Android signature mechanism-Detailed description of the signature processI. Preface
After a long time, the hands without writing articles were a little uncomfortable. Today is Christmas, or you have to go to work. A few days ago, a colleague asked
This article was reproduced from: http://www.wjdiankong.cn/android%E7%AD%BE%E5%90%8D%E6%9C%BA%E5%88%B6%E4%B9%8B-%E7%AD%BE%E5%90%8D%E8%BF% 87%e7%a8%8b%e8%af%a6%e8%a7%a3/First, prefaceIt's been a long time, not writing the hands of the article is a
0x01 Android Signature mechanismRename the apk to a zip file, and you can see a Meta-inf folder with three files, named MANIFEST.MF, CERT, respectively. SF and Cert.rsa, these are signature files that are generated using Signapk.jar.1, MANIFEST. MF
1. Why signature?
1) sender authentication
Because developers may use the same package name to confuse and replace the installedProgramTo ensure that the packages with different signatures are not replaced.
2) ensure the integrity of
Android APK signature comparison
Users who have published Android apps should know that the release of Android APK requires signatures. The signature mechanism plays an important role in Android applications and frameworks.
For example, the Android
Android APK Signature ComparisonFriends who have released Android apps should be aware that the Android APK release needs to be signed. The signature mechanism plays an important role in Android applications and frameworks.For example, the Android
Go to:OBJC ChinaAnalysis of Code signatureDOPCN Oct Share Articles
"Users will appreciate the benefits of code signing" –apple Developer Library:code Signing Guide
Most of the APIs you need to use for app development on IOS or OS X
..................
Back to Android, there are many people who have developed Android applications this year (because there are too many people who want to make money ). Are the "package name and class name" prone to "crash? With the signature file,
IPhone code signature
The iPhone 2.0 firmware needs to check the signature of each application. If it fails, it will automatically kill. Because the Verification Mechanism achieves many features in the kernel, it is difficult to fix it simply by
Source: CCID
Author: Li Suke
(Reprinted in the preface: a good article I found on the Internet has summarized everything I 've been looking for a few days. I am very grateful to the author: Li Suke was actually looking for materials, the main
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.