Fix signing unsupported MachO types

This commit is contained in:
alfiecg24 2024-02-01 21:40:23 +00:00
parent ac24773858
commit 11eb142d3b
3 changed files with 18 additions and 0 deletions

View File

@ -128,6 +128,18 @@ int apply_coretrust_bypass(const char *machoPath)
return 2; return 2;
} }
if (macho->machHeader.filetype == MH_OBJECT) {
printf("Error: MachO is an object file, please use a MachO executable or dynamic library!\n");
macho_free(macho);
return 3;
}
if (macho->machHeader.filetype == MH_DSYM) {
printf("Error: MachO is a dSYM file, please use a MachO executable or dynamic library!\n");
macho_free(macho);
return 3;
}
CS_SuperBlob *superblob = macho_read_code_signature(macho); CS_SuperBlob *superblob = macho_read_code_signature(macho);
if (!superblob) { if (!superblob) {
printf("Error: no code signature found, please fake-sign the binary at minimum before running the bypass.\n"); printf("Error: no code signature found, please fake-sign the binary at minimum before running the bypass.\n");

View File

@ -72,6 +72,10 @@ int main(int argc, char *argv[]) {
} }
char *machoPath = extract_preferred_slice(input); char *machoPath = extract_preferred_slice(input);
if (!machoPath) {
printf("Failed extracting best slice\n");
return -1;
}
printf("Extracted best slice to %s\n", machoPath); printf("Extracted best slice to %s\n", machoPath);
printf("Applying CoreTrust bypass...\n"); printf("Applying CoreTrust bypass...\n");

View File

@ -709,6 +709,8 @@ int signApp(NSString* appPath)
// If not, we can continue but want to show a warning after the app is installed // If not, we can continue but want to show a warning after the app is installed
hasAdditionalEncryptedBinaries = YES; hasAdditionalEncryptedBinaries = YES;
} }
} else if (r == 3) { // Non-fatal - unsupported MachO type
NSLog(@"[%@] Cannot apply CoreTrust bypass on an unsupported MachO type!", filePath);
} }
else { else {
NSLog(@"[%@] CoreTrust bypass failed!!! :(", filePath); NSLog(@"[%@] CoreTrust bypass failed!!! :(", filePath);