I'm also interested in the possibility of accessing at least CERT.RSA or CERT.SF from META_INF to compare digests from that file with my own ones. Or may be there is another way to detect repacking of your APK and signing it with non-original certificate.
Any ideas? On Oct 5, 9:16 am, "petr.maza...@mautilus.com" <petr.maza...@mautilus.com> wrote: > How the .apk installation process works on device? Is the .apk file > just copied to some place and kind of installer application extracts > the application information, register somehow the application to > environment, extract also the icon and put it on the application > launch screen? Or the .apk content is extracted and files are copied > to various folders and the .apk file itself is deleted? > > I am asking to understand if there is any possibility on device to > browse the .apk file structure and its content and access in read-only > mode directly the assets, res folders, AndroidManifest.xml, the dex > file and also used libraries (.jar or .so)? > > The reason I am asking is that I am looking for possibility to read > into memory .dex, .jar or .so files like arbitrary binary files (e.g. > by using the `File` class) for the purpose of computing a message > digest from its content (i.e. using md5 or other hash method)... > > BR > STeN -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to android-developers@googlegroups.com To unsubscribe from this group, send email to android-developers+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/android-developers?hl=en