1 page.title=Signing Your Applications 2 @jd:body 3 4 <div id="qv-wrapper"> 5 <div id="qv"> 6 7 <h2>Signing quickview</h2> 8 9 <ul> 10 <li>All Android apps <em>must</em> be signed</a></li> 11 <li>You can sign with a self-signed key</li> 12 <li>How you sign your apps is critical — read this document carefully</li> 13 <li>Determine your signing strategy early in the development process</li> 14 </ul> 15 16 <h2>In this document</h2> 17 18 <ol> 19 <li><a href="#overview">Overview</a></li> 20 <li><a href="#strategies">Signing Strategies</a></li> 21 <li><a href="#setup">Basic Setup for Signing</a></li> 22 <li><a href="#debugmode">Signing in Debug Mode</a></li> 23 <li><a href="#releasemode">Signing for Public Release</a> 24 <ol> 25 <li><a href="#cert">Obtain a suitable private key</a></li> 26 <li><a href="#releasecompile">Compile the application in release mode</a></li> 27 <li><a href="#signapp">Sign your application with your private key</a></li> 28 <li><a href="#align">Align the final APK package</a></li> 29 <li><a href="#ExportWizard">Compile and sign with Eclipse ADT</a></li> 30 </ol> 31 </li> 32 <li><a href="#secure-key">Securing Your Private Key</a></li> 33 34 </ol> 35 36 <h2>See also</h2> 37 38 <ol> 39 <li><a href="{@docRoot}guide/publishing/versioning.html">Versioning Your Applications</a></li> 40 <li><a href="{@docRoot}guide/publishing/preparing.html">Preparing to Publish</a></li> 41 </ol> 42 43 </div> 44 </div> 45 46 <p>This document provides information about signing your Android applications prior to publishing them for mobile device users.</p> 47 48 <h2 id="overview">Overview</h2> 49 50 <p>The Android system requires that all installed applications be digitally 51 signed with a certificate whose private key is held by the application's 52 developer. The Android system uses the certificate as a means of identifying the author of 53 an application and establishing trust relationships between applications. The certificate is not 54 used to control which applications the user can install. The certificate 55 does not need to be signed by a certificate authority: it is perfectly 56 allowable, and typical, for Android applications to use self-signed 57 certificates.</p> 58 59 <p>The important points to understand about signing Android applications are:</p> 60 61 <ul> 62 <li>All applications <em>must</em> be signed. The system will not install an application 63 that is not signed.</li> 64 <li>You can use self-signed certificates to sign your applications. No certificate authority 65 is needed.</li> 66 <li>When you are ready to release your application for end-users, you must sign it with a suitable private 67 key. You can not publish an application that is signed with the debug key generated 68 by the SDK tools. 69 </li> 70 <li>The system tests a signer certificate's expiration date only at install time. If an 71 application's signer certificate expires after the application is installed, the application 72 will continue to function normally.</li> 73 <li>You can use standard tools — Keytool and Jarsigner — to generate keys and 74 sign your application .apk files.</li> 75 <li>Once you have signed the application, use the <code>zipalign</code> tool to optimize the final APK package.</li> 76 </ul> 77 78 <p>The Android system will not install or run an application that is not signed appropriately. This 79 applies wherever the Android system is run, whether on an actual device or on the emulator. 80 For this reason, you must set up signing for your application before you will be able to 81 run or debug it on an emulator or device.</p> 82 83 <p>The Android SDK tools assist you in signing your applications when debugging. Both the ADT Plugin 84 for Eclipse and the Ant build tool offer two signing modes — <em>debug mode</em> 85 and <em>release mode</em>. 86 87 <ul> 88 <li>While developing and testing, you can compile in debug mode. 89 In debug mode, the build tools use the Keytool utility, included in the JDK, to create 90 a keystore and key with a known alias and password. At each compilation, the tools then use 91 the debug key to sign the application .apk file. Because the password is known, the tools 92 don't need to prompt you for the keystore/key password each time you compile.</li> 93 94 <li>When your application is ready for release, you must compile in release mode 95 and then sign the .apk <span style="color:red">with your private key</span>. 