Download Apk Signer For Android

Download Apk Signer For Android Rating: 4,1/5 8139 reviews
The Android Developer Challenge is back! Submit your idea before December 2.
  1. Free Android Apps Download Apk
  2. Apk Signer For Android
  3. Download Apk Signer For Android Phone

Now it's just the same old same old. Aptoide is full of old apps and I don't have a problem downloading them AIO has all the newest ITC ghost box apps I'm after but it won't let you download any. Can anyone please help I'm not very tech savvy. Is there any apk store for android out there anywhere thanx in advance. Download the apk-signer 5.3.2 at Aptoide now! Virus and Malware free No extra costs. Scan the QR code and install this app directly in your Android device. Applications Tools apk-signer Description of apk-signer. Download apk-signer APK. Download apk-signer 5.3.2 APK For Android, APK File Named And APP Developer Company Is Hai Bison. Latest Android APK Vesion apk-signer Is apk-signer 5.3.2 Can Free Download APK Then Install On Android Phone. Download apk-signer 5.3.0 APK Other Version.

The apksigner tool, available in revision 24.0.3 and higher of the Android SDK Build Tools, allows you to sign APKs and to confirm that an APK's signature will be verified successfully on all versions of the Android platform supported by those APKs. This page presents a short guide for using the tool and serves as a reference for the different command-line options that the tool supports. For a more complete description of how the apksigner tool is used for signing your APKs, see the Sign your app guide.

Caution: If you sign your APK using apksigner and make further changes to the APK, the APK's signature is invalidated. Therefore, you must use tools such as zipalign before signing your APK.

Usage

Sign an APK

The syntax for signing an APK using the apksigner tool is as follows:

When you sign an APK using the apksigner tool, you must provide the signer's private key and certificate. You can include this information in two different ways:

  • Specify a KeyStore file using the --ks option.
  • Specify the private key file and certificate file separately using the --key and --cert options, respectively. The private key file must use the PKCS #8 format, and the certificate file must use the X.509 format.

Usually, you sign an APK using only one signer. In the event that you need to sign an APK using multiple signers, use the --next-signer option to separate the set of general options to apply to each signer:

Verify the signature of an APK

The syntax for confirming that an APK's signature will be verified successfully on supported platforms is as follows:

Rotate signing keys

The syntax for rotating a signing certificate lineage, or a new sequence of signatures, is as follows:

Options

The following lists include the set of options for each command that the apksigner tool supports.

Sign command

General options

The following options specify basic settings to apply to a signer:

--out <apk-filename>
The location where you'd like to save the signed APK. If this option isn't provided explicitly, the APK package is signed in-place, overwriting the input APK file.
--min-sdk-version <integer>
The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file.
--max-sdk-version <integer>
The highest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. By default, the tool uses the highest possible API level.
--v1-signing-enabled <true false>
Determines whether apksigner signs the given APK package using the traditional, JAR-based signing scheme. By default, the tool uses the values of --min-sdk-version and --max-sdk-version to decide when to apply this signature scheme.
--v2-signing-enabled <true false>
Determines whether apksigner signs the given APK package using the APK Signature Scheme v2. By default, the tool uses the values of --min-sdk-version and --max-sdk-version to decide when to apply this signature scheme.
-v, --verbose
Use the verbose output mode.

Per-signer options

The following options specify the configuration of a particular signer. These options aren't necessary if you sign your app using only one signer.

--next-signer <signer-options>
Used for specifying different general options for each signer.
--v1-signer-name <basename>
The base name for the files that comprise the JAR-based signature for the current signer. By default, apksigner uses the key alias of the KeyStore or the basename of the key file for this signer.

Key and certificate options

The following options specify the signer's private key and certificate:

--ks <filename>
The signer's private key and certificate chain reside in the given Java-based KeyStore file. If the filename is set to 'NONE', the KeyStore containing the key and certificate doesn't need a file specified, which is the case for some PKCS #11 KeyStores.
--ks-key-alias <alias>
The name of the alias that represents the signer's private key and certificate data within the KeyStore. If the KeyStore associated with the signer contains multiple keys, you must specify this option.
--ks-pass <input-format>

The password for the KeyStore that contains the signer's private key and certificate. You must provide a password to open a KeyStore. The apksigner tool supports the following formats:

  • pass:<password> – Password provided inline with the rest of the apksigner sign command.
  • env:<name> – Password is stored in the given environment variable.
  • file:<filename> – Password is stored as a single line in the given file.
  • stdin – Password is provided as a single line in the standard input stream. This is the default behavior for --ks-pass.

Note: If you include multiple passwords in the same file, specify them on separate lines. The apksigner tool associates passwords with an APK's signers based on the order in which you specify the signers. If you've provided two passwords for a signer, apksigner interprets the first password as the KeyStore password and the second one as the key password.

--pass-encoding <charset>
Includes the specified character encodings (such as, ibm437 or utf-8) when trying to handle passwords containing non-ASCII characters.

Keytool often encrypts keystores by converting the password using the console's default charset. By default, apksigner tries to decrypt using several forms of the password: the Unicode form, the form encoded using the JVM default charset, and, on Java 8 and older, the form encoded using the console's default charset. On Java 9, apksigner cannot detect the console's charset. So, you may need to specify --pass-encoding when a non-ASCII password is used. You may also need to specify this option with keystores that keytool created on a different OS or in a different locale.

--key-pass <input-format>

The password for the signer's private key, which is needed if the private key is password-protected. The apksigner tool supports the following formats:

  • pass:<password> – Password provided inline with the rest of the apksigner sign command.
  • env:<name> – Password is stored in the given environment variable.
  • file:<filename> – Password is stored as a single line in the given file.
  • stdin – Password is provided as a single line in the standard input stream. This is the default behavior for --key-pass.

Note: If you include multiple passwords in the same file, specify them on separate lines. The apksigner tool associates passwords with an APK's signers based on the order in which you specify the signers. If you've provided two passwords for a signer, apksigner interprets the first password as the KeyStore password and the second one as the key password.

--ks-type <algorithm>
The type or algorithm associated with the KeyStore that contains the signer's private key and certificate. By default, apksigner uses the type defined as the keystore.type constant in the Security properties file.
--ks-provider-name <name>
The name of the JCA Provider to use when requesting the signer's KeyStore implementation. By default, apksigner uses the highest-priority provider.
--ks-provider-class <class-name>
The fully-qualified class name of the JCA Provider to use when requesting the signer's KeyStore implementation. This option serves as an alternative for --ks-provider-name. By default, apksigner uses the provider specified with the --ks-provider-name option.
--ks-provider-arg <value>
A string value to pass in as the argument for the constructor of the JCA Provider class; the class itself is defined with the --ks-provider-class option. By default, apksigner uses the class's 0-argument constructor.
--key <filename>
The name of the file that contains the signer's private key. This file must use the PKCS #8 DER format. If the key is password-protected, apksigner prompts for the password using standard input unless you specify a different kind of input format using the --key-pass option.
--cert <filename>
The name of the file that contains the signer's certificate chain. This file must use the X.509 PEM or DER format.

Verify command

--print-certs
Show information about the APK's signing certificates.
--min-sdk-version <integer>
The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file.
--max-sdk-version <integer>
The highest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. By default, the tool uses the highest possible API level.
-v, --verbose
Use the verbose output mode.
-Werr
Treat warnings as errors.

Examples

Sign an APK

Sign an APK using release.jks, which is the only key in the KeyStore:

Sign an APK using a private key and certificate, stored as separate files:

Sign an APK using two keys:

Verify the signature of an APK

Check whether the APK's signatures are expected to be confirmed as valid on all Android platforms that the APK supports:

Check whether the APK's signatures are expected to be confirmed as valid on Android 4.0.3 (API level 15) and higher:

Rotate signing keys

Enable a signing certificate lineage that supports key rotation:

Rotate your signing keys again:

Free Android Apps Download Apk

Application signing allows developers to identify the author of the applicationand to update their application without creating complicated interfaces andpermissions. Every application that is run on the Android platform must besigned by the developer.Applications that attempt to install without being signedwill be rejected by either Google Play or the package installer on the Androiddevice.

