Search results for

“codesign”

3,221 results found

Post

Replies

Boosts

Views

Activity

Reply to Run SampleEndpointApp but got Automatic signing failed
Hi Eskimo, Thanks for you step by step introductions. I executed the same operations but still got error: Begin installing the extension 🔄 Failed to install the extension ❌ Missing entitlement com.apple.developer.system-extension.install `security cms -D -i SampleEndpointApp.app/Contents/embedded.provisionprofile | plutil -p -` { AppIDName => XC com example apple-samplecode SampleEndpointAppRKJVFVKFG3 ApplicationIdentifierPrefix => [ 0 => RKJVFVKFG3 ] ... Entitlements => { com.apple.application-identifier => RKJVFVKFG3.com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3 com.apple.developer.system-extension.install => 1 com.apple.developer.team-identifier => RKJVFVKFG3 keychain-access-groups => [ 0 => RKJVFVKFG3.* ] } ExpirationDate => 2026-05-21 17:00:08 +0000 IsXcodeManaged => 0 Name => SampleEndpointAppUI Platform => [ 0 => OSX ] PPQCheck => 0 ProvisionedDevices => [ 0 => 00008132-000121E822F8801C 1 => 00006030-000279A822D9001C ] TeamIdentifier =&g
Topic: App & System Services SubTopic: Core OS Tags:
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
When debugging code signing problems it’s better to look at the built binary rather than your source code. That is, rather than look at MyApp.entitlements, which is source code, look at the entitlements actually baked into the app’s code signature: % codesign -d --entitlements - /path/to/MyApp.app Likewise for the Info.plist: % plutil -p /path/to/MyApp.app/Contents/Info.plist And the provisioning profile: % security cms -D -i MyApp.app/Contents/embedded.provisionprofile | plutil -p - In terms of how you get this to build, here’s what I’d did: Open the project in Xcode. For both targets, in the Signing & Capabilities editor, set the Team popup to your team. In the Extension target, remove the Endpoint Security capability. Build the app. This produces an app like this: % codesign -d -vvv --entitlements - SampleEndpointApp.app … Authority=Apple Development: Quinn Quinn (7XFU7D52S4) … [Dict] [Key] com.apple.application-identifier [Value] [String] SKMME9E2Y8.com.example.apple-samplecode.Sampl
Topic: App & System Services SubTopic: Core OS Tags:
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
hello Eskimo, By now I build out of Xcode successfully, and code sign by command, but still failed. SampleEndpointApp Info.plist: CFBundleDevelopmentRegion $(DEVELOPMENT_LANGUAGE) CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIconFile CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType $(PRODUCT_BUNDLE_PACKAGE_TYPE) CFBundleShortVersionString 1.0 CFBundleVersion 1 LSMinimumSystemVersion $(MACOSX_DEPLOYMENT_TARGET) NSHumanReadableCopyright Copyright © 2020 Apple. All rights reserved. NSMainStoryboardFile Main NSPrincipalClass NSApplication NSSupportsAutomaticTermination NSSupportsSuddenTermination Extention Info.plist: CFBundleDevelopmentRegion $(DEVELOPMENT_LANGUAGE) CFBundleDisplayName Extension CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType $(PRODUCT_BUNDLE_PACKAGE_TYPE) CFBundleShortVersionString
Topic: App & System Services SubTopic: Core OS Tags:
May ’25
Reply to How to distribute DEXT during development and to the public
First, I referred the Configure the Sample Code Project section in the README.md and configured the sample code project to build with automatic signing. I could run the app and activate the dext successfully and made sure the app could communicate with the dext. Great! That's how development signing is intended to work. Next, I tried the manual signing. I followed steps described in the Configure the Sample Code Project section carefully. Manually code-signing for what purpose/environment? If you're trying to manually sign for development, my advice is don't bother. While it is technically possible, it's a pain to set up, will break frequently, and doesn't provide any real benefit. If you're signing for any other environment, including: I would also like to know detailed steps to publicly distribute my dext and app using our Developer ID Application Certificate My description of the basic flow is here. In a different thread, I also posted a detailed write up on how the different configuration points relate an
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
