mirror of https://github.com/opa334/TrollStore.git
Fix signing unsupported MachO types
This commit is contained in:
parent
ac24773858
commit
11eb142d3b
|
@ -128,6 +128,18 @@ int apply_coretrust_bypass(const char *machoPath)
|
|||
return 2;
|
||||
}
|
||||
|
||||
if (macho->machHeader.filetype == MH_OBJECT) {
|
||||
printf("Error: MachO is an object file, please use a MachO executable or dynamic library!\n");
|
||||
macho_free(macho);
|
||||
return 3;
|
||||
}
|
||||
|
||||
if (macho->machHeader.filetype == MH_DSYM) {
|
||||
printf("Error: MachO is a dSYM file, please use a MachO executable or dynamic library!\n");
|
||||
macho_free(macho);
|
||||
return 3;
|
||||
}
|
||||
|
||||
CS_SuperBlob *superblob = macho_read_code_signature(macho);
|
||||
if (!superblob) {
|
||||
printf("Error: no code signature found, please fake-sign the binary at minimum before running the bypass.\n");
|
||||
|
|
|
@ -72,6 +72,10 @@ int main(int argc, char *argv[]) {
|
|||
}
|
||||
|
||||
char *machoPath = extract_preferred_slice(input);
|
||||
if (!machoPath) {
|
||||
printf("Failed extracting best slice\n");
|
||||
return -1;
|
||||
}
|
||||
printf("Extracted best slice to %s\n", machoPath);
|
||||
|
||||
printf("Applying CoreTrust bypass...\n");
|
||||
|
|
|
@ -709,6 +709,8 @@ int signApp(NSString* appPath)
|
|||
// If not, we can continue but want to show a warning after the app is installed
|
||||
hasAdditionalEncryptedBinaries = YES;
|
||||
}
|
||||
} else if (r == 3) { // Non-fatal - unsupported MachO type
|
||||
NSLog(@"[%@] Cannot apply CoreTrust bypass on an unsupported MachO type!", filePath);
|
||||
}
|
||||
else {
|
||||
NSLog(@"[%@] CoreTrust bypass failed!!! :(", filePath);
|
||||
|
|
Loading…
Reference in New Issue