java tsl_如何在Java 6中使用TLS 1.2

此处是TLSConnection工厂:

package test.connection;

import java.io.ByteArrayInputStream;

import java.io.ByteArrayOutputStream;

import java.io.DataOutputStream;

import java.io.IOException;

import java.io.InputStream;

import java.io.OutputStream;

import java.net.InetAddress;

import java.net.InetSocketAddress;

import java.net.Socket;

import java.net.UnknownHostException;

import java.security.Principal;

import java.security.SecureRandom;

import java.security.Security;

import java.security.cert.CertificateException;

import java.security.cert.CertificateFactory;

import java.util.Hashtable;

import java.util.LinkedList;

import java.util.List;

import javax.net.ssl.HandshakeCompletedEvent;

import javax.net.ssl.HandshakeCompletedListener;

import javax.net.ssl.SSLPeerUnverifiedException;

import javax.net.ssl.SSLSession;

import javax.net.ssl.SSLSessionContext;

import javax.net.ssl.SSLSocket;

import javax.net.ssl.SSLSocketFactory;

import javax.security.cert.X509Certificate;

import org.bouncycastle.crypto.tls.Certificate;

import org.bouncycastle.crypto.tls.CertificateRequest;

import org.bouncycastle.crypto.tls.DefaultTlsClient;

import org.bouncycastle.crypto.tls.ExtensionType;

import org.bouncycastle.crypto.tls.TlsAuthentication;

import org.bouncycastle.crypto.tls.TlsClientProtocol;

import org.bouncycastle.crypto.tls.TlsCredentials;

import org.bouncycastle.jce.provider.BouncyCastleProvider;

/**

* This Class enables TLS V1.2  connection based on BouncyCastle Providers.

* Just to use:

* URL myurl = new URL( "http:// ...URL tha only Works in TLS 1.2);

HttpsURLConnection  con = (HttpsURLConnection )myurl.openConnection();

con.setSSLSocketFactory(new TSLSocketConnectionFactory());

* @author AZIMUTS

*

*/

public class TSLSocketConnectionFactory extends SSLSocketFactory {

//

//Adding Custom BouncyCastleProvider

///

static {

if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null)

Security.addProvider(new BouncyCastleProvider());

}

//

//HANDSHAKE LISTENER

///

public class TLSHandshakeListener implements HandshakeCompletedListener {

@Override

public void handshakeCompleted(HandshakeCompletedEvent event) {

}

}

//

//SECURE RANDOM

///

private SecureRandom _secureRandom = new SecureRandom();

//

//Adding Custom BouncyCastleProvider

///

@Override

public Socket createSocket(Socket socket, final String host, int port, boolean arg3)

throws IOException {

if (socket == null) {

socket = new Socket();

}

if (!socket.isConnected()) {

socket.connect(new InetSocketAddress(host, port));

}

final TlsClientProtocol tlsClientProtocol = new TlsClientProtocol(socket.getInputStream(), socket.getOutputStream(), _secureRandom);

return _createSSLSocket(host, tlsClientProtocol);

}

//

// SOCKET FACTORY  METHODS

//

@Override

public String[] getDefaultCipherSuites() {

return null;

}

@Override

public String[] getSupportedCipherSuites(){

return null;

}

@Override

public Socket createSocket(String host, int port) throws IOException,UnknownHostException{

return null;

}

@Override

public Socket createSocket(InetAddress host, int port) throws IOException {

return null;

}

@Override

public Socket createSocket(String host, int port, InetAddress localHost,

int localPort) throws IOException, UnknownHostException {

return null;

}

@Override

public Socket createSocket(InetAddress address, int port,

InetAddress localAddress, int localPort) throws IOException{

return null;

}

//

//SOCKET CREATION

//

private SSLSocket _createSSLSocket(final String host , final TlsClientProtocol tlsClientProtocol) {

return new SSLSocket() {

private java.security.cert.Certificate[] peertCerts;

@Override

public InputStream getInputStream() throws IOException {

return tlsClientProtocol.getInputStream();

}

@Override

public OutputStream getOutputStream() throws IOException {

return tlsClientProtocol.getOutputStream();

}

@Override

public synchronized void close() throws IOException {

tlsClientProtocol.close();

}

@Override

public void addHandshakeCompletedListener(HandshakeCompletedListener arg0) {

}

@Override

public boolean getEnableSessionCreation() {

return false;

}

@Override

public String[] getEnabledCipherSuites() {

return null;

}

@Override

public String[] getEnabledProtocols() {

// TODO Auto-generated method stub

return null;

}

@Override

public boolean getNeedClientAuth(){

return false;

}

@Override

public SSLSession getSession() {

return new SSLSession() {

@Override

public int getApplicationBufferSize() {

return 0;

