Troubleshooting re-packaging
  • 22 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Troubleshooting re-packaging

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

In case the protected application exits with exit reason 01 after shielding, it is an indication that App Shielding does not find the correct application signer certificate in the app.

This should never happen if the Shielding Tool performs the signing and the <applicationSignerCertificate v="auto" /> option is used.

However, if the application is signed by another tool, then App Shielding must be explicitly configured with the correct signing certificate in the config.xml file, as described in applicationSignerCertificate.

Google Play App signing

If you have enabled the Google Play App signing option when uploading an app to Google Play, you must add app-specific key from Google using the applicationSignerCertificate option, found on the Google Play Developer pages. See Troubleshooting re-packaging.

Google Play and repackaging checks

When the application is launched, App Shielding performs a repackaging check on the app. If there are any injected files, the application will terminate unexpectedly with  RepackagingException.

In some cases, it is observed that Google Play will inject files to your application. To skip these files, you can use the skipVerifyPath option to exclude these files from integrity checking. See also List of operation options.

By default, the Shielding Tool skips these injected:

skipVerifyPath "res/xml/locales_config.xml";
skipVerifyPath "res/xml/splits0.xml";
skipVerifyPath "stamp-cert-sha256";
skipVerifyPath "stamp-cert-sha1";

Amazon App Store Signing

Amazon App Store will resign your application, which is not optional from them. You must add your specific key for your application in Amazon App Store using the applicationSignerCertificate option.

Amazon App Store and Repackaging Checks

Amazon App Store will modify your application’s files. For all applications, Amazon App Store will also inject some code and files into the application, which for most applications also shuffles the classes in the apps' classesX.dex files. Since this modification would trigger the default repackaging checks of App Shielding, the file integrity checking must be tuned for apps published on Amazon App Store.

Due to the changes, the file integrity checking for Amazon App Store must be tuned for Amazon App Store.

The Shielding Tool has a built-in rules file, builtin:amazon-app-store-support.cfg, for the Amazon App Store. To use the file, you must use the following in your rules file:

include "builtin:amazon-app-store-support.cfg";

These rules will skip the classesX.dex files and the files that are known to be injected by Amazon App Store. The content of builtin:amazon-app-store-support.cfg:

# Amazon App Store modifies classes.dex, all the classesX.dex files must be skipped
skipVerifyPath "classes*.dex";

# Amazon App Store injects these files
skipVerifyPath "com.amazon.*";
skipVerifyPath "kiwi";


Cet article vous a-t-il été utile ?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle