No Description

RNFetchBlobUtils.java 3.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. package com.RNFetchBlob;
  2. import com.facebook.react.bridge.Arguments;
  3. import com.facebook.react.bridge.WritableMap;
  4. import com.facebook.react.modules.core.DeviceEventManagerModule;
  5. import java.security.MessageDigest;
  6. import java.security.cert.CertificateException;
  7. import javax.net.ssl.HostnameVerifier;
  8. import javax.net.ssl.SSLContext;
  9. import javax.net.ssl.SSLSession;
  10. import javax.net.ssl.SSLSocketFactory;
  11. import javax.net.ssl.TrustManager;
  12. import javax.net.ssl.X509TrustManager;
  13. import okhttp3.OkHttpClient;
  14. public class RNFetchBlobUtils {
  15. public static String getMD5(String input) {
  16. String result = null;
  17. try {
  18. MessageDigest md = MessageDigest.getInstance("MD5");
  19. md.update(input.getBytes());
  20. byte[] digest = md.digest();
  21. StringBuffer sb = new StringBuffer();
  22. for (byte b : digest) {
  23. sb.append(String.format("%02x", b & 0xff));
  24. }
  25. result = sb.toString();
  26. } catch (Exception ex) {
  27. ex.printStackTrace();
  28. } finally {
  29. return result;
  30. }
  31. }
  32. public static void emitWarningEvent(String data) {
  33. WritableMap args = Arguments.createMap();
  34. args.putString("event", "warn");
  35. args.putString("detail", data);
  36. // emit event to js context
  37. RNFetchBlob.RCTContext.getJSModule(DeviceEventManagerModule.RCTDeviceEventEmitter.class)
  38. .emit(RNFetchBlobConst.EVENT_MESSAGE, args);
  39. }
  40. public static OkHttpClient.Builder getUnsafeOkHttpClient() {
  41. try {
  42. // Create a trust manager that does not validate certificate chains
  43. final TrustManager[] trustAllCerts = new TrustManager[]{
  44. new X509TrustManager() {
  45. @Override
  46. public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws CertificateException {
  47. }
  48. @Override
  49. public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws CertificateException {
  50. }
  51. @Override
  52. public java.security.cert.X509Certificate[] getAcceptedIssuers() {
  53. return new java.security.cert.X509Certificate[]{};
  54. }
  55. }
  56. };
  57. // Install the all-trusting trust manager
  58. final SSLContext sslContext = SSLContext.getInstance("SSL");
  59. sslContext.init(null, trustAllCerts, new java.security.SecureRandom());
  60. // Create an ssl socket factory with our all-trusting manager
  61. final SSLSocketFactory sslSocketFactory = sslContext.getSocketFactory();
  62. OkHttpClient.Builder builder = new OkHttpClient.Builder();
  63. builder.sslSocketFactory(sslSocketFactory);
  64. builder.hostnameVerifier(new HostnameVerifier() {
  65. @Override
  66. public boolean verify(String hostname, SSLSession session) {
  67. return true;
  68. }
  69. });
  70. return builder;
  71. } catch (Exception e) {
  72. throw new RuntimeException(e);
  73. }
  74. }
  75. }