
org.silvertunnel_ng.netlib.layer.tls.TLSNetSocketUtil Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of netlib Show documentation
Show all versions of netlib Show documentation
SilverTunnel-NG Netlib is a free library for the Java programming language that implements and
encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity
network. Netlib can be easily integrated in almost every existing and new Java application. The library requires
Java 1.6/Java SE 6 or a newer version.
The original silvertunnel Netlib can be found here : silvertunnel.org
The newest version!
/*
* silvertunnel.org Netlib - Java library to easily access anonymity networks
* Copyright (c) 2009-2012 silvertunnel.org
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, see .
*/
package org.silvertunnel_ng.netlib.layer.tls;
import org.silvertunnel_ng.netlib.api.NetSocket;
import org.silvertunnel_ng.netlib.api.impl.NetSocket2Socket;
import org.silvertunnel_ng.netlib.api.impl.Socket2NetSocket;
import org.silvertunnel_ng.netlib.api.util.JavaVersion;
import org.silvertunnel_ng.netlib.api.util.TcpipNetAddress;
import org.silvertunnel_ng.netlib.layer.tls.android.LocalProxySocket;
import org.silvertunnel_ng.netlib.layer.tor.util.TorException;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.net.ssl.*;
import java.io.IOException;
import java.net.InetSocketAddress;
import java.net.Socket;
import java.security.KeyManagementException;
import java.security.NoSuchAlgorithmException;
import java.util.Arrays;
/**
* Helper method to access the Java-internal TLS/SSL logic.
*
* @author hapke
*/
public class TLSNetSocketUtil {
/** */
private static final Logger LOG = LoggerFactory.getLogger(TLSNetSocketUtil.class);
/**
* Returns a socket layered over an existing socket connected to the named
* host, at the given port. This construction can be used when tunneling
* SSL/TLS through a proxy or when negotiating the use of SSL/TLS over an
* existing socket. The host and port refer to the logical peer destination.
*
* @param lowerLayerNetSocket
* @param remoteAddress
* @param autoClose
* @param enabledCipherSuites if null, the default TLS cipher suites are used
* @param keyManagers if null, the now local keys are used
* @param trustManagers if null, the default trust managers are used
* @return
* @throws IOException
*/
public static NetSocket createTLSSocket(NetSocket lowerLayerNetSocket,
TcpipNetAddress remoteAddress, boolean autoClose,
String[] enabledCipherSuites, KeyManager[] keyManagers,
TrustManager[] trustManagers) throws IOException {
Socket lowerLayerSocket = new NetSocket2Socket(
lowerLayerNetSocket);
if (JavaVersion.getJavaVersion() == JavaVersion.ANDROID) {
try {
lowerLayerSocket = new LocalProxySocket(lowerLayerSocket);
} catch (TorException e) {
LOG.debug("Could not create LocalProxySocket which is needed for Android!", e);
}
}
// create TLS/SSL socket factory
SSLContext context = null;
try {
context = SSLContext.getInstance("TLS");
context.init(keyManagers, trustManagers, null);
} catch (final NoSuchAlgorithmException e) {
final IOException ioe = new IOException();
ioe.initCause(e);
LOG.debug("Got Exception during SSLContext init", e);
throw ioe;
} catch (final KeyManagementException e) {
final IOException ioe = new IOException();
ioe.initCause(e);
LOG.debug("Got Exception during SSLContext init", e);
throw ioe;
}
final SSLSocketFactory f = context.getSocketFactory();
// create TLS/SSL session with socket
final String hostname = (remoteAddress != null) ? remoteAddress
.getHostname() : null;
final int port = (remoteAddress != null) ? remoteAddress.getPort() : 0;
final SSLSocket resultSocket = (SSLSocket) f.createSocket(
lowerLayerSocket, hostname, port, autoClose);
// set properties
if (LOG.isDebugEnabled()){
LOG.debug("default enabledCipherSuites="
+ Arrays.toString(resultSocket.getEnabledCipherSuites()));
}
if (enabledCipherSuites != null) {
resultSocket.setEnabledCipherSuites(enabledCipherSuites);
if (LOG.isDebugEnabled()) {
LOG.debug("set enabledCipherSuites="
+ Arrays.toString(enabledCipherSuites));
}
}
if (!resultSocket.isConnected()) {
resultSocket.connect(new InetSocketAddress(hostname, port));
}
try {
resultSocket.startHandshake();
} catch (Exception e) {
LOG.error("Handshake : ", e);
}
return new TLSNetSocket(new Socket2NetSocket(resultSocket),
resultSocket.getSession(), "" + lowerLayerNetSocket);
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy