比較不錯的帖子哦
android Video Buffer傳輸流程
http://www.eoeandroid.com/thread-195728-1-1.html
利用反射機制,封裝 SAX解析類,從而解析網絡xml文件
http://www.eoeandroid.com/thread-193789-1-1.html
關於Android root工具SuperOneClick教程詳解
http://www.eoeandroid.com/thread-190233-1-1.html
如果不需要驗證服務器端證書,直接照這里做。
public class Demo extends Activity { /** Called when the activity is first created. */ private TextView text; @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.main); text = (TextView)findViewById(R.id.text); GetHttps(); } private void GetHttps(){ String https = " https://800wen.com/"; try{ SSLContext sc = SSLContext.getInstance("TLS"); sc.init(null, new TrustManager[]{new MyTrustManager()}, new SecureRandom()); HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory()); HttpsURLConnection.setDefaultHostnameVerifier(new MyHostnameVerifier()); HttpsURLConnection conn = (HttpsURLConnection)new URL(https).openConnection();
conn.setDoOutput(true); conn.setDoInput(true); conn.connect(); BufferedReader br = new BufferedReader(new InputStreamReader(conn.getInputStream())); StringBuffer sb = new StringBuffer(); String line; while ((line = br.readLine()) != null) sb.append(line); text.setText(sb.toString()); }catch(Exception e){ Log.e(this.getClass().getName(), e.getMessage()); } } private class MyHostnameVerifier implements HostnameVerifier{ @Override public boolean verify(String hostname, SSLSession session) { // TODO Auto-generated method stub return true; } } private class MyTrustManager implements X509TrustManager{ @Override public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException { // TODO Auto-generated method stub } @Override public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException { // TODO Auto-generated method stub } @Override public X509Certificate[] getAcceptedIssuers() { // TODO Auto-generated method stub return null; } } }
如果需要驗證服務器端證書(這樣能夠防釣魚),我是這樣做的,還有些問題問大牛:
a. 導出公鑰。在瀏覽器上用https訪問tomcat,查看其證書,並另存為一個文件(存成了X.509格式:xxxx.cer)
b. 導入公鑰。把xxxx.cer放在Android的assets文件夾中,以方便在運行時通過代碼讀取此證書,留了兩個問題給大牛:
AssetManager am = context.getAssets(); InputStream ins = am.open("robusoft.cer"); try { //讀取證書 CertificateFactory cerFactory = CertificateFactory.getInstance("X.509"); //問1 Certificate cer = cerFactory.generateCertificate(ins); //創建一個證書庫,並將證書導入證書庫 KeyStore keyStore = KeyStore.getInstance("PKCS12", "BC"); //問2 keyStore.load(null, null); keyStore.setCertificateEntry("trust", cer); return keyStore; } finally { ins.close(); } //把咱的證書庫作為信任證書庫 SSLSocketFactory socketFactory = new SSLSocketFactory(keystore); Scheme sch = new Scheme("https", socketFactory, 443); //完工 HttpClient mHttpClient = new DefaultHttpClient(); mHttpClient.getConnectionManager().getSchemeRegistry().register(sch);
問1:這里用"PKCS12"不行
答1:PKCS12和JKS是keystore的type,不是Certificate的type,所以X.509不能用PKCS12代替
問2:這里用"JKS"不行。
答2:android平台上支持的keystore type好像只有PKCS12,不支持JKS,所以不能用JKS代替在PKCS12,不過在windows平台上是可以代替的
原文鏈接:http://www.eoeandroid.com/thread-197276-1-1.html