96 There are two ways to do this: 97 <ul> 98 <li>Using Keytool and Jarsigner in the command-line. In this approach, 99 you first compile your application to an <em>unsigned</em> .apk. You must then sign 100 the .apk manually with your private key 101 using Jarsigner (or similar tool). If you do not have a suitable private key already, 102 you can run Keytool manually to generate your own keystore/key and then sign your 103 application with Jarsigner.</li> 104 <li>Using the ADT Export Wizard. If you are developing in Eclipse with the ADT plugin, 105 you can use the Export Wizard to compile the application, generate a private key 106 (if necessary), and sign the .apk, all in a single process using the Export Wizard. 107 </li> 108 </ul> 109 </li> 110 </ul> 111 112 <p>Once your application is signed, don't forget to run {@code zipalign} on the APK 113 for additional optimization.</p> 114 115 <h2 id="strategies">Signing Strategies</h2> 116 117 <p>Some aspects of application signing may affect how you approach the development 118 of your application, especially if you are planning to release multiple 119 applications. </p> 120 121 <p>In general, the recommended strategy for all developers is to sign 122 all of your applications with the same certificate, throughout the expected 123 lifespan of your applications. There are several reasons why you should do so: </p> 124 125 <ul> 126 <li>Application upgrade – As you release upgrades to your 127 application, you will want to sign the upgrades with the same certificate, if you 128 want users to upgrade seamlessly to the new version. When the system is 129 installing an update to an application, if any of the certificates in the 130 new version match any of the certificates in the old version, then the 131 system allows the update. If you sign the version without using a matching 132 certificate, you will also need to assign a different package name to the 133 application — in this case, the user installs the new version as a 134 completely new application. </li> 135 136 <li>Application modularity – The Android system allows applications that 137 are signed by the same certificate to run in the same process, if the 138 applications so requests, so that the system treats them as a single application. 139 In this way you can deploy your application in modules, and users can update 140 each of the modules independently if needed.</li> 141 142 <li>Code/data sharing through permissions – The Android system provides 143 signature-based permissions enforcement, so that an application can expose 144 functionality to another application that is signed with a specified 145 certificate. By signing multiple applications with the same certificate and 146 using signature-based permissions checks, your applications can share code and 147 data in a secure manner. </li> 148 149 </ul> 150 151 <p>Another important consideration in determining your signing strategy is 152 how to set the validity period of the key that you will use to sign your 153 applications.</p> 154 155 <ul> 156 <li>If you plan to support upgrades for a single application, you should ensure 157 that your key has a validity period that exceeds the expected lifespan of 158 that application. A validity period of 25 years or more is recommended. 159 When your key's validity period expires, users will no longer be 160 able to seamlessly upgrade to new versions of your application.</li> 161 162 <li>If you will sign multiple distinct applications with the same key, 163 you should ensure that your key's validity period exceeds the expected 164 lifespan of <em>all versions of all of the applications</em>, including 165 dependent applications that may be added to the suite in the future. </li> 166 167 <li>If you plan to publish your application(s) on Android Market, the 168 key you use to sign the application(s) must have a validity period 169 ending after 22 October 2033. The Market server enforces this requirement 170 to ensure that users can seamlessly upgrade Market applications when 171 new versions are available. </li> 172 </ul> 173 174 <p>As you design your application, keep these points in mind and make sure to 175 use a <a href="#cert">suitable certificate</a> to sign your applications. </p> 176 177 <h2 id="setup">Basic Setup for Signing</h2> 178 179 <p>Before you begin, you should make sure that 180 Keytool is available to the SDK build 181 tools. In most cases, you can tell the SDK build tools how to find Keytool by setting 182 your <code>JAVA_HOME</code> environment variable to references a suitable JDK. 183 Alternatively, you can add the JDK version of Keytool to your <code>PATH</code> variable.