On Google Play, application signing bridges the trust Google has with thedeveloper and the trust the developer has with their application. Developersknow their application is provided, unmodified, to the Android device; anddevelopers can be held accountable for behavior of their application.

On Android, application signing is the first step to placing an application inits Application Sandbox. The signed application certificate defines which userID is associated with which application; different applications run underdifferent user IDs. Application signing ensures that one application cannotaccess any other application except through well-defined IPC.

When an application (APK file) is installed onto an Android device, the PackageManager verifies that the APK has been properly signed with the certificateincluded in that APK. If the certificate (or, more accurately, the public key inthe certificate) matches the key used to sign any other APK on the device, thenew APK has the option to specify in the manifest that it will share a UID withthe other similarly-signed APKs.

Applications can be signed by a third-party (OEM, operator, alternative market)or self-signed. Android provides code signing using self-signed certificatesthat developers can generate without external assistance or permission.Applications do not have to be signed by a central authority. Android currentlydoes not perform CA verification for application certificates.

Download Apk Signer For Android

Applications are also able to declare security permissions at the Signatureprotection level, restricting access only to applications signed with the samekey while maintaining distinct UIDs and Application Sandboxes. A closerrelationship with a shared Application Sandbox is allowed via theshared UID feature where two or more applications signed with samedeveloper key can declare a shared UID in their manifest.

Apk Signer For Android

APK signing schemes

Android supports three application signing schemes:

  • v1 scheme: based on JAR signing
  • v2 scheme: APK Signature Scheme v2, which was introduced in Android 7.0.
  • v3 scheme: APK Signature Scheme v3, which was introduced in Android 9.

For maximum compatibility, sign applications with allschemes, first with v1, then v2, and then v3. Android 7.0+ and newer devicesinstall apps signed with v2+ schemes more quickly than those signed only withv1 scheme. Older Android platforms ignore v2+ signatures and thus need apps tocontain v1 signatures.

JAR signing (v1 scheme)

APK signing has been a part of Android from the beginning. It is based on signed JAR. For details on using this scheme, see the Android Studiodocumentation onSigning your app.

The only difference is that you get a bigger screen real estate.Bluestacks can also run without any internet connection. Download bluestacks for pc.

Download Apk Signer For Android Phone

v1 signatures do not protect some parts of the APK, such as ZIP metadata. TheAPK verifier needs to process lots of untrusted (not yet verified) datastructures and then discard data not covered by the signatures. This offers asizeable attack surface. Moreover, the APK verifier must uncompress allcompressed entries, consuming more time and memory. To address these issues,Android 7.0 introduced APK Signature Scheme v2.

APK Signature Scheme v2 & v3 (v2+ scheme)

Devices running Android 7.0 and later support APK signature scheme v2 (v2scheme) and later. (v2 scheme was updated to v3 in Android P to includeadditional information in the signing block, but otherwise works the same.) Thecontents of the APK are hashed and signed, then the resulting APK Signing Blockis inserted into the APK. For details on applying the v2+ scheme to an app, seeAPK Signature Scheme v2.

During validation, v2+ scheme treats the APK file as a blob and performs signaturechecking across the entire file. Any modification to the APK, including ZIP metadatamodifications, invalidates the APK signature. This form of APK verification issubstantially faster and enables detection of more classes of unauthorizedmodifications.

The new format is backwards compatible, so APKs signed with the new signatureformat can be installed on older Android devices (which simply ignore the extradata added to the APK), as long as these APKs are also v1-signed.

Figure 1. APK signature verificationprocess

Whole-file hash of the APK is verified against the v2+ signature stored in theAPK Signing Block. The hash covers everything except the APK Signing Block,which contains the v2+ signature. Any modification to the APK outside of the APKSigning Block invalidates the APK's v2+ signature. APKs with stripped v2+signature are rejected as well, because their v1 signature specifies that theAPK was v2-signed, which makes Android 7.0 and newer refuse to verify APKsusing their v1 signatures.

For details on the APK signature verification process, see the Verification section of APK Signature Scheme v2.