Is an app's executable file byte-for-byte identical when the app is purchased through the App Store and installed on a user's iPhone, compared to the original executable file submitted to Apple in the original app bundle? Or is it different (for example, with additional signatures or encryption)?
I am concerned only about the executable file, not the entire app bundle.
In particular, would code such as ...
int main(int argc, char* argv[]) {
FILE* file = fopen(argv[0], "rb");
// Read entire contents of executable file; calculate a hash value
// ...
fclose(file);
}
... calculate the same hash as calculating the hash outside of the iPhone on the original, submitted executable?
For example, calculating a SHA256 hash as above then using "Build and Run" in XCode to run on an attached iPhone produces exactly the same result as calculating the SHA256 hash by running openssl sha256 MyAppExecutableFile
from a terminal in OS X. This means the act of installing the app through XCode does not alter the executable file.
My question is whether or not this still holds when an app is submitted to the App Store, purchased, and installed.
Select iOS or macOS from the Platform list. Click the name of the app. Click Edit. Make your changes.
All third-party apps are “sandboxed,” so they are restricted from accessing files stored by other apps or from making changes to the device. Sandboxing is designed to prevent apps from gathering or modifying information stored by other apps.
Build your apps using Xcode 14.1 RC 2, which includes SDKs for all the latest Apple platforms. Please note, starting April 2023, all iOS and iPadOS apps submitted to the App Store must be built with Xcode 14.1 and the iOS 16.1 SDK.
An . ipa file is an iOS and iPadOS application archive file which stores an iOS/iPadOS app.
The application executable is encrypted by Apple when released on the App Store, so self-running a checksum on your own binary is not a good idea —you cannot know the file size of the encrypted binary in advance—.
Mind you, the binary always remains encrypted in the file system, and only the iPhone root user can decrypt these binaries. If you download an app from the App Store with iTunes, you can open the IPA on your PC or Mac and see that the binaries are indeed encrypted by running otool:
otool -l <app binary> | grep cryptid
crypt id 1
(a value of cryptid 1 means the app is encripted)
otool -l <app binary> | grep cryptsize
12345678
(size of the encrypted segment)
The application is also stripped of your signature and signed by Apple. This can be verified by running "codesign -vvvvd" on the app binary you submit and comparing it to the output of "codesign -vvvvd" of the app binary you download from the store.
Because of this the hashes will not match.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With