codesign -d --entitlements :- /Applications/SampleEndpointApp.app Executable=/Applications/SampleEndpointApp.app/Contents/MacOS/SampleEndpointApp warning: Specifying ':' in the path is deprecated and will not work in a future release com.apple.application-identifierRKJVFVKFG3.com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3com.apple.developer.system-extension.installcom.apple.developer.team-identifierRKJVFVKFG3com.apple.security.files.user-selected.read-onlycom.apple.security.get-task-allow codesign -d --entitlements :- /Applications/SampleEndpointApp.app/Contents/Library/SystemExtensions/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension.systemextension Executable=/Applications/SampleEndpointApp.app/Contents/Library/SystemExtensions/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension.systemextension/Contents/MacOS/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension warning: Specifying ':' in the path is deprecated and will not work in a
Topic: App & System Services SubTopic: Core OS Tags:
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
Yes, I'm trying to run Monitoring System Events with Endpoint Security sample code. By now, I disabled automatic signing in Xcode and use my private profile generated by apple site, build successfully. I read through this post and deleted both entitlements files of app and extension, codesign them. Then got error like this: Failed to install the extension ❌ Invalid extension configuration in Info.plist and/or entitlements: does not appear to belong to any extension categories.
Topic: App & System Services SubTopic: Core OS Tags:
May ’25
Reply to Notarization service says signature invalid, but codesign says it's fine
Thank for those UUIDs. I asked the notary team for a copy of those submissions, so I could see exactly what the submitted zip archives look like, and that revealed a clear problem. Consider this file listing of your notarytool submission: % unzip -t ok-035482f3-855c-455f-bd60-6be63ceefd61.zip Archive: ok-035482f3-855c-455f-bd60-6be63ceefd61.zip … testing: Wwwwwwww.app/Contents/MacOS/graphviz/bin/gvmap.sh OK testing: __MACOSX/Wwwwwwww.app/Contents/MacOS/graphviz/bin/._gvmap.sh OK … No errors detected in compressed data of ok-035482f3-855c-455f-bd60-6be63ceefd61.zip. Note I’ve redacted stuff using my ‘patented’ ‘first letter’ algorithm [1]. First up, the __MACOSX indicates that you’ve sequestered Mac metadata. That doesn’t make sense in this context. I explain why in Extended Attributes and Zip Archives. However, the real issue is that you have Mac metadata at all! Unpacking the archive I see this: % xattr Wwwwwwww.app/Contents/MacOS/graphviz/bin/gvmap.sh com.apple.cs.CodeDirectory com.apple.cs.CodeRequirements
May ’25
codesign command failed - Requirement syntax error - unexpected token
I am trying to distribute my Unity app to test flight. Build works on iPhone locally, archiving also works but when I start distribution to test flight I get this Error codesign command failed (/var/folders/gn/ql1bht8j2z7b18b3xtt0j7rr0000gn/T/XcodeDistPipeline.~~~2gmyFJ/Root/Payload/TondoJigsaw2.app/Frameworks/UnityFramework.framework: replacing existing signature /var/folders/gn/ql1bht8j2z7b18b3xtt0j7rr0000gn/T/XcodeDistPipeline.~~~2gmyFJ/Root/Payload/TondoJigsaw2.app/Frameworks/UnityFramework.framework: invalid or corrupted code requirement(s) Requirement syntax error(s): line 1:152: unexpected token: sQuaricon ) I am not sure what is the problem Team name is: “sQuaricon” Name Surname s.p. Bundle ID is: com.Squaricon.TondoJigsaw2 When I change bundle ID to com.testasd.TondoJigsaw2 (I do this in Xcode before archiving) that error disappears and I reach the part where I have to pick language. Even though this is not the solution, I think it is interesting, it implies issue might be with Bundle ID but
2
0
139
May ’25
Notarization Successful but Stapling Fails with Error 65