</p> 184 185 <p>If you are developing on a version of Linux that originally came with GNU Compiler for 186 Java, make sure that the system is using the JDK version of Keytool, rather than the gcj 187 version. If Keytool is already in your <code>PATH</code>, it might be pointing to a symlink at 188 <code>/usr/bin/keytool</code>. In this case, check the symlink target to be sure it points 189 to the Keytool in the JDK.</p> 190 191 <p>If you will release your application to the public, you will also need to have 192 the Jarsigner tool available on your machine. Both Jarsigner and Keytool are included 193 in the JDK. </p> 194 195 <h2 id="debugmode">Signing in Debug Mode</h2> 196 197 <p>The Android build tools provide a debug signing mode that makes it easier for you 198 to develop and debug your application, while still meeting the Android system 199 requirement for signing your .apk. 200 When using debug mode to build your app, the SDK tools invoke Keytool to automatically create 201 a debug keystore and key. This debug key is then used to automatically sign the .apk, so 202 you do not need to sign the package with your own key.</p> 203 204 <p>The SDK tools create the debug keystore/key with predetermined names/passwords:</p> 205 <ul> 206 <li>Keystore name: "debug.keystore"</li> 207 <li>Keystore password: "android"</li> 208 <li>Key alias: "androiddebugkey"</li> 209 <li>Key password: "android"</li> 210 <li>CN: "CN=Android Debug,O=Android,C=US"</li> 211 </ul></p> 212 213 <p>If necessary, you can change the location/name of the debug keystore/key or 214 supply a custom debug keystore/key to use. However, any custom debug 215 keystore/key must use the same keystore/key names and passwords as the default 216 debug key (as described above). (To do so in Eclipse/ADT, go to 217 <strong>Windows</strong> > <strong>Preferences</strong> > 218 <strong>Android</strong> > <strong>Build</strong>.) </p> 219 220 <p class="caution"><strong>Caution:</strong> You <em>cannot</em> release your application 221 to the public when signed with the debug certificate.</p> 222 223 <h3>Eclipse Users</h3> 224 225 <p>If you are developing in Eclipse/ADT (and have set up Keytool as described above in 226 <a href="#setup">Basic Setup for Signing</a>), 227 signing in debug mode is enabled by default. When you run or debug your 228 application, ADT signs the .apk with the debug certificate, runs {@code zipalign} on the 229 package, then installs it on 230 the selected emulator or connected device. No specific action on your part is needed, 231 provided ADT has access to Keytool.</p> 232 233 <h3>Ant Users</h3> 234 235 <p>If you are using Ant to build your .apk files, debug signing mode 236 is enabled by using the <code>debug</code> option with the <code>ant</code> command 237 (assuming that you are using a <code>build.xml</code> file generated by the 238 <code>android</code> tool). When you run <code>ant debug</code> to 239 compile your app, the build script generates a keystore/key and signs the .apk for you. 240 The script then also aligns the .apk with the <code>zipalign</code> tool. 241 No other action on your part is needed. Read 242 <a href="{@docRoot}guide/developing/other-ide.html#DebugMode">Developing In Other IDEs: Building 243 in debug mode</a> for more information.</p> 244 245 246 <h3 id="debugexpiry">Expiry of the Debug Certificate</h3> 247 248 <p>The self-signed certificate used to sign your application in debug mode (the default on 249 Eclipse/ADT and Ant builds) will have an expiration date of 365 days from its creation date.</p> 250 251 <p>When the certificate expires, you will get a build error. On Ant builds, the error 252 looks like this:</p> 253 254 <pre>debug: 255 [echo] Packaging bin/samples-debug.apk, and signing it with a debug key... 256 [exec] Debug Certificate expired on 8/4/08 3:43 PM</pre> 257 258 <p>In Eclipse/ADT, you will see a similar error in the Android console.