如何从已签署的apk中获得密钥库文件[英] How to get keystore file from signed apk

本文是小编为大家收集整理的关于如何从已签署的apk中获得密钥库文件的处理/解决方法,可以参考本文帮助大家快速定位并解决问题,中文翻译不准确的可切换到English标签页查看源文。

问题描述

我已经与默认的debug.keystore键签署了我的APK.但是不幸的是,我的系统被破坏了,现在我需要从已经签名的APK中获取密钥存储.

用新APK替换旧APK.

我有md5,带有指纹.

任何建议都将不胜感激.谢谢您.

推荐答案

unzip -p Name-of-apk.apk META-INF/CERT.RSA | keytool -printcert

是我使用的.

它产生的信息,例如所有者,发行人,序列号,有效通过,证书手指打印,签名算法和版本.

其他推荐答案

首先,解压缩APK并提取文件/meta-inf/android_.rsa(此文件也可以是cert.rsa,但只有一个.rsa文件).

.

然后发出此命令:

keytool -printcert -file ANDROID_.RSA

您将获得这样的证书指纹:

 MD5:  B3:4F:BE:07:AA:78:24:DC:CA:92:36:FF:AE:8C:17:DB
 SHA1: 16:59:E7:E3:0C:AA:7A:0D:F2:0D:05:20:12:A8:85:0B:32:C5:4F:68
 Signature algorithm name: SHA1withRSA

然后再次使用键盘打印签名密钥库的所有别名:

keytool -list -keystore my-signing-key.keystore

您将获得一个别名及其证书指纹列表:

android_key,2010年1月23日,私人按键, 证书指纹(MD5):B3:4F:BE:07:AA:78:24:DC:CA:92:36:FF:AE:AE:8C:17:DB 瞧!现在,我们可以确定APK已与此密钥库签名,并且使用别名为" Android_key".

keytool是Java的一部分,因此请确保您的路径中有Java安装DIR.

本文地址:https://www.itbaoku.cn/post/1937931.html

问题描述

I have already signed my apk with default debug.keystore key.But unfortunately my system destroyed,Now I need to get the key store from the already signed apk.

to replace with old apk with new apk.

I have MD5,SHA fingerprints with.But i could make them as keystore to sign the apk.

Any suggestions would be appreciated.Thank you in advance.

推荐答案

unzip -p Name-of-apk.apk META-INF/CERT.RSA | keytool -printcert

is what I used.

It produces information such as the owner, issuer, serial number, valid through, certificate finger prints, signature algorithms and version.

其他推荐答案

First, unzip the APK and extract the file /META-INF/ANDROID_.RSA (this file may also be CERT.RSA, but there should only be one .RSA file).

Then issue this command:

keytool -printcert -file ANDROID_.RSA

You will get certificate fingerprints like this:

 MD5:  B3:4F:BE:07:AA:78:24:DC:CA:92:36:FF:AE:8C:17:DB
 SHA1: 16:59:E7:E3:0C:AA:7A:0D:F2:0D:05:20:12:A8:85:0B:32:C5:4F:68
 Signature algorithm name: SHA1withRSA

Then use the keytool again to print out all the aliases of your signing keystore:

keytool -list -keystore my-signing-key.keystore

You will get a list of aliases and their certificate fingerprint:

android_key, Jan 23, 2010, PrivateKeyEntry, Certificate fingerprint (MD5): B3:4F:BE:07:AA:78:24:DC:CA:92:36:FF:AE:8C:17:DB Voila! we can now determined the apk has been signed with this keystore, and with the alias 'android_key'.

Keytool is part of Java, so make sure your PATH has Java installation dir in it.