Wednesday, September 8, 2010

Step-to-Step Guide to Programming Android SSL with Self-Signed Server Certificate

There is a dearth of SDK documentation on how to work with SSL connections on Android with self-signed certificate. Here is a method that stores a self-signed certificate in the application resource and then later uses that certificate for SSL connections.

1. We create a self-signed server certificate for our SSL server:
keytool -genkey -dname "cn=ssltest, ou=test, o=example, c=US" 
   -alias ssltest -keypass ssltest -keystore c:\test\ssltest.keystore 
   -storepass ssltest -validity 180

2. We export the certificate to a file:
keytool -export -alias ssltest -keystore c:\test\ssltest.keystore 
   -file c:\test\ssltest.cer -storepass ssltest -keypass ssltest

3. Since Android uses the JCE provider from Bouncy Castle, we download the provider jar bcprov-jdk16-145.jar from BC and store it at C:\androidproject\libs.

4. Now, we import the server certificate to our Android project as a raw resource:
keytool -import -alias ssltestcert -file C:\test\ssltest.cer 
   -keypass ssltestcert -keystore C:\androidproject\res\raw\ssltestcert 
   -storetype BKS -storepass ssltestcert 
   -providerClass org.bouncycastle.jce.provider.BouncyCastleProvider 
   -providerpath c:\androidproject\libs\bcprov-jdk16-145.jar
Note that we give it a store type BKS.
If you use the Eclipse ADK, the ADK will automatically create a resource id ssltestcert after you refresh the project.

5. We can now use the server certificate in our Java program:
// Load the self-signed server certificate
char[] passphrase = "ssltestcert".toCharArray();
KeyStore ksTrust = KeyStore.getInstance("BKS");
TrustManagerFactory tmf = TrustManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());

// Create a SSLContext with the certificate
SSLContext sslContext = SSLContext.getInstance("TLS");
sslContext.init(null, tmf.getTrustManagers(), new SecureRandom());

// Create a HTTPS connection
URL url = new URL("https", "", 8443, "/ssltest");
HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();

/* Uncomment the following line of code if you want to skip SSL */
/* hostname verification.  But it should only be done for testing. */
/* See */
/* conn.setHostnameVerifier(new NullVerifier()); */


Congratulations! You can now use your self-signed server certificate for SSL communication.


  1. This comment has been removed by a blog administrator.

  2. Had to adjust a little, but worked well. Thanks for the post

  3. Hi,
    Could you share what adjustments were needed?

  4. Hi,
    I followed the steps mentioned above to generate the BKS keystore and am able to open it using Portecle.
    However, when i run the app, the server throws an exception at the accept call "could not find any key store entries to support the enabled cipher suites"
    Are any changes needed to the client code as well?

    1. client code? I didn't make any changes to the server code. I already had a self signed ssl certificate. Once you have those you don't really need to do much with those. Other then plug it in to what ever server setup you're using. Mine personally was a Node.js application.

      I used something like present in this: through step 4.

      Since I had already generated my self signed ssl certs.

      Then used step 4 on this post to generate the keystore.

      While the info here is useful. It could have been structured better. For sure would have helped to have some of the commands explained.


      Here's my server communication file, with the ssl stuff working. As well as showing it used.

      Hope that helps.

    3. Hi,
      Thanks for responding.
      Could you share more details on the process of generating self signed certificates?
      Like i said before, i get an exception "could not find trusted keystore for enabled cipher suites" when the server invokes the accept system call.


    4. Like I said I generated it using the method described here:



      openssl genrsa -out host.key 4096

      openssl req -new -x509 -days 1826 -key host.key -out host.crt

      fill out the info it asks for.

      Then follow the steps here starting with step 4.

      keytool -import -alias ssltestcert -file host.crt
      -keypass ssltestcert -keystore C:\androidproject\res\raw\keystore
      -storetype BKS -storepass somepassword
      -providerClass org.bouncycastle.jce.provider.BouncyCastleProvider
      -providerpath c:\androidproject\libs\bcprov-jdk16-145.jar

      Might take some tweaking. But such is the nature of programming.

      Good luck

    5. Thanks for the reply Aaron. :-)

  5. This comment has been removed by the author.