There's no reason to pay those people any $$ for a certificate for
this purpose.

There are directions somewhere in the documentation you can follow. I
think you can do it with keytool's -genkeypair command.

Make VERY, VERY sure you do not lose either the keystore with the
private key and cert, or the passwords that protect them.

Let me repeat that: If you lose them, after you publish your app --
YOU ARE SCREWED.

You should probably stop reading here, and go try it with keytool...
=====

I had already set up my own private CA for other reasons, and I wanted
my cert integrated with that.

What I did is to download OpenSSL, and set up my own private CA, and
use that to generate a certificate request, and signed it with the CA
cert. I then packaged that into a PKCS#12 keystore (.p12), and
imported that into my .jks keystore (for compatibility with the Java
tools).

Then, when I finally uploaded my app, I found I'd slightly
miscalculated the # of days until the required expiration date
(minimum of Oct 22, 2033), so I had to do it again.

(That's when I found I'd somehow misrecorded the password for my CA
cert -- so I had to do THAT again, too. OUCH!)

But that's overkill. All you really need is a self-signed certificate
and associated private key, in a .jks keystore. You don't even need a
CA; I just did that to enable me to better track them.

Just be VERY, VERY careful not to lose the private key or the
passwords. If you lose them after you upload, you're basically
screwed. (I wasn't in that situation, at least -- my cert and key
would have been good for a couple decades).

This somewhat simpler procedure should work for you, if you want more
control over your certs than keytool gives you for some reason:

openssl req -newkey rsa:2048 -sha1 -x509 -out foocert.pem -keyout
fookey.pem -days 11000
(supply requested info, including new password)
openssl pkcs12 -name "mykey" -inkey fookey.pem -in foocert.pem -export
-out foo.p12
(Supply key password and new keystore password)
keytool -importkeystore -v -srckeystore foo.p12 -srcstoretype pkcs12 -
destkeystore foo.jks
(supply passwords)
keytool -keypasswd -alias mykey -keystore foo.jks
(Supply keystore and new key passwords)

I don't know why every cryptography tool I've ever used has been such
a pain to use, even if you know exactly what you want to accomplish
cryptography-wise!

On Mar 22, 11:47 pm, ABhi <[email protected]> wrote:
> Hi,
>
> I've this doubt regarding the certification authorities that Android
> phone supports.
>
> With my previous experience with J2ME, which states that some of the
> phones doesn't support thawt, while some other doesn't support
> verisign and so on. Net, net, there wasn't any certification authority
> which was supported by all the devices.
>
> Now before diving Android development, i wanted to find out which
> certification i should buy which would help me sign my final
> application and will be allowed in Android market.
>
> Please help me answer below queries.
>
> 1. Which SSL certificates are supported to access my website through
> android phone?
>
> 2. With which certification authority i should sign my application in
> order to let it run on all the android phone.
>
> Thanks in Advance & Regards,
> Abhishek

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

To unsubscribe from this group, send email to 
android-developers+unsubscribegooglegroups.com or reply to this email with the 
words "REMOVE ME" as the subject.

Reply via email to