AndroidPinning | standalone library project for certificate pinning | Build Tool library
kandi X-RAY | AndroidPinning Summary
kandi X-RAY | AndroidPinning Summary
A standalone library project for certificate pinning on Android.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Verifies that the server certificate is trusted
- Check system trust
- Determine if the given certificate is a trust root
- Checks if two X509Certificate are valid
- Checks if the chain is stale
- Returns the trust root for the given certificate
- Checks to see if the given certificate is valid
- Convenience method to remove trusted chains
- Creates an SSLSocket connection
- Create SSL socket
- Construct an HttpsURLConnection with pinned pins
- Get the singleton instance
- Initialize the system trust managers
- Converts a hex string to a byte array
- Initializes the trust roots from the trust store
- Creates an HTTP client that supports pinned SSL connections
- Returns the keystore file to be trusted
- Clears the cache
AndroidPinning Key Features
AndroidPinning Examples and Code Snippets
Community Discussions
Trending Discussions on AndroidPinning
QUESTION
I am developing a project that require the Android app can prevent bypassing certificate pinning/trust a fake cert when doing network calling even in a rooted devices.
So far I can make it when the device is not rooted. I just need to prevent some bypassing method like using JustTrustMe in Xposed framework.
I am using retrofit and okHttp during network calling.
I have tried the using CertPinner in okHttp and its version is 3.10.0 and also tried to follow the code in android developer https://developer.android.com/training/articles/security-ssl#java
here is the sample code i have tried and copied from google
...ANSWER
Answered 2019-Nov-01 at 07:07After some testing, load CAs from an InputStream would not work for all rooted devices with bypassing module enabled. It still works for normal device
The only way I could prevent it is to use public key cert pinning with proguard at the same time, hope this only help some ppl encounter the same problems.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install AndroidPinning
You can use AndroidPinning like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the AndroidPinning component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page