Is there a way to determine programmatically if the currently running app was built and signed for development only or whether it was built for distribution? And can one determine if was build for app store or ad hoc distribution?
Is it e.g. possibly to access the code signature and get the information from there? Or are there certain files present in one of variants that don't exist in the other ones? Is part of the bundle info? Or can it be derived from the executable file?
Any hints are appreciated.
It seems that the embedded.mobileprovision file is in ASN.1 format.
I create a gist to detect Ad Hoc build
See : https://gist.github.com/iShawnWang/d904934efded271d83b36288562df410
AdHoc detect with following 2 conditions :
1.
embedded.mobileprovision
contains fieldProvisionedDevices
(Debug and Ad Hoc Build contains this field ,Release not)2.it is not DEBUG Build , we can use
#ifdef DEBUG
to decide itopenssl asn1parse -inform DEM -in *Mobile_Provision_File* -strparse 54
is the easiest way to access the data that I've found.EDIT:
security cms -D -i *Mobile_Provision_File*
is actually easier. The openssl command leaves some garbage in the output.that's the way i distinguish the debug and release mode ,
but i have no idea for adhoc or production unless use the provision profile name
I've extracted an embedded.mobileprovision file and pasted into an online ASN.1 viewer (e.g. http://www.geocities.co.jp/SiliconValley-SanJose/3377/asn1JS.html), and that's what a got:
With this and some ASN.1 knowledge, your explanation makes perfect sense.
The interesting part is the octet string starting 3c3f786d6c. That's the XML part in Apple's property list format that contains all the answers about the distribution type (developer, ad-hoc, App Store).
The easiest way to check is to look at
embedded.mobileprovision
([[NSBundle mainBundle] pathForResource:@"embedded.mobileprovision" ofType:nil]
):openssl asn1parse -inform der
), but a bad hack is to just look for<plist
and</plist>
.<key>get-task-allow</key><true/>
The other thing you can check is the entitlements embedded in the executable (
otool -l
lists it asLC_CODE_SIGNATURE
). Parsing this is even more tedious (you need to parse the Mach-O header and load commands, and for "universal" binaries which are now the default, you'll need to check the currently-loaded architecture or all architectures).<key>get-task-allow</key><true/>
<key>get-task-allow</key><false/>
I don't think the entitlements distinguish between Ad Hoc and App Store builds.
Apart from those and the certificate it's signed with, there's no difference between Development/Ad Hoc/App Store apps (there are a few other things in the entitlements/provisioning profile, but nothing more reliable that I can think of).
Security considerations
Neither of these are that difficult to circumvent. For the first method, the app could just "swizzle"
-[NSBundle pathForResource:ofType:]
. The second method is a bit more difficult depending on what API you use to read the file.