We ask the user to generate a new key, because actively asking for the old one is training bad security habits, but technically verifying the old key will also work. |
||
|---|---|---|
| .. | ||
| bools.xml | ||
| colors.xml | ||
| config.xml | ||
| ic_launcher_background.xml | ||
| strings.xml | ||
| themes.xml | ||