HTTPS客户端java实现

来源:互联网 发布:大话数据挖掘 编辑:程序博客网 时间:2024/05/18 00:21

https是http加入ssl安全协议后的数据传输协议,提供身份验证与加密通讯,默认端口为443,关于握手协议参考这里写链接内容

SSL是在安全套接层、传输层保障数据安全性的协议,安全认证过程:
1)客户端向服务器发送一个开始信息“Hello”以便开始一个新的会话连接;2)服务器根据客户的信息确定是否需要生成新的主密钥,如需要则服务器在响应客户的“Hello”信息时将包含生成主密钥所需的信息;3)客户根据收到的服务器响应信息,产生一个主密钥,并用服务器的公开密钥加密后传给服务器;4)服务器回复该主密钥,并返回给客户一个用主密钥认证的信息,以此让客户认证服务器。

实现https客户端过程:

1.创建HttpsURLConnection对象

URL url = new URL(null, path, new Handler());//handler是为了创建https协议的连接,否则下一步报错HttpsURLConnection conn = (HttpsURLConnection)url.openConnection(); //实现自定义SSLSocketFactory,见下一步SSLSocketFactory  sslFac = UMBX509TrustManager.getSSLFactory();      if(StringUtils.isNotEmpty(method)){         if(method.equalsIgnoreCase("GET")){             conn.setRequestMethod("GET");             //Get请求不需要DoOutPut             conn.setDoOutput(false);         }         else if (method.equalsIgnoreCase("POST")){             conn.setRequestMethod("POST");             conn.setDoOutput(true);             conn.setUseCaches(false);         }     }     //设置SSLSocketFactory对象     conn.setSSLSocketFactory(sslFac);     conn.setDoInput(true);     //设置连接超时时间和读取超时时间     conn.setConnectTimeout(connectTimeout);     conn.setReadTimeout(readTimeout);     conn.setRequestProperty("Content-Type", "application/json; charset=utf-8");     //connection初始化完成

2.创建SSLSocketFactory

//自定义信任管理器实现X509TrustManager接口方法TrustManager[] trust = {new UMBX509TrustManager()};SSLContext sslContext = SSLContext.getInstance("SSl", "SunJSSE");//使用自定义信任管理器和随机数初始化sslContext.init(null, trust, new SecureRandom());return sslContext.getSocketFactory();

3.实现自定义信任管理器(实现接口X509TrustManager)
两种方式:
无需做证书校验:默认接口实现即可。

public interface X509TrustManager extends TrustManager {    void checkClientTrusted(X509Certificate[] arg0, String arg1) throws CertificateException;    void checkServerTrusted(X509Certificate[] arg0, String arg1) throws CertificateException;    X509Certificate[] getAcceptedIssuers();}

需要做证书校验:

  • 使用包含信任证书的信任库文件(.keystore、.jks)实例化x509TrustManager
//用于校验的x509管理器X509TrustManager x509TrustManager;//使用config文件作为受信任证书库KeyStore keyStore = KeyStore.getInstance("JKS");logger.info("use "+trustStorePath+" as trustStore");//使用trustStorePath证书库文件,库密码trustStorePwdkeyStore.load(new FileInputStream(trustStorePath), trustStorePwd.toCharArray());//获取证书库的trustManagerTrustManagerFactory factory = TrustManagerFactory    .getInstance("SunX509", "SunJSSE"); factory.init(keyStore); TrustManager managers [] = factory.getTrustManagers(); /** * 遍历管理器,获取X509TrustManager的实现*/for (TrustManager manager : managers) {     if (manager instanceof X509TrustManager) {         x509TrustManager = (X509TrustManager) manager;      } } 
  • 重写校验方法
/** * 校验服务端证书*/    public void checkServerTrusted(X509Certificate[] chains, String authType) throws CertificateException {    try {    logger.info("checkServerTrusted:"+JSONArray.fromArray(chains).toString());            x509TrustManager.checkServerTrusted(chains, authType);         } catch (CertificateException excep) {             //使用jdk默认证书校验,在初始化TrustManagerFactory时传入null            initX509TrustManager(null).checkServerTrusted(chains, authType);        }     }    /**     * 返回受信任的X509证书数组     */    public X509Certificate[] getAcceptedIssuers() {         return x509TrustManager.getAcceptedIssuers();     }
  • 信任证书来源不多说,得到信任证书后需要导入到证书库中或者新建一个库文件
    命令行进入到jdk bin目录下使用keytool工具:
    keytool -import -alias mycert -keystore myKeyStore.keystore -storepass password -file TruestedCert.cer
    -alias 在库中的别名
    -keystore 库文件,有则导入,没有新建
    -storepass 库密码,可以不设置
    -file 待导入的证书

4.建立连接

if("POST"){    out = new BufferedWriter(new OutputStreamWriter(conn.getOutputStream(), "UTF-8"));    out.write(data);    out.flush();}if("GET"){    conn.connect();}   try{    return handleResponse(conn);}catch (Exception e){    if(!(e instanceof SocketException || e instanceof SocketTimeoutException)){        logger.error(url,e);    }    throw e;}
原创粉丝点击