diff options
| author | Scott Main <smain@google.com> | 2012-07-31 09:46:52 -0700 |
|---|---|---|
| committer | Scott Main <smain@google.com> | 2012-07-31 14:19:33 -0700 |
| commit | f284d49293aead609de5b83d601260cfd86b7978 (patch) | |
| tree | 7a94f865fe7deffa5bcb62283ec1412d51aae974 /docs/html/guide/practices/security.jd | |
| parent | a39fdd11e80618acc046fff65b6549b5c8b5aa8d (diff) | |
| download | frameworks_base-f284d49293aead609de5b83d601260cfd86b7978.zip frameworks_base-f284d49293aead609de5b83d601260cfd86b7978.tar.gz frameworks_base-f284d49293aead609de5b83d601260cfd86b7978.tar.bz2 | |
docs: fix broken links
Change-Id: I0523fb8eb8608b07cf7ca866d0c2ccfcbfc2e946
Diffstat (limited to 'docs/html/guide/practices/security.jd')
| -rw-r--r-- | docs/html/guide/practices/security.jd | 12 |
1 files changed, 5 insertions, 7 deletions
diff --git a/docs/html/guide/practices/security.jd b/docs/html/guide/practices/security.jd index 48ccdeb..ce59a9d 100644 --- a/docs/html/guide/practices/security.jd +++ b/docs/html/guide/practices/security.jd @@ -134,9 +134,8 @@ dynamic permission grants on a case-by-case basis.</p> <p>To provide additional protection for sensitive data, some applications choose to encrypt local files using a key that is not accessible to the -application. (For example, a key can be placed in a <code><a -href="{@docRoot}reference/java/security/KeyStore.html">KeyStore</a></code> and -protected with a user password that is not stored on the device). While this +application. (For example, a key can be placed in a {@link java.security.KeyStore} +and protected with a user password that is not stored on the device). While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without <a href="http://source.android.com/tech/encryption/index.html">file system @@ -716,8 +715,7 @@ href="{@docRoot}reference/android/accounts/AccountManager.html"> AccountManager</a></code> using <code><a href="{@docRoot}reference/android/content/pm/PackageManager.html#checkSignatures(java.lang.String,%20java.lang.String)">checkSignature()</a></code>. Alternatively, if only one application will use the credential, you might use a -<code><a -href={@docRoot}reference/java/security/KeyStore.html">KeyStore</a></code> for +{@link java.security.KeyStore} for storage.</p> <a name="Crypto"></a> @@ -751,8 +749,8 @@ href="{@docRoot}reference/javax/crypto/KeyGenerator.html"> number generator significantly weakens the strength of the algorithm, and may allow offline attacks.</p> -<p>If you need to store a key for repeated use, use a mechanism like <code><a -href="{@docRoot}reference/java/security/KeyStore.html">KeyStore</a></code> that +<p>If you need to store a key for repeated use, use a mechanism like + {@link java.security.KeyStore} that provides a mechanism for long term storage and retrieval of cryptographic keys.</p> |
