I am obtaining a Google Play API key from Google, and it is asking to enter SHA1 fingerprint. I want to know what is SHA1 fingerprint? I also wanted to know weather this API key can be used from another computer/pc?
相关问题
- How can I create this custom Bottom Navigation on
- Bottom Navigation View gets Shrink Down
- How to make that the snackbar action button be sho
- Listening to outgoing sms not working android
- How to create Circular view on android wear?
相关文章
- android开发 怎么把图片放入drawable的文件夹下
- android上如何获取/storage/emulated/下的文件列表
- androidStudio有个箭头不认识
- SQLite不能创建表
- Windows - Android SDK manager not listing any plat
- Animate Recycler View grid when number of columns
- Why is the app closing suddenly without showing an
- Android OverlayItem.setMarker(): Change the marker
If you are using Eclipse IDE, the easiest way to get the SHA1 fingerprint for your app:
You should see the following information:
You can also add other keystore file (for example, production keystore), and the values for that keystore will be shown also.
It is a standard for the implementation of a 'secure hash algorithm' - a one-way cryptographic function that can be used to act as a 'signature' of a sequence of bytes. It is very unlikely that 2 different byte sequences would produce the same value (though not impossible)
http://en.wikipedia.org/wiki/SHA-1
Note that there are other, more robust standards out there these days e.g. SHA256 and beyond.
They are asking for the SHA1 fingerprint on your keystore file (You sign your apps using this before you can push them to google play)
you can get your key by doing this
you can use your keystore file from another computer just put it on a USB stick or email it to yourself (Make sure to keep it private !IMPORTANT!) and point your IDE to the file
SHA - standing for Secure Hash Algorithm.
SHA-1 is one of several cryptographic hash functions. SHA-1 is most often used to verify that a file has been unaltered. This is done by producing a hash value(hash value is produced by running an algorithm, called a cryptographic hash function), before the file has been transmitted, and then again once it reaches its destination. The transmitted file can be considered genuine only if both checksums are identical.
A file hashed with SHA1 could look like:
752c14ea195c369bac3c3b7896975ee9fd15eeb7
For detailed explanation you can refer to: https://www.lifewire.com/what-is-sha-1-2626011