Security Overview

Security Overview

Code Signing Overview:

To create a digital signature, the signing software computes a special type of checksum called a hash (or digest) based on a piece of data or code and encrypts that hash with the signer’s private key. This encrypted hash is called a signature.

hash(根据数据或者代码计算出一种具体类型的效验和)

用签名者的私钥将 hash  加密

To verify that signature, the verifying software computes a hash of the data or code. It then uses the signer’s public key to decrypt the signature, thus obtaining the original hash as computed by the signer. If the two hashes match, the data has not been modified since it was signed by someone in possession of the signer’s private key.

效验签名的目的就是确保用自制私钥签名后的数据没有被修改

Code Requirements:

The criteria used to evaluate a code signature are called code requirements.

更新有效,跟先前的版本是the same app

To use a certificate for signing, you need the private key, so that your code signing certificates will show up in this list.

If you have a private key for a certificate, you can unfold the certificate to show the private key:

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

推荐阅读更多精彩内容