</p> 259 260 <p>To fix this problem, simply delete the <code>debug.keystore</code> file. 261 The default storage location for AVDs is in <code>~/.android/avd</code> on OS X and Linux, 262 in <code>C:\Documents and Settings\<user>\.android\</code> on Windows XP, and in 263 <code>C:\Users\<user>\.android\</code> on Windows Vista.</p> 264 265 266 <p>The next time you build, the build tools will regenerate a new keystore and debug key.</p> 267 268 <p>Note that, if your development machine is using a non-Gregorian locale, the build 269 tools may erroneously generate an already-expired debug certificate, so that you get an 270 error when trying to compile your application. For workaround information, see the 271 troubleshooting topic <a href="{@docRoot}resources/faq/troubleshooting.html#signingcalendar"> 272 I can't compile my app because the build tools generated an expired debug 273 certificate</a>. </p> 274 275 276 <h2 id="releasemode">Signing for Public Release</h2> 277 278 <p>When your application is ready for release to other users, you must:</p> 279 <ol> 280 <li><a href="#cert">Obtain a suitable private key</a></li> 281 <li><a href="#releasecompile">Compile the application in release mode</li> 282 <li><a href="#signapp">Sign your application with your private key</a></li> 283 <li><a href="#align">Align the final APK package</a></li> 284 </ol> 285 286 <p>If you are developing in Eclipse with the ADT plugin, you can use the Export Wizard 287 to perform the compile, sign, and align procedures. The Export Wizard even allows you to 288 generate a new keystore and private key in the process. So if you use Eclipse, you can 289 skip to <a href="#ExportWizard">Compile and sign with Eclipse ADT</a>.</p> 290 291 292 293 <h3 id="cert">1. Obtain a suitable private key</h3> 294 295 <p>In preparation for signing your application, you must first ensure that 296 you have a suitable private key with which to sign. A suitable private 297 key is one that:</p> 298 299 <ul> 300 <li>Is in your possession</li> 301 <li>Represents the personal, corporate, or organizational entity to be identified 302 with the application</li> 303 <li>Has a validity period that exceeds the expected lifespan of the application 304 or application suite. A validity period of more than 25 years is recommended. 305 <p>If you plan to publish your application(s) on Android Market, note that a 306 validity period ending after 22 October 2033 is a requirement. You can not upload an 307 application if it is signed with a key whose validity expires before that date. 308 </p></li> 309 <li>Is not the debug key generated by the Android SDK tools. </li> 310 </ul> 311 312 <p>The key may be self-signed. If you do not have a suitable key, you must 313 generate one using Keytool. Make sure that you have Keytool available, as described 314 in <a href="#setup">Basic Setup</a>.</p> 315 316 <p>To generate a self-signed key with Keytool, use the <code>keytool</code> 317 command and pass any of the options listed below (and any others, as 318 needed). </p> 319 320 <p class="warning"><strong>Warning:</strong> Keep your private key secure. 321 Before you run Keytool, make sure to read 322 <a href="#secure-key">Securing Your Private Key</a> for a discussion of how to keep 323 your key secure and why doing so is critically important to you and to users. In 324 particular, when you are generating your key, you should select strong passwords 325 for both the keystore and key.</p> 326 327 <table> 328 <tr> 329 <th>Keytool Option</th> 330 <th>Description</th> 331 </tr> 332 <tr> 333 <td><code>-genkey</code></td><td>Generate a key pair (public and private 334 keys)</td> 335 </tr> 336 <tr> 337 <td><code>-v</code></td><td>Enable verbose output.</td> 338 </tr> 339 <tr> 340 <td><code>-alias <alias_name></code></td><td>An alias for the key. Only 341 the first 8 characters of the alias are used.</td> 342 </tr> 343 <tr> 344 <td><code>-keyalg <alg></code></td><td>The encryption algorithm to use 345 when generating the key. Both DSA and RSA are supported.</td> 346 </tr> 347 <tr> 348 <td><code>-keysize <size></code></td><td>The size of each generated key 349 (bits). If not supplied, Keytool uses a default key size of 1024 bits. In 350 general, we recommend using a key size of 2048 bits or higher. </td> 351 </tr> 352 <tr> 353 <td><code>-dname <name></code></td><td><p>A Distinguished Name that describes 354 who created the key. The value is used as the issuer and subject fields in the 355 self-signed certificate. </p><p>Note that you do not need to specify this option 356 in the command line. If not supplied, Jarsigner prompts you to enter each 357 of the Distinguished Name fields (CN, OU, and so on).