【问题标题】:Android : HTTPS urls are not working in Okhttp3Android:HTTPS url 在 Okhttp3 中不起作用
【发布时间】:2018-05-22 07:33:10
【问题描述】:

我在我的 android 应用程序中使用 Okhttp3 来下载文件。我在使用 https 网址时遇到问题。

我有两个网址

    String url1 = "https://cbsenet.nic.in/cbsenet/PDFDEC2014/Paper%20III/D-01-3.pdf";
    String url2 = "https://www.ugcnetonline.in/question_papers/June2014_paper-II/J-02-14-II.pdf";

url2 工作正常,而对于 url1 我遇到异常

线程“主”javax.net.ssl.SSLHandshakeException 中的异常:sun.security.validator.ValidatorException:PKIX 路径构建失败:sun.security.provider.certpath.SunCertPathBuilderException:无法找到请求目标的有效证书路径

我已经创建了一个示例 java 程序来演示这个问题

public static void main(String[] args) throws IOException {

    String url1 = "https://cbsenet.nic.in/cbsenet/PDFDEC2014/Paper%20III/D-01-3.pdf";
    String url2 = "https://www.ugcnetonline.in/question_papers/June2014_paper-II/J-02-14-II.pdf";

    Request request = new Request.Builder()
            .url(url1)
            .build();

    OkHttpClient client = new OkHttpClient();
    Response response = client.newCall(request).execute();
    System.out.println(response.body().string());
}

【问题讨论】:

    标签: java android okhttp3


    【解决方案1】:

    这是我的解决方案,它有效

    private static OkHttpClient generateDefaultOkHttp() {
        OkHttpClient.Builder builder = new OkHttpClient.Builder();
        try {
            // Create a trust manager that does not validate certificate chains
            final TrustManager[] trustAllCerts = new TrustManager[]{
                    new X509TrustManager() {
                        @SuppressLint("TrustAllX509TrustManager")
                        @Override
                        public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws CertificateException {
                        }
    
                        @SuppressLint("TrustAllX509TrustManager")
                        @Override
                        public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws CertificateException {
                        }
    
                        @Override
                        public java.security.cert.X509Certificate[] getAcceptedIssuers() {
                            return new java.security.cert.X509Certificate[]{};
                        }
                    }
            };
    
            // Install the all-trusting trust manager
            final SSLContext sslContext = SSLContext.getInstance("SSL");
            sslContext.init(null, trustAllCerts, new java.security.SecureRandom());
            // Create an ssl socket factory with our all-trusting manager
            final SSLSocketFactory sslSocketFactory = sslContext.getSocketFactory();
    
    
            builder.sslSocketFactory(sslSocketFactory, (X509TrustManager) trustAllCerts[0]);
            builder.hostnameVerifier(new HostnameVerifier() {
                @SuppressLint("BadHostnameVerifier")
                @Override
                public boolean verify(String hostname, SSLSession session) {
                    return true;
                }
            });
        } catch (Exception e) {
            e.printStackTrace();
        }
        builder.connectTimeout(60, TimeUnit.SECONDS)
                .readTimeout(60, TimeUnit.SECONDS)
                .writeTimeout(60, TimeUnit.SECONDS)
                .retryOnConnectionFailure(true);
        return builder.build();
    }
    

    【讨论】:

    • 上述代码不应在生产软件中使用,因为它盲目信任所有证书,这可能存在安全风险。自行决定使用上述代码。
    【解决方案2】:

    既然你最后选择了信任你的url1的所有cer,那么你怎么能让你的url2以前工作呢?

    BR, 向斌

    【讨论】:

      猜你喜欢
      • 2019-12-12
      • 1970-01-01
      • 2019-12-18
      • 2017-04-29
      • 2012-02-21
      • 1970-01-01
      • 2017-04-11
      • 2019-02-03
      • 2019-12-27
      相关资源
      最近更新 更多