如何以编程方式将证书添加到信任库,并将其用于validation服务器身份validation

我的应用程序我想使用https连接到用户指定的服务器,该服务器使用自签名证书。 我现在收集的是,那

  • 自签名证书被拒绝(如预期)
  • android keystore / truststore不用于应用程序,因此应用程序必须构建和使用自己的信任库,
  • 在JDK中有一个“keytool”来构建一个可以作为资源提供给应用程序的信任库,但这不是解决方案,因为我不知道服务器(及其之前的证书)

由于https服务器是用户指定的,因此我事先不知道服务器的证书,因此希望以编程方式将服务器证书添加到应用程序的信任库(通过向用户显示证书并让他接受它)。 一旦添加到信任库,应用程序将使用该信任库来validation服务器。

我不想简单地接受每个自签名证书,而无需用户检查指纹,如网上的一些示例所示。

现在的问题是我对Java和Android完全不熟悉,并且很难理解AndroidHttpClient或DefaultHttpClient的内部工作原理。 我的应用程序中有基本的HTTP工作,但是没有find任何关于如何根据用户的要求在应用程序内部实际将证书添加到信任库的示例。

有人知道如何实现这一点或知道我可以看到的工作实例吗?

任何提示都表示赞赏。 谢谢。

编辑:在K9 Mail的TrustManagerFactory.java类中find解决方案。 如果您有同样的问题,我建议您查看一下。

解决方案刚刚发现,但没有人创建答案尚未帮助指导其他人,所以今天早上我将成为Point Pimp(ette)并发布作为解决方案添加的URL,以及来自公共源代码的复制。 希望这有助于指导其他人解决问题。 🙂


