I faced the problem described here at first 
http://stackoverflow.com/questions/18824733/sslcontext-and-pkcs12-keystore-works-on-jvm-but-not-on-android

But then i've found that connection fails only on 4.x (3.x possibly too but 
not tested) so lately i created a simple wrapper around *X509KeyManager *class 
and the result is that i always get *null *from *getClientAliases* and 
therefore from *chooseClientAlias* methods and no private key returned(no 
alias - no key)

Have anyone faced same problems ? I believe that new version of *X509KeyManager 
*behaves properly but i can't understand why there is so difference in 
behavior among JVM + Android 2.* and Android 4.*

**P.S.** There similar problems, i think, guys have here 
https://groups.google.com/forum/#!topic/android-security-discuss/Qhoy401dsRI 
or 
http://stackoverflow.com/questions/8776952/ssl-client-authentication-broken-in-android-4-0
 
but it hard to say what was the working solution of their problem. The 
quickest solution i've found is just to return hardcoded alias in 
*chooseClientAlias 
*but it's kinda lame :)

**P.S.2** There are tons(!), literally tons of articles how to trust 
self-signed certificate but only a few about keystores... guys c'mon. I 
wish DevBytes come up another day with some SSL\Encryption talk instead of 
another animation thing... :)

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-security-discuss+unsubscr...@googlegroups.com.
To post to this group, send email to android-security-discuss@googlegroups.com.
Visit this group at http://groups.google.com/group/android-security-discuss.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to