-
-
Save mefarazath/c9b588044d6bffd26aac3c520660bf40 to your computer and use it in GitHub Desktop.
Get OkHttpClient which ignores all SSL errors.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
private static OkHttpClient getUnsafeOkHttpClient() { | |
try { | |
// Create a trust manager that does not validate certificate chains | |
final TrustManager[] trustAllCerts = new TrustManager[]{ | |
new X509TrustManager() { | |
@Override | |
public void checkClientTrusted(java.security.cert.X509Certificate[] chain, | |
String authType) throws CertificateException { | |
} | |
@Override | |
public void checkServerTrusted(java.security.cert.X509Certificate[] chain, | |
String authType) throws CertificateException { | |
} | |
@Override | |
public java.security.cert.X509Certificate[] getAcceptedIssuers() { | |
return new X509Certificate[0]; | |
} | |
} | |
}; | |
// Install the all-trusting trust manager | |
final SSLContext sslContext = SSLContext.getInstance("SSL"); | |
sslContext.init(null, trustAllCerts, new java.security.SecureRandom()); | |
// Create an ssl socket factory with our all-trusting manager | |
final SSLSocketFactory sslSocketFactory = sslContext.getSocketFactory(); | |
return new OkHttpClient.Builder() | |
.sslSocketFactory(sslSocketFactory, (X509TrustManager) trustAllCerts[0]) | |
.hostnameVerifier(new HostnameVerifier() { | |
@Override | |
public boolean verify(String hostname, SSLSession session) { | |
return true; | |
} | |
}).build(); | |
} catch (Exception e) { | |
throw new RuntimeException(e); | |
} | |
} |
Hi @dj-4war! How did you resolve the issues "Connection closed by peer" for Android 5.0+?
What's a difference between this approach and standard Okhttp builder methods?
final OkHttpClient.Builder okHttpClientBuilder = new OkHttpClient.Builder()
.sslSocketFactory(SslMockUtils.TRUST_ALL_SOCKET_FACTORY, SslMockUtils.TRUST_MANAGER)
.hostnameVerifier(SslMockUtils.TRUST_ALL_HOSTNAME_VERIFIER);
What's a difference between this approach and standard Okhttp builder methods?
final OkHttpClient.Builder okHttpClientBuilder = new OkHttpClient.Builder() .sslSocketFactory(SslMockUtils.TRUST_ALL_SOCKET_FACTORY, SslMockUtils.TRUST_MANAGER) .hostnameVerifier(SslMockUtils.TRUST_ALL_HOSTNAME_VERIFIER);
SslMockUtils is Not standart for OkHttpClient . Maybe this Utils have same realisation
Is there a way to write this in version okhttp 2.7.5? OkHttpClient
does not have a Builder
in that version.
I replaced the return statement with these lines:
OkHttpClient client = new OkHttpClient();
client.setSocketFactory(sslSocketFactory);
client.setHostnameVerifier(
new HostnameVerifier() {
@Override
public boolean verify(String hostname, SSLSession session) {
return true;
}
}
);
return client;
It seems like OkHttpClient
does not have aX509TrustManager
field in version 2.7.5, so I omitted it.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
public static Retrofit getRetrofit() {
return new Retrofit.Builder()
.baseUrl(AppConstants.PING_URL)
.client(getUnsafeOkHttpClient())
.addConverterFactory(SimpleXmlConverterFactory.create())
.build();
}
private static OkHttpClient getUnsafeOkHttpClient() {
try {
// Create a trust manager that does not validate certificate chains
final TrustManager[] trustAllCerts = new TrustManager[]{
new X509TrustManager() {
@OverRide
public void checkClientTrusted(java.security.cert.X509Certificate[] chain,
String authType) throws CertificateException {
}
I am still getting the hand shake exception.
On 5.0+ devices I am getting hand shake error. I tried all the ways suggested over the Web but no use Please help ASAP.
Connection closed by peer
08-20 21:07:15.587 31640-8149/com.we.samples W/System.err: javax.net.ssl.SSLHandshakeException: Connection closed by peer
08-20 21:07:15.588 31640-8149/com.we.samples W/System.err: at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
08-20 21:07:15.588 31640-8149/com.we.samples W/System.err: at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:357)
08-20 21:07:15.588 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:281)
08-20 21:07:15.588 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.java:251)
08-20 21:07:15.589 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.RealConnection.connect(RealConnection.java:151)
08-20 21:07:15.589 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.StreamAllocation.findConnection(StreamAllocation.java:195)
08-20 21:07:15.589 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.StreamAllocation.findHealthyConnection(StreamAllocation.java:121)
08-20 21:07:15.589 31640-8149/com.we.samples W/System.err: at okhttp3.internal.connection.StreamAllocation.newStream(StreamAllocation.java:100)
08-20 21:07:15.589 31640-8149/W/System.err: at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.java:42)
08-20 21:07:15.589 31640-8149/W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:92)
08-20 21:07:15.590 31640-8149/ W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:67)
08-20 21:07:15.590 31640-8149 W/System.err: at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.java:93)
08-20 21:07:15.590 31640-8149/W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:92)
08-20 21:07:15.590 31640-8149/ W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:67)
08-20 21:07:15.590 31640-8149/ W/System.err: at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.java:93)
08-20 21:07:15.590 31640-8149/ W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:92)
08-20 21:07:15.591 31640-8149/ W/System.err: at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.java:120)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:92)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:67)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at okhttp3.RealCall.getResponseWithInterceptorChain(RealCall.java:185)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at okhttp3.RealCall.execute(RealCall.java:69)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at retrofit2.OkHttpCall.execute(OkHttpCall.java:180)
08-20 21:07:15.591 31640-8149/com.we.samples W/System.err: at retrofit2.ExecutorCallAdapterFactory$ExecutorCallbackCall.execute(ExecutorCallAdapterFactory.java:91)