这是以下代码的URL 。

package com.fsck.k9.mail.store; import android.app.Application; import android.content.Context; import android.util.Log; import com.fsck.k9.K9; import com.fsck.k9.helper.DomainNameChecker; import org.apache.commons.io.IOUtils; import javax.net.ssl.TrustManager; import javax.net.ssl.X509TrustManager; import java.io.File; import java.io.FileNotFoundException; import java.io.IOException; import java.security.KeyStore; import java.security.KeyStoreException; import java.security.NoSuchAlgorithmException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; import java.util.HashMap; import java.util.Map; public final class TrustManagerFactory { private static final String LOG_TAG = "TrustManagerFactory"; private static X509TrustManager defaultTrustManager; private static X509TrustManager unsecureTrustManager; private static X509TrustManager localTrustManager; private static X509Certificate[] lastCertChain = null; private static File keyStoreFile; private static KeyStore keyStore; private static class SimpleX509TrustManager implements X509TrustManager { public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException { } public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException { } public X509Certificate[] getAcceptedIssuers() { return null; } } private static class SecureX509TrustManager implements X509TrustManager { private static final Map mTrustManager = new HashMap(); private final String mHost; private SecureX509TrustManager(String host) { mHost = host; } public synchronized static X509TrustManager getInstance(String host) { SecureX509TrustManager trustManager; if (mTrustManager.containsKey(host)) { trustManager = mTrustManager.get(host); } else { trustManager = new SecureX509TrustManager(host); mTrustManager.put(host, trustManager); } return trustManager; } public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException { defaultTrustManager.checkClientTrusted(chain, authType); } public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException { // FIXME: Using a static field to store the certificate chain is a bad idea. Instead // create a CertificateException subclass and store the chain there. TrustManagerFactory.setLastCertChain(chain); try { defaultTrustManager.checkServerTrusted(chain, authType); } catch (CertificateException e) { localTrustManager.checkServerTrusted(new X509Certificate[] {chain[0]}, authType); } if (!DomainNameChecker.match(chain[0], mHost)) { try { String dn = chain[0].getSubjectDN().toString(); if ((dn != null) && (dn.equalsIgnoreCase(keyStore.getCertificateAlias(chain[0])))) { return; } } catch (KeyStoreException e) { throw new CertificateException("Certificate cannot be verified; KeyStore Exception: " + e); } throw new CertificateException("Certificate domain name does not match " + mHost); } } public X509Certificate[] getAcceptedIssuers() { return defaultTrustManager.getAcceptedIssuers(); } } static { java.io.InputStream fis = null; try { javax.net.ssl.TrustManagerFactory tmf = javax.net.ssl.TrustManagerFactory.getInstance("X509"); Application app = K9.app; keyStoreFile = new File(app.getDir("KeyStore", Context.MODE_PRIVATE) + File.separator + "KeyStore.bks"); keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); try { fis = new java.io.FileInputStream(keyStoreFile); } catch (FileNotFoundException e1) { fis = null; } try { keyStore.load(fis, "".toCharArray()); } catch (IOException e) { Log.e(LOG_TAG, "KeyStore IOException while initializing TrustManagerFactory ", e); keyStore = null; } catch (CertificateException e) { Log.e(LOG_TAG, "KeyStore CertificateException while initializing TrustManagerFactory ", e); keyStore = null; } tmf.init(keyStore); TrustManager[] tms = tmf.getTrustManagers(); if (tms != null) { for (TrustManager tm : tms) { if (tm instanceof X509TrustManager) { localTrustManager = (X509TrustManager)tm; break; } } } tmf = javax.net.ssl.TrustManagerFactory.getInstance("X509"); tmf.init((KeyStore)null); tms = tmf.getTrustManagers(); if (tms != null) { for (TrustManager tm : tms) { if (tm instanceof X509TrustManager) { defaultTrustManager = (X509TrustManager) tm; break; } } } } catch (NoSuchAlgorithmException e) { Log.e(LOG_TAG, "Unable to get X509 Trust Manager ", e); } catch (KeyStoreException e) { Log.e(LOG_TAG, "Key Store exception while initializing TrustManagerFactory ", e); } finally { IOUtils.closeQuietly(fis); } unsecureTrustManager = new SimpleX509TrustManager(); } private TrustManagerFactory() { } public static X509TrustManager get(String host, boolean secure) { return secure ? SecureX509TrustManager.getInstance(host) : unsecureTrustManager; } public static KeyStore getKeyStore() { return keyStore; } public static void setLastCertChain(X509Certificate[] chain) { lastCertChain = chain; } public static X509Certificate[] getLastCertChain() { return lastCertChain; } public static void addCertificateChain(String alias, X509Certificate[] chain) throws CertificateException { try { javax.net.ssl.TrustManagerFactory tmf = javax.net.ssl.TrustManagerFactory.getInstance("X509"); for (X509Certificate element : chain) { keyStore.setCertificateEntry (element.getSubjectDN().toString(), element); } tmf.init(keyStore); TrustManager[] tms = tmf.getTrustManagers(); if (tms != null) { for (TrustManager tm : tms) { if (tm instanceof X509TrustManager) { localTrustManager = (X509TrustManager) tm; break; } } } java.io.OutputStream keyStoreStream = null; try { keyStoreStream = new java.io.FileOutputStream(keyStoreFile); keyStore.store(keyStoreStream, "".toCharArray()); } catch (FileNotFoundException e) { throw new CertificateException("Unable to write KeyStore: " + e.getMessage()); } catch (CertificateException e) { throw new CertificateException("Unable to write KeyStore: " + e.getMessage()); } catch (IOException e) { throw new CertificateException("Unable to write KeyStore: " + e.getMessage()); } finally { IOUtils.closeQuietly(keyStoreStream); } } catch (NoSuchAlgorithmException e) { Log.e(LOG_TAG, "Unable to get X509 Trust Manager ", e); } catch (KeyStoreException e) { Log.e(LOG_TAG, "Key Store exception while initializing TrustManagerFactory ", e); } } } 

您可以使用自签名证书。 要使用自签名证书,您可以将其转换为Android支持的充气城堡格式密钥库,然后将其作为原始资源存储在Android应用程序项目中。 如何转换和使用它,所有细节都可以在Bob的博客上find。 这是相同的链接 – http://blog.crazybob.org/2010/02/android-trusting-ssl-certificates.html 。 这非常有效。 希望这可以帮助