I'm also interested in the possibility of accessing at least CERT.RSA
or CERT.SF from META_INF to compare digests from that file with my own
ones.
Or may be there is another way to detect repacking of your APK and
signing it with non-original certificate.

Any ideas?

On Oct 5, 9:16 am, "petr.maza...@mautilus.com"
<petr.maza...@mautilus.com> wrote:
> How the .apk installation process works on device? Is the .apk file
> just copied to some place and kind of installer application extracts
> the application information, register somehow the application to
> environment, extract also the icon and put it on the application
> launch screen? Or the .apk content is extracted and files are copied
> to various folders and the .apk file itself is deleted?
>
> I am asking to understand if there is any possibility on device to
> browse the .apk file structure and its content and access in read-only
> mode directly the assets, res folders, AndroidManifest.xml, the dex
> file and also used libraries (.jar or .so)?
>
> The reason I am asking is that I am looking for possibility to read
> into memory .dex, .jar or .so files like arbitrary binary files (e.g.
> by using the `File` class) for the purpose of computing a message
> digest from its content (i.e. using md5 or other hash method)...
>
> BR
> STeN

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to