1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55
| package com.TPI.AvisTN;
import android.content.Context;
import android.util.Log;
import org.apache.http.conn.ClientConnectionManager;
import org.apache.http.conn.scheme.PlainSocketFactory;
import org.apache.http.conn.scheme.Scheme;
import org.apache.http.conn.scheme.SchemeRegistry;
import org.apache.http.conn.ssl.SSLSocketFactory;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.impl.conn.SingleClientConnManager;
import org.apache.http.params.HttpParams;
import java.io.IOException;
import java.io.InputStream;
import java.security.*;
public class HTTPs extends DefaultHttpClient {
final Context context;
public HTTPs(Context context) {
this.context = context;
}
@Override
protected ClientConnectionManager createClientConnectionManager() {
SchemeRegistry registry = new SchemeRegistry();
//Pour les requêtes HTTP, on laisse la classe de base s'en occuper.
registry.register(new Scheme("http", PlainSocketFactory.getSocketFactory(), 80));
// Les requêtes HTTPS se font sur le port 443. A chaque connexion HTTPS, cest notre keystore qui sera utilisé.
registry.register(new Scheme("https", newSslSocketFactory(), 443));
return new SingleClientConnManager(getParams(), registry);
}
private SSLSocketFactory newSslSocketFactory() {
try {
// On obtient une instance de notre KeyStore
KeyStore trusted = KeyStore.getInstance("BKS");
InputStream in = context.getResources().openRawResource(R.raw.my_keystore);
try {
// Initialisation de notre keystore. On entre le mot de passe (storepass)
trusted.load(in, "p".toCharArray());
} finally {
in.close();
}
// Passons le keystore au SSLSocketFactory qui est responsable de la verification du certificat
SSLSocketFactory sf = new SSLSocketFactory(trusted);
sf.setHostnameVerifier(SSLSocketFactory.STRICT_HOSTNAME_VERIFIER);
return sf;
} catch (Exception e) {
throw new AssertionError(e);
}
}
} |