The workflow described in this article is used to apply the Symantec Sealed Program Libraries and test assertion to an Android app.
(For iOS apps, see Sealing iOS apps at http://www.symantec.com/docs/HOWTO95174 )
Save and export a clean, unsigned copy of your .APK.
Important note: Upon saving the .APK file, a message is displayed informing you that the unsigned package is stored at the location you specified in the previous step. The message also reminds you to sign the application and to run the ZipAlign utility on your signed app package. The Symantec Sealed Wrap Kit takes care of these tasks for you. You may close the message and proceed with the following steps.
Open a terminal session and change the terminal context to the directory containing the
Note: On Windows 7 and Windows 8, you must run CMD.EXE as Administrator or the sealing process will fail.
The wrap utility completes and places the wrapped Android app into the target directory with the file name, output.apk.
You can also use the following command options:
To specify a java keystore (which allows your sealed app to be upgraded at a later date):
The final phase in the Android app sealing workflow is to add the Symantec Sealed version of your app to your Symantec Sealed Project Partner Portal.
Your Symantec Sealed Android app is now ready for testing.
For the purpose of illustration, we’ll assume the same hypothetical directory structure as in the sealing instructions.
More information and details regarding testing and submitting your app for validation are included in the Symantec Sealed Program Developer's Guide at http://www.symantec.com/docs/DOC7127