</p></td> 358 </tr> 359 <tr> 360 <td><code>-keypass <password></code></td><td><p>The password for the 361 key.</p> <p>As a security precaution, do not include this option in your command 362 line. If not supplied, Keytool prompts you to enter the password. In this way, 363 your password is not stored in your shell history.</p></td> 364 </tr> 365 <tr> 366 <td><code>-validity <valdays></code></td><td><p>The validity period for the 367 key, in days. </p><p><strong>Note:</strong> A value of 10000 or greater is recommended.</p></td> 368 </tr> 369 <tr> 370 <td><code>-keystore <keystore-name>.keystore</code></td><td>A name 371 for the keystore containing the private key.</td> 372 </tr> 373 <tr> 374 <td><code>-storepass <password></code></td><td><p>A password for the 375 keystore.</p><p>As a security precaution, do not include this option in your 376 command line. If not supplied, Keytool prompts you to enter the password. In 377 this way, your password is not stored in your shell history.</p></td> 378 </tr> 379 </table> 380 381 <p>Here's an example of a Keytool command that generates a private key:</p> 382 383 <pre>$ keytool -genkey -v -keystore my-release-key.keystore 384 -alias alias_name -keyalg RSA -keysize 2048 -validity 10000</pre> 385 386 <p>Running the example command above, Keytool prompts you to provide 387 passwords for the keystore and key, and to provide the Distinguished 388 Name fields for your key. It then generates the keystore as a file called 389 <code>my-release-key.keystore</code>. The keystore and key are 390 protected by the passwords you entered. The keystore contains 391 a single key, valid for 10000 days. The alias is a name that you — 392 will use later, to refer to this keystore when signing your application. </p> 393 394 <p>For more information about Keytool, see the documentation at 395 <a 396 href="http://java.sun.com/j2se/1.5.0/docs/tooldocs/#security"> 397 http://java.sun.com/j2se/1.5.0/docs/tooldocs/#security</a></p> 398 399 400 401 <h3 id="releasecompile">2. Compile the application in release mode</h3> 402 403 <p>In order to release your application to users, you must compile it in release mode. 404 In release mode, the compiled application is not signed by default and you will need 405 to sign it with your private key.</p> 406 407 <p class="caution"><strong>Caution:</strong> 408 You can not release your application unsigned, or signed with the debug key.</p> 409 410 <h4>With Eclipse</h4> 411 412 <p>To export an <em>unsigned</em> .apk from Eclipse, right-click the project in the Package 413 Explorer and select <strong>Android Tools</strong> > <strong>Export Unsigned Application 414 Package</strong>. Then specify the file location for the unsigned .apk. 415 (Alternatively, open your <code>AndroidManifest.xml</code> file in Eclipse, open 416 the <em>Overview</em> tab, and click <strong>Export an unsigned .apk</strong>.)</p> 417 418 <p>Note that you can combine the compiling and signing steps with the Export Wizard. See 419 <a href="#ExportWizard">Compiling and signing with Eclipse ADT</a>.</p> 420 421 <h4>With Ant</h4> 422 423 <p>If you are using Ant, you can enable release mode by using the <code>release</code> option 424 with the <code>ant</code> command. For example, if you are running Ant from the 425 directory containing your {@code build.xml} file, the command would look like this:</p> 426 427 <pre>ant release</pre> 428 429 <p>By default, the build script compiles the application .apk without signing it. The output file 430 in your project {@code bin/} will be <code><em><your_project_name></em>-unsigned.apk</code>. 431 Because the application .apk is still unsigned, you must manually sign it with your private 432 key and then align it using {@code zipalign}.</p> 433 434 <p>However, the Ant build script can also perform the signing 435 and aligning for you, if you have provided the path to your keystore and the name of 436 your key alias in the project's {@code build.properties} file. With this information provided, 437 the build script will prompt you for your keystore and alias password when you perform 438 <code>ant release</code>, it will sign the package and then align it. The final output 439 file in {@code bin/} will instead be 440 <code><em><your_project_name></em>-release.apk</code>. With these steps 441 automated for you, you're able to skip the manual procedures below (steps 3 and 4). 