Product: macOS, Notarization Tool: notarytool, Stapler Tool: xcrun stapler, Application: master-billing.app, DMG: master-billing.dmg I'm attempting to notarize and staple a macOS .dmg file containing a signed .app. Notarization completes successfully, but the stapling step fails with Error 65. All tools are up-to-date and I'm following the official Apple process. #!/bin/bash set -e APP=dist/mac-arm64/master-billing.app DMG=dist/mac-arm64/master-billing.dmg IDENTITY=Developer ID Application: NAME (TEAM ID) PROFILE=notarysiva VOLUME_NAME=MasterBilling Sign binaries and frameworks find $APP -type f ( -name .dylib -or -name .so -or -name *.node -or -perm -u+x ) -exec codesign --force --options runtime --timestamp --sign $IDENTITY {} ; find $APP -type d ( -name .app -or -name .framework ) -exec codesign --force --options runtime --timestamp --sign $IDENTITY {} ; codesign --deep --force --options runtime --timestamp --sign $IDENTITY $APP Create DMG hdiutil create -volname $VOLUME_NAME -sr
1
0
181
May ’25
Reply to security: SecKeychainItemImport: The user name or passphrase you entered is not correct.
Any updates on the bug ? Same issue. Sequoia 15.4.1 (24E263) OpenSSL 3.4.0 Steps for repoducing: Create .p12 without password openssl genpkey -algorithm RSA -out private_key.pem openssl req -new -key private_key.pem -out csr.pem openssl x509 -req -days 365 -in csr.pem -signkey private_key.pem -out certificate.pem openssl pkcs12 -export -out bundle.p12 -inkey private_key.pem -in certificate.pem Import .p12 to a keychain import bundle.p12 -k login.keychain -T /usr/bin/codesign -P And voila you've got the bug: security: SecKeychainItemImport: MAC verification failed during PKCS12 import (wrong password?)
Topic: Privacy & Security SubTopic: General Tags:
May ’25
Reply to Notarization Fails: “The binary is not signed with a valid Developer ID certificate” for Flutter macOS App Plugins (file_picker, file_saver, url_launcher_macos)
It’s really hard to read your post. Please take a look at Quinn’s Top Ten DevForums Tips, which has lots of suggestions for how to work effectively on the forums. Anyway, what I can see is this: [quote='784184021, BenAuerDev, /thread/784184, /profile/BenAuerDev'] Are there known issues with signing Flutter plugin frameworks for notarization? [/quote] I think you might have more luck asking that via the support channel for the third-party tool you’re using. However, my experience is that third-party tooling tends to bend the bundle placement rules outlined in Placing Content in a Bundle, and that causes all sorts of weird problems. [quote='784184021, BenAuerDev, /thread/784184, /profile/BenAuerDev'] Using both codesign --deep [/quote] I strongly recommend against using --deep when signing code. See --deep Considered Harmful. As to what you should do, you can find my general advice in: Creating distribution-signed code for macOS Packaging Mac software for distribution Beyond that, it’s hard to offer sp
Topic: Code Signing SubTopic: Notarization Tags:
May ’25
Notarization Fails: “The binary is not signed with a valid Developer ID certificate” for Flutter macOS App Plugins (file_picker, file_saver, url_launcher_macos)
Hi all, I’m trying to notarize a Flutter macOS app built in CI (GitHub Actions). The app builds and signs fine locally—codesign --verify --deep --strict and spctl --assess both pass. However, Apple’s notarization service consistently rejects the app with errors like: The binary is not signed with a valid Developer ID certificate: file_picker.framework The binary is not signed with a valid Developer ID certificate: file_saver.framework The binary is not signed with a valid Developer ID certificate: url_launcher_macos.framework What I’ve tried: Explicitly re-signing all frameworks with my Developer ID Application certificate and --timestamp Removing existing signatures before re-signing Ensuring correct entitlements and bundle identifier Matching the app bundle name and identifier in all places Using both codesign --deep and manual signing of each binary Local validation always passes, but notarization fails in CI Certificate: I am using a “Developer ID Application” certificate (not a “Mac Dev
1
0
169
May ’25
Reply to Integrating CryptoTokenKit with productsign
I’ve not looked into the installer package side of this in depth but, in general, the transition from SHA1 to SHA256 is driven by the deployment target. If your product supports old releases, the system has to include both hashes to ensure compatibility with those systems. Now, with codesign I’m familiar with how that’s controlled, that is, via various Mach-O load commands. You can dump these using vtool. For installer packages, the productbuild man page described how you set the minimum supported OS version. Are you doing that? And just for testing, try setting it way up, to something silly like macOS 15. If that works, you can then step it back to determine the inflexion point. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Privacy & Security SubTopic: General Tags:
