查看APK的簽名的方法

跳轉原文android

 

一、查看 keystore  ide

$ keytool -list -keystore debug.keystore spa

結果:.net

Keystore type: JKSdebug

Keystore provider: SUNxml

Your keystore contains 1 entryblog

androiddebugkey, Mar 21, 2013, PrivateKeyEntry, get

Certificate fingerprint (MD5): E0:F4:90:EE:CD:77:17:0E:B8:C4:AC:64:B2:F6:FC:83it

二、查看三方應用或是系統應用簽名
用winrar打開待查看的apk,將其中META-INF文件夾解壓出來,獲得其中的CERT.RSA文件
io

$ keytool -printcert -file META-INF/CERT.RSA

結果:

Owner: CN=Android Debug, O=Android, C=US

Issuer: CN=Android Debug, O=Android, C=US

Serial number: 514ab2e1

Valid from: Thu Mar 21 15:12:33 CST 2013 until: Sat Mar 14 15:12:33 CST 2043

Certificate fingerprints:

MD5:  E0:F4:90:EE:CD:77:17:0E:B8:C4:AC:64:B2:F6:FC:83

SHA1: 7F:E5:11:D8:37:4F:DA:D7:75:EA:A5:8C:47:06:85:95:6D:1D:3F:2B

Signature algorithm name: SHA1withRSA

Version: 3


三、給空白包簽名

 

jarsigner -verbose -keystore [keystorePath] -signedjar [apkOut] [apkIn] [alias]


jarsigner命令格式:-verbose輸出詳細信息 -keystore密鑰庫位置 -signedjar要生成的文件 要簽名的文件 密鑰庫文件

keystorePath參數表明keyStore的絕對路徑,如D:\keystore

apkOut參數表明簽名後的apk路徑,如D:\signed.apk

apkin參數表明在騰訊應用中心下載的未簽名apk,默認名稱爲tap_unsign.apk

alias參數表明簽名用的alias名稱(建立keyStore時所填寫),如timdong


 

$ jarsigner -verbose -keystore debug.keystore -signedjar test2.apk tap_unsign1.apk timdong

Enter Passphrase for keystore: 

   adding: META-INF/MANIFEST.MF

   adding: META-INF/ANDROIDD.SF

   adding: META-INF/ANDROIDD.RSA

  signing: res/drawable/ic_launcher.png

  signing: res/layout/main.xml

  signing: AndroidManifest.xml

  signing: resources.arsc

  signing: classes.dex

相關文章
相關標籤/搜索