442 To learn how to specify your keystore and alias in the {@code build.properties} file, 443 see <a href="{@docRoot}guide/developing/other-ide.html#ReleaseMode">Developing In Other 444 IDEs: Building in release mode</a>.</p> 445 446 447 448 <h3 id="signapp">3. Sign your application with your private key</h3> 449 450 <p>When you have an application package that is ready to be signed, you can do sign it 451 using the Jarsigner tool. Make sure that you have Jarsigner available on your 452 machine, as described in <a href="#setup">Basic Setup</a>. Also, make sure that 453 the keystore containing your private key is available.</p> 454 455 <p>To sign your application, you run Jarsigner, referencing both the 456 application's .apk and the keystore containing the private key with which to 457 sign the .apk. The table below shows the options you could use. <p> 458 459 <table> 460 <tr> 461 <th>Jarsigner Option</th> 462 <th>Description</th> 463 </tr> 464 <tr> 465 <td><code>-keystore <keystore-name>.keystore</code></td><td>The name of 466 the keystore containing your private key.</td> 467 </tr> 468 <tr> 469 <td><code>-verbose</code></td><td>Enable verbose output.</td> 470 </tr> 471 <tr> 472 <td><code>-storepass <password></code></td><td><p>The password for the 473 keystore. </p><p>As a security precaution, do not include this option 474 in your command line unless you are working at a secure computer. 475 If not supplied, Jarsigner prompts you to enter the password. In this 476 way, your password is not stored in your shell history.</p></td> 477 </tr> 478 <tr> 479 <td><code>-keypass <password></code></td><td><p>The password for the private 480 key. </p><p>As a security precaution, do not include this option 481 in your command line unless you are working at a secure computer. 482 If not supplied, Jarsigner prompts you to enter the password. In this 483 way, your password is not stored in your shell history.</p></td> 484 </tr> 485 </table> 486 487 <p>Here's how you would use Jarsigner to sign an application package called 488 <code>my_application.apk</code>, using the example keystore created above. 489 </p> 490 491 <pre>$ jarsigner -verbose -keystore my-release-key.keystore 492 my_application.apk alias_name</pre> 493 494 <p>Running the example command above, Jarsigner prompts you to provide 495 passwords for the keystore and key. It then modifies the .apk 496 in-place, meaning the .apk is now signed. Note that you can sign an 497 .apk multiple times with different keys.</p> 498 499 <p>To verify that your .apk is signed, you can use a command like this:</p> 500 501 <pre>$ jarsigner -verify my_signed.apk</pre> 502 503 <p>If the .apk is signed properly, Jarsigner prints "jar verified". 504 If you want more details, you can try one of these commands:</p> 505 506 <pre>$ jarsigner -verify -verbose my_application.apk</pre> 507 508 <p>or</p> 509 510 <pre>$ jarsigner -verify -verbose -certs my_application.apk</pre> 511 512 <p>The command above, with the <code>-certs</code> option added, will show you the 513 "CN=" line that describes who created the key.</p> 514 515 <p class="note"><strong>Note:</strong> If you see "CN=Android Debug", this means the .apk was 516 signed with the debug key generated by the Android SDK. If you intend to release 517 your application, you must sign it with your private key instead of the debug 518 key.</p> 519 520 <p>For more information about Jarsigner, see the documentation at 521 <a href="http://java.sun.com/j2se/1.5.0/docs/tooldocs/#security"> 522 http://java.sun.com/j2se/1.5.0/docs/tooldocs/#security</a></p> 523 524 525 <h3 id="align">4. Align the final APK package</h3> 526 527 <p>Once you have signed the .apk with your private key, run <code>zipalign</code> on the file. 528 This tool ensures that all uncompressed data starts with a particular byte alignment, 529 relative to the start of the file. Ensuring alignment at 4-byte boundaries provides 530 a performance optimization when installed on a device. When aligned, the Android 531 system is able to read files with {@code mmap()}, even if 532 they contain binary data with alignment restrictions, rather than copying all 533 of the data from the package. The benefit is a reduction in the amount of 534 RAM consumed by the running application.