoWriteTimeout(writeTimeoutMilliseconds);
409 }
410
Narayan Kamathb4db9622012-09-17 17:59:00 +0100411 private static OpenSSLSocketImpl castToOpenSSLSocket(Socket socket) {
412 if (!(socket instanceof OpenSSLSocketImpl)) {
413 throw new IllegalArgumentException("Socket not created by this factory: "
414 + socket);
415 }
416
417 return (OpenSSLSocketImpl) socket;
418 }
Ben Komalo1b528062011-05-03 09:40:15 -0700419
420 /**
Dan Egnor7fc93c32010-06-29 17:51:28 -0700421 * {@inheritDoc}
422 *
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700423 * <p>This method verifies the peer's certificate hostname after connecting
424 * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
Dan Egnor7fc93c32010-06-29 17:51:28 -0700425 */
Dan Egnor60586f22010-02-08 21:56:38 -0800426 @Override
427 public Socket createSocket(Socket k, String host, int port, boolean close) throws IOException {
428 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(k, host, port, close);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400429 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700430 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800431 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800432 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Costin Manolache007392a2013-10-11 11:43:33 -0700433 s.setHostname(host);
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700434 if (mSecure) {
435 verifyHostname(s, host);
436 }
Dan Egnor60586f22010-02-08 21:56:38 -0800437 return s;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800438 }
439
Dan Egnor7fc93c32010-06-29 17:51:28 -0700440 /**
441 * Creates a new socket which is not connected to any remote host.
442 * You must use {@link Socket#connect} to connect the socket.
443 *
444 * <p class="caution"><b>Warning:</b> Hostname verification is not performed
445 * with this method. You MUST verify the server's identity after connecting
446 * the socket to avoid man-in-the-middle attacks.</p>
447 */
Dan Egnor60586f22010-02-08 21:56:38 -0800448 @Override
449 public Socket createSocket() throws IOException {
450 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket();
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400451 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700452 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800453 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800454 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Dan Egnor60586f22010-02-08 21:56:38 -0800455 return s;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800456 }
457
Dan Egnor7fc93c32010-06-29 17:51:28 -0700458 /**
459 * {@inheritDoc}
460 *
461 * <p class="caution"><b>Warning:</b> Hostname verification is not performed
462 * with this method. You MUST verify the server's identity after connecting
463 * the socket to avoid man-in-the-middle attacks.</p>
464 */
Dan Egnor60586f22010-02-08 21:56:38 -0800465 @Override
466 public Socket createSocket(InetAddress addr, int port, InetAddress localAddr, int localPort)
467 throws IOException {
468 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(
469 addr, port, localAddr, localPort);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400470 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700471 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800472 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800473 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Dan Egnor60586f22010-02-08 21:56:38 -0800474 return s;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800475 }
476
Dan Egnor7fc93c32010-06-29 17:51:28 -0700477 /**
478 * {@inheritDoc}
479 *
480 * <p class="caution"><b>Warning:</b> Hostname verification is not performed
481 * with this method. You MUST verify the server's identity after connecting
482 * the socket to avoid man-in-the-middle attacks.</p>
483 */
Dan Egnor60586f22010-02-08 21:56:38 -0800484 @Override
485 public Socket createSocket(InetAddress addr, int port) throws IOException {
486 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(addr, port);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400487 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700488 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800489 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800490 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Dan Egnor60586f22010-02-08 21:56:38 -0800491 return s;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800492 }
493
Dan Egnor7fc93c32010-06-29 17:51:28 -0700494 /**
495 * {@inheritDoc}
496 *
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700497 * <p>This method verifies the peer's certificate hostname after connecting
498 * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
Dan Egnor7fc93c32010-06-29 17:51:28 -0700499 */
Dan Egnor60586f22010-02-08 21:56:38 -0800500 @Override
501 public Socket createSocket(String host, int port, InetAddress localAddr, int localPort)
502 throws IOException {
503 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(
504 host, port, localAddr, localPort);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400505 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700506 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800507 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800508 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700509 if (mSecure) {
510 verifyHostname(s, host);
511 }
Dan Egnor60586f22010-02-08 21:56:38 -0800512 return s;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800513 }
514
Dan Egnor7fc93c32010-06-29 17:51:28 -0700515 /**
516 * {@inheritDoc}
517 *
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700518 * <p>This method verifies the peer's certificate hostname after connecting
519 * (unless created with {@link #getInsecure(int, SSLSessionCache)}).
Dan Egnor7fc93c32010-06-29 17:51:28 -0700520 */
Dan Egnor60586f22010-02-08 21:56:38 -0800521 @Override
522 public Socket createSocket(String host, int port) throws IOException {
523 OpenSSLSocketImpl s = (OpenSSLSocketImpl) getDelegate().createSocket(host, port);
Jesse Wilsonf5fb5e82012-03-23 15:55:03 -0400524 s.setNpnProtocols(mNpnProtocols);
Kenny Root100d7292013-06-25 12:00:34 -0700525 s.setAlpnProtocols(mAlpnProtocols);
Dan Egnor60586f22010-02-08 21:56:38 -0800526 s.setHandshakeTimeout(mHandshakeTimeoutMillis);
Alex Klyubin4ef6c9b2013-01-18 12:50:39 -0800527 s.setChannelIdPrivateKey(mChannelIdPrivateKey);
Andrew Stadlerdf27c0c2010-07-12 15:31:40 -0700528 if (mSecure) {
529 verifyHostname(s, host);
530 }
Dan Egnor60586f22010-02-08 21:56:38 -0800531 return s;
532 }
533
534 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800535 public String[] getDefaultCipherSuites() {
Alex Klyubin019118a2013-10-28 16:16:38 -0700536 return getDelegate().getDefaultCipherSuites();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800537 }
538
Dan Egnor60586f22010-02-08 21:56:38 -0800539 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800540 public String[] getSupportedCipherSuites() {
Dan Egnor60586f22010-02-08 21:56:38 -0800541 return getDelegate().getSupportedCipherSuites();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800542 }
543}