}

@Override

public String getCipherSuite() {

throw new UnsupportedOperationException();

}

@Override

public long getCreationTime() {

throw new UnsupportedOperationException();

}

@Override

public byte[] getId() {

throw new UnsupportedOperationException();

}

@Override

public long getLastAccessedTime() {

throw new UnsupportedOperationException();

}

@Override

public java.security.cert.Certificate[] getLocalCertificates() {

throw new UnsupportedOperationException();

}

@Override

public Principal getLocalPrincipal() {

throw new UnsupportedOperationException();

}

@Override

public int getPacketBufferSize() {

throw new UnsupportedOperationException();

}

@Override

public X509Certificate[] getPeerCertificateChain()

throws SSLPeerUnverifiedException {

// TODO Auto-generated method stub

return null;

}

@Override

public java.security.cert.Certificate[] getPeerCertificates()throws SSLPeerUnverifiedException {

return peertCerts;

}

@Override

public String getPeerHost() {

throw new UnsupportedOperationException();

}

@Override

public int getPeerPort() {

return 0;

}

@Override

public Principal getPeerPrincipal() throws SSLPeerUnverifiedException {

return null;

//throw new UnsupportedOperationException();

}

@Override

public String getProtocol() {

throw new UnsupportedOperationException();

}

@Override

public SSLSessionContext getSessionContext() {

throw new UnsupportedOperationException();

}

@Override

public Object getValue(String arg0) {

throw new UnsupportedOperationException();

}

@Override

public String[] getValueNames() {

throw new UnsupportedOperationException();

}

@Override

public void invalidate() {

throw new UnsupportedOperationException();

}

@Override

public boolean isValid() {

throw new UnsupportedOperationException();

}

@Override

public void putValue(String arg0, Object arg1) {

throw new UnsupportedOperationException();

}

@Override

public void removeValue(String arg0) {

throw new UnsupportedOperationException();

}

};

}

@Override

public String[] getSupportedProtocols() {

return null;

}

@Override

public boolean getUseClientMode() {

return false;

}

@Override

public boolean getWantClientAuth() {

return false;

}

@Override

public void removeHandshakeCompletedListener(HandshakeCompletedListener arg0) {

}

@Override

public void setEnableSessionCreation(boolean arg0) {

}

@Override

public void setEnabledCipherSuites(String[] arg0) {

}

@Override

public void setEnabledProtocols(String[] arg0) {

}

@Override

public void setNeedClientAuth(boolean arg0) {

}

@Override

public void setUseClientMode(boolean arg0) {

}

@Override

public void setWantClientAuth(boolean arg0) {

}

@Override

public String[] getSupportedCipherSuites() {

return null;

}

@Override

public void startHandshake() throws IOException {

tlsClientProtocol.connect(new DefaultTlsClient() {

@Override

public Hashtable getClientExtensions() throws IOException {

Hashtable clientExtensions = super.getClientExtensions();

if (clientExtensions == null) {

clientExtensions = new Hashtable();

}

//Add host_name

byte[] host_name = host.getBytes();

final ByteArrayOutputStream baos = new ByteArrayOutputStream();

final DataOutputStream dos = new DataOutputStream(baos);

dos.writeShort(host_name.length + 3); // entry size

dos.writeByte(0); // name type = hostname

dos.writeShort(host_name.length);

dos.write(host_name);

dos.close();

clientExtensions.put(ExtensionType.server_name, baos.toByteArray());

return clientExtensions;

}

@Override

public TlsAuthentication getAuthentication()

throws IOException {

return new TlsAuthentication() {

@Override

public void notifyServerCertificate(Certificate serverCertificate) throws IOException {

try {

CertificateFactory cf = CertificateFactory.getInstance("X.509");

List certs = new LinkedList();

for ( org.bouncycastle.asn1.x509.Certificate c : serverCertificate.getCertificateList()) {

certs.add(cf.generateCertificate(new ByteArrayInputStream(c.getEncoded())));

}

peertCerts = certs.toArray(new java.security.cert.Certificate[0]);

} catch (CertificateException e) {

System.out.println( "Failed to cache server certs"+ e);

throw new IOException(e);

}

}

@Override

public TlsCredentials getClientCredentials(CertificateRequest arg0)

throws IOException {

return null;

}

};

}

});

}

};//Socket

}

}

请记住,要证明这一点,最好是针对仅公开TLS 1.2的网站进行测试。如果Web公开TLS 1.0,则取决于Java实现的TLS 1.1将使用tls 1.0,tls 1.1连接。在仅公开TLS 1.2的网站上对其进行测试。一个示例可以是NIST安全站点https://www.nist.gov

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值