</p> 535 536 <p>The <code>zipalign</code> tool is provided with the Android SDK, inside the 537 <code>tools/</code> directory. To align your signed .apk, execute:</p> 538 539 <pre>zipalign -v 4 <em>your_project_name</em>-unaligned.apk <em>your_project_name</em>.apk</pre> 540 541 <p>The {@code -v} flag turns on verbose output (optional). {@code 4} is the 542 byte-alignment (don't use anything other than 4). The first file argument is 543 your signed .apk (the input) and the second file is the destination .apk file (the output). 544 If you're overriding an existing .apk, add the {@code -f} flag.</p> 545 546 <p class="caution"><strong>Caution:</strong> Your input .apk must be signed with your 547 private key <strong>before</strong> you optimize the package with {@code zipalign}. 548 If you sign it after using {@code zipalign}, it will undo the alignment.</p> 549 550 <p>For more information, read about the 551 <a href="{@docRoot}guide/developing/tools/zipalign.html">zipalign</a> tool. 552 553 554 <h3 id="ExportWizard">Compile and sign with Eclipse ADT</h3> 555 556 <p>If you are using Eclipse with the ADT plugin, you can use the Export Wizard to 557 export a <em>signed</em> .apk (and even create a new keystore, 558 if necessary). The Export Wizard performs all the interaction with 559 the Keytool and Jarsigner for you, which allows you to sign the package using a GUI 560 instead of performing the manual procedures to compile, sign, 561 and align, as discussed above. Once the wizard has compiled and signed your package, 562 it will also perfom package alignment with {@code zipalign}. 563 Because the Export Wizard uses both Keytool and Jarsigner, you should 564 ensure that they are accessible on your computer, as described above 565 in the <a href=#setup">Basic Setup for Signing</a>.</p> 566 567 <p>To create a signed and aligned .apk in Eclipse:</p> 568 569 <ol> 570 <li>Select the project in the Package 571 Explorer and select <strong>File > Export</strong>.</li> 572 <li>Open the Android folder, select Export Android Application, 573 and click <strong>Next</strong>. 574 <p>The Export Android Application wizard now starts, which will 575 guide you through the process of signing your application, 576 including steps for selecting the private key with which to sign the .apk 577 (or creating a new keystore and private key).</p> 578 <li>Complete the Export Wizard and your application will be compiled, 579 signed, aligned, and ready for distribution.</li> 580 </ol> 581 582 583 584 <h2 id="secure-key">Securing Your Private Key</h2> 585 586 <p>Maintaining the security of your private key is of critical importance, both 587 to you and to the user. If you allow someone to use your key, or if you leave 588 your keystore and passwords in an unsecured location such that a third-party 589 could find and use them, your authoring identity and the trust of the user 590 are compromised. </p> 591 592 <p>If a third party should manage to take your key without your knowledge or 593 permission, that person could sign and distribute applications that maliciously 594 replace your authentic applications or corrupt them. Such a person could also 595 sign and distribute applications under your identity that attack other 596 applications or the system itself, or corrupt or steal user data. </p> 597 598 <p>Your reputation as a developer entity depends on your securing your private 599 key properly, at all times, until the key is expired. Here are some tips for 600 keeping your key secure: </p> 601 602 <ul> 603 <li>Select strong passwords for the keystore and key.</li> 604 <li>When you generate your key with Keytool, <em>do not</em> supply the 605 <code>-storepass</code> and <code>-keypass</code> options at the command line. 606 If you do so, your passwords will be available in your shell history, 607 which any user on your computer could access.</li> 608 <li>Similarly, when signing your applications with Jarsigner, 609 <em>do not</em> supply the <code>-storepass</code> and <code>-keypass</code> 610 options at the command line. </li> 611 <li>Do not give or lend anyone your private key, and do not let unauthorized 612 persons know your keystore and key passwords.</li> 613 </ul> 614 615 <p>In general, if you follow common-sense precautions when generating, using, 616 and storing your key, it will remain secure. </p>