java - Android Keystore: how to determine which encryption was use to create it? -


here's scenario: created , released android app year ago. using java 5 create keystore , alias. when try sign app instructions found here: http://developer.android.com/tools/publishing/app-signing.html this:

keytool error: java.io.ioexception: keystore tampered with, or password incorrect

i'm positive keystore isn't busted because it's binary file untouched 1 committed private git repo when releasing original app. password unchanged , has been maintained via passpack.

what has changed: os , java version. running os x 10.5 , java 5.0 , using os x 10.6.8 , java 6.

i think i've whittled down mismatch in encryption. know default encryption setup have been?

also, built keystore eclipse adt 20.x eclipse ganymede/helios. can't find default information regarding either.

although app signing instructions tell use rsa keysize of 2048, original defaults java 5 aren't identical.

here's combination unlocked keystore created java 5.0:

keytool -list -v -keystore sumall_android_keystore -keyalg dsa -keysize 1024 -sigalg sha1withdsa

java 5.0's keytool uses dsa 1024 create keys default.
java 6 , 7 have both changed default encryption.

see: supported algorithms , key sizes in http://docs.oracle.com/javase/1.5.0/docs/tooldocs/solaris/keytool.html


Comments

Popular posts from this blog

html - How to style widget with post count different than without post count -

How to remove text and logo OR add Overflow on Android ActionBar using AppCompat on API 8? -

javascript - storing input from prompt in array and displaying the array -