mirror of
				https://github.com/opa334/TrollStore.git
				synced 2025-11-04 07:32:36 +08:00 
			
		
		
		
	Implement signing with new CoreTrust bypass
This commit is contained in:
		
							parent
							
								
									68abdf124b
								
							
						
					
					
						commit
						2c327a0083
					
				@ -1,3 +1,3 @@
 | 
			
		||||
#include <stdbool.h>
 | 
			
		||||
 | 
			
		||||
int binary_sign_adhoc(char *path, bool preserveMetadata);
 | 
			
		||||
int binary_sign_adhoc(const char *path, bool preserveMetadata);
 | 
			
		||||
@ -89,7 +89,7 @@ extern const CFStringRef kSecCodeInfoResourceDirectory; /* Internal */
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int binary_sign_adhoc(char *path, bool preserveMetadata)
 | 
			
		||||
int binary_sign_adhoc(const char *path, bool preserveMetadata)
 | 
			
		||||
{
 | 
			
		||||
	NSString *filePath = [NSString stringWithUTF8String:path];
 | 
			
		||||
	OSStatus status = 0;
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										
											BIN
										
									
								
								RootHelper/external/lib/libchoma.a
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										
											BIN
										
									
								
								RootHelper/external/lib/libchoma.a
									
									
									
									
										vendored
									
									
								
							
										
											Binary file not shown.
										
									
								
							@ -13,6 +13,10 @@
 | 
			
		||||
#ifndef EMBEDDED_ROOT_HELPER
 | 
			
		||||
#import "adhoc.h"
 | 
			
		||||
#import "coretrust_bug.h"
 | 
			
		||||
#import <choma/FAT.h>
 | 
			
		||||
#import <choma/MachO.h>
 | 
			
		||||
#import <choma/FileStream.h>
 | 
			
		||||
#import <choma/Host.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#import <SpringBoardServices/SpringBoardServices.h>
 | 
			
		||||
@ -356,6 +360,14 @@ BOOL codeCertChainContainsFakeAppStoreExtensions(SecStaticCodeRef codeRef)
 | 
			
		||||
	return evaluatesToCustomAnchor;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#ifdef EMBEDDED_ROOT_HELPER
 | 
			
		||||
// The embedded root helper is not able to sign apps
 | 
			
		||||
// But it does not need that functionality anyways
 | 
			
		||||
int signApp(NSString* appPath)
 | 
			
		||||
{
 | 
			
		||||
	return -1;
 | 
			
		||||
}
 | 
			
		||||
#else
 | 
			
		||||
int signApp(NSString* appPath)
 | 
			
		||||
{
 | 
			
		||||
	NSDictionary* appInfoDict = infoDictionaryForAppPath(appPath);
 | 
			
		||||
@ -378,7 +390,59 @@ int signApp(NSString* appPath)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	SecStaticCodeRef codeRef = getStaticCodeRef(executablePath);
 | 
			
		||||
	// XXX: There used to be a check here whether the main binary was already signed with bypass
 | 
			
		||||
	// In that case it would skip signing aswell, no clue if that's still desirable
 | 
			
		||||
 | 
			
		||||
	NSURL* fileURL;
 | 
			
		||||
	NSDirectoryEnumerator *enumerator = [[NSFileManager defaultManager] enumeratorAtURL:[NSURL fileURLWithPath:appPath] includingPropertiesForKeys:nil options:0 errorHandler:nil];
 | 
			
		||||
	while(fileURL = [enumerator nextObject])
 | 
			
		||||
	{
 | 
			
		||||
		NSString *filePath = fileURL.path;
 | 
			
		||||
		FAT *fat = fat_init_from_path(filePath.fileSystemRepresentation);
 | 
			
		||||
		if (fat) {
 | 
			
		||||
			// This is FAT or MachO, sign and apply CoreTrust bypass
 | 
			
		||||
			MachO *machoForExtraction = fat_find_preferred_slice(fat);
 | 
			
		||||
			if (machoForExtraction) {
 | 
			
		||||
				NSLog(@"Starting signing of %@\n", filePath);
 | 
			
		||||
				NSString *tmpPath = [NSTemporaryDirectory() stringByAppendingPathComponent:[NSUUID UUID].UUIDString];
 | 
			
		||||
				MemoryStream *sliceOutStream = file_stream_init_from_path(tmpPath.fileSystemRepresentation, 0, 0, FILE_STREAM_FLAG_WRITABLE | FILE_STREAM_FLAG_AUTO_EXPAND);
 | 
			
		||||
				MemoryStream *sliceStream = macho_get_stream(machoForExtraction);
 | 
			
		||||
				memory_stream_copy_data(sliceStream, 0, sliceOutStream, 0, memory_stream_get_size(sliceStream));
 | 
			
		||||
				memory_stream_free(sliceOutStream);
 | 
			
		||||
 | 
			
		||||
				// Now we have the single slice at tmpPath, which we will sign and apply the bypass, then copy over the original file
 | 
			
		||||
 | 
			
		||||
				NSLog(@"[%@] Adhoc signing...", filePath);
 | 
			
		||||
 | 
			
		||||
				// First attempt ad hoc signing
 | 
			
		||||
				int r = binary_sign_adhoc(tmpPath.fileSystemRepresentation, true);
 | 
			
		||||
				if (r != 0) {
 | 
			
		||||
					NSLog(@"[%@] Adhoc signing failed with error code %d, continuing anyways...\n", filePath, r);
 | 
			
		||||
				}
 | 
			
		||||
				else {
 | 
			
		||||
					NSLog(@"[%@] Adhoc signing worked!\n", filePath);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				NSLog(@"[%@] Applying CoreTrust bypass...", filePath);
 | 
			
		||||
				r = apply_coretrust_bypass(tmpPath.fileSystemRepresentation);
 | 
			
		||||
				if (r == 0) {
 | 
			
		||||
					NSLog(@"[%@] Applied CoreTrust bypass!", filePath);
 | 
			
		||||
				}
 | 
			
		||||
				else {
 | 
			
		||||
					NSLog(@"[%@] CoreTrust bypass failed!!! :(", filePath);
 | 
			
		||||
					fat_free(fat);
 | 
			
		||||
					return 175;
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				// tempFile is now signed, overwrite original file at filePath with it
 | 
			
		||||
				[[NSFileManager defaultManager] removeItemAtPath:filePath error:nil];
 | 
			
		||||
				[[NSFileManager defaultManager] moveItemAtPath:tmpPath toPath:filePath error:nil];
 | 
			
		||||
			}
 | 
			
		||||
			fat_free(fat);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/*SecStaticCodeRef codeRef = getStaticCodeRef(executablePath);
 | 
			
		||||
	if(codeRef != NULL)
 | 
			
		||||
	{
 | 
			
		||||
		if(codeCertChainContainsFakeAppStoreExtensions(codeRef))
 | 
			
		||||
@ -391,9 +455,10 @@ int signApp(NSString* appPath)
 | 
			
		||||
	else
 | 
			
		||||
	{
 | 
			
		||||
		NSLog(@"[signApp] failed to get static code, can't derive entitlements from %@, continuing anways...", executablePath);
 | 
			
		||||
	}
 | 
			
		||||
	}*/
 | 
			
		||||
	return 0;
 | 
			
		||||
}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
void applyPatchesToInfoDictionary(NSString* appPath)
 | 
			
		||||
{
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user