Modify Windows Mobile's signature restrictions through the Registry

Source: Internet
Author: User

In the development of Windows Mobile, because Microsoft imposes restrictions on access to some APIs based on security considerations, sometimes the application needs a signature to run. This is undoubtedly a very troublesome issue. For programs without signatures, the Microsoft simulator will prompt:

 

If you can skip Microsoft's security restrictions, it is undoubtedly the most convenient method for development. You can do this by modifying the registry information, as shown below:

L use ActiveSync to upload the sp_allowcertificateinstall.cab file to the simulator directory and install it;

L transfer the regeditstg2.exe file to the simulator directory through activesync;

L double-click the regeditstg2.exe file and navigate to the HKEY_LOCAL_MACHINE/security/policies/directory. Then click the values key and set the value of 00001005 to 40 (16 by default );

L restart the simulator;

L reinstall the CBA (cabinet) application;

 

The key values in the Registry correspond to the following meanings:

; Autorun Policy
; Value: 0-applications on a CF card are allowed to auto-run
; [HKEY_LOCAL_MACHINE/security/policies]
, "00000002" = DWORD: 0

; Rapi Policy
; Value: 2-rapi CILS in restricted mode
[HKEY_LOCAL_MACHINE/security/policies]
"00001001" = DWORD: 2

; Unsigned cabs role
; (Default: secrole_userauth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001005" = DWORD: 10

; Unsigned applications Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001006" = DWORD: 1

; Unauthenticated role is used for processing homescreens
[HKEY_LOCAL_MACHINE/security/policies]
"00001007" = DWORD: 40

; TPS Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001008" = DWORD: 1

; Message Authentication retry number Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001009" = DWORD: 3

; WAP signed message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted | secrole_operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100b" = DWORD: C80

; SL message Policy
; (Default: secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100c" = DWORD: 800

; Si message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100d" = DWORD: c00

; Unauthenticated message Policy
; Value: 64-user_unauth
[HKEY_LOCAL_MACHINE/security/policies]
"0000100e" = DWORD: 40

; OTA provisioning policy
; (Default: operator_tps | secrole_ppg_trusted | secrole_ppg_auth | secrole_trusted_ppg | user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100f" = DWORD: E90

; WSP push Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001011" = DWORD: 1

; Grant Manager Policy
; (Default: operator_tps for phone SKUs; user_auth for non-phone SKUs)
[HKEY_LOCAL_MACHINE/security/policies]
If skutype = phonesku
"00001017" = DWORD: 80
Endif; skutype = phonesku
If skutype = phonesku!
"00001017" = DWORD: 10
Endif; skutype = phonesku!

; Grant user auth Policy
; (Default: user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001018" = DWORD: 10

; Trust WAP proxy Policy
; (Default: Operator | operator_tps | Manager)
[HKEY_LOCAL_MACHINE/security/policies]
"00001019" = DWORD: 8C

; Unsigned prompt policy
[HKEY_LOCAL_MACHINE/security/policies]
"2017101a" = DWORD: 0

; Privileged apps Policy
[HKEY_LOCAL_MACHINE/security/policies]
"2017101b" = DWORD: 1

; DRM Security Policy
; (Default secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"00001021" = DWORD: c00

; Encrypted mail (useencrypt) Policy
; Applies to Windows Mobile aku2 and later
[HKEY_LOCAL_MACHINE/security/policies]
"0000101e" = DWORD: 1
Default Security Policy settings for Windows Mobile-based smartphone
The following code shows the default security policy settings for Windows Mobile-based smartphone:
; Rapi Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001001" = DWORD: 2

; Unsigned cabs role
[HKEY_LOCAL_MACHINE/security/policies]
"00001005" = DWORD: 10

; Unsigned applications Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001006" = DWORD: 1

; Unauthenticated role is used for processing homescreens
[HKEY_LOCAL_MACHINE/security/policies]
"00001007" = DWORD: 40

; TPS Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001008" = DWORD: 1

; Message Authentication retry number Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001009" = DWORD: 3

; WAP signed message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted | secrole_operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100b" = DWORD: C80

; SL message Policy
; (Default: secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100c" = DWORD: 800

; Si message Policy
; (Default: secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100d" = DWORD: c00

; Unauthenticated message Policy
[HKEY_LOCAL_MACHINE/security/policies]
"0000100e" = DWORD: 40

; OTA provisioning policy
; (Default: operator_tps | secrole_ppg_trusted | secrole_ppg_auth | secrole_trusted_ppg | user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"0000100f" = DWORD: E90

; WSP push Policy
[HKEY_LOCAL_MACHINE/security/policies]
"00001011" = DWORD: 1

; Grant Manager Policy
; (Default: operator_tps)
[HKEY_LOCAL_MACHINE/security/policies]
"00001017" = DWORD: 80

; Grant user auth Policy
; (Default: user_auth)
[HKEY_LOCAL_MACHINE/security/policies]
"00001018" = DWORD: 10

; Trust WAP proxy Policy
; (Default: Operator | operator_tps | Manager)
[HKEY_LOCAL_MACHINE/security/policies]
"00001019" = DWORD: 8C

; Unsigned prompt policy
; If the registry value is not present, the behavior is the same as setting the value to 0 (zero ).

; Privileged apps Policy
; If the registry value is not present, the behavior is the same as setting the value to 0 (zero ).

; DRM Security Policy
; (Default secrole_ppg_auth | secrole_ppg_trusted)
[HKEY_LOCAL_MACHINE/security/policies]
"00001021" = DWORD: c00

; Encrypted mail (useencrypt) Policy
; Applies to Windows Mobile aku2 and later
[HKEY_LOCAL_MACHINE/security/policies]
"0000101e" = DWORD: 1

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.