May ’25
Integrating CryptoTokenKit with productsign
Hi all, I'm using a CryptoTokenKit (CTK) extension to perform code signing without having the private key stored on my laptop. The extension currently only supports the rsaSignatureDigestPKCS1v15SHA256 algorithm: func tokenSession(_ session: TKTokenSession, supports operation: TKTokenOperation, keyObjectID: TKToken.ObjectID, algorithm: TKTokenKeyAlgorithm) -> Bool { return algorithm.isAlgorithm(SecKeyAlgorithm.rsaSignatureDigestPKCS1v15SHA256) } This setup works perfectly with codesign, and signing completes without any issues. However, when I try to use productsign, the system correctly detects and delegates signing to my CTK extension, but it seems to always request rsaSignatureDigestPKCS1v15SHA1 instead: productsign --timestamp --sign unsigned.pkg signed.pkg productsign: using timestamp authority for signature productsign: signing product with identity Developer ID Installer: () from keychain (null) ... Error Domain=NSOSStatusErrorDomain Code=-50 algid:sign:RSA:digest-PKCS1v15:SHA1: algorithm
7
0
627
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
Hi Eskimo, Thanks for you step by step introductions. I executed the same operations but still got error: Begin installing the extension 🔄 Failed to install the extension ❌ Missing entitlement com.apple.developer.system-extension.install `security cms -D -i SampleEndpointApp.app/Contents/embedded.provisionprofile | plutil -p -` { AppIDName => XC com example apple-samplecode SampleEndpointAppRKJVFVKFG3 ApplicationIdentifierPrefix => [ 0 => RKJVFVKFG3 ] ... Entitlements => { com.apple.application-identifier => RKJVFVKFG3.com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3 com.apple.developer.system-extension.install => 1 com.apple.developer.team-identifier => RKJVFVKFG3 keychain-access-groups => [ 0 => RKJVFVKFG3.* ] } ExpirationDate => 2026-05-21 17:00:08 +0000 IsXcodeManaged => 0 Name => SampleEndpointAppUI Platform => [ 0 => OSX ] PPQCheck => 0 ProvisionedDevices => [ 0 => 00008132-000121E822F8801C 1 => 00006030-000279A822D9001C ] TeamIdentifier =&g
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
When debugging code signing problems it’s better to look at the built binary rather than your source code. That is, rather than look at MyApp.entitlements, which is source code, look at the entitlements actually baked into the app’s code signature: % codesign -d --entitlements - /path/to/MyApp.app Likewise for the Info.plist: % plutil -p /path/to/MyApp.app/Contents/Info.plist And the provisioning profile: % security cms -D -i MyApp.app/Contents/embedded.provisionprofile | plutil -p - In terms of how you get this to build, here’s what I’d did: Open the project in Xcode. For both targets, in the Signing & Capabilities editor, set the Team popup to your team. In the Extension target, remove the Endpoint Security capability. Build the app. This produces an app like this: % codesign -d -vvv --entitlements - SampleEndpointApp.app … Authority=Apple Development: Quinn Quinn (7XFU7D52S4) … [Dict] [Key] com.apple.application-identifier [Value] [String] SKMME9E2Y8.com.example.apple-samplecode.Sampl
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
hello Eskimo, By now I build out of Xcode successfully, and code sign by command, but still failed. SampleEndpointApp Info.plist: CFBundleDevelopmentRegion $(DEVELOPMENT_LANGUAGE) CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIconFile CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType $(PRODUCT_BUNDLE_PACKAGE_TYPE) CFBundleShortVersionString 1.0 CFBundleVersion 1 LSMinimumSystemVersion $(MACOSX_DEPLOYMENT_TARGET) NSHumanReadableCopyright Copyright © 2020 Apple. All rights reserved. NSMainStoryboardFile Main NSPrincipalClass NSApplication NSSupportsAutomaticTermination NSSupportsSuddenTermination Extention Info.plist: CFBundleDevelopmentRegion $(DEVELOPMENT_LANGUAGE) CFBundleDisplayName Extension CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType $(PRODUCT_BUNDLE_PACKAGE_TYPE) CFBundleShortVersionString
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to How to distribute DEXT during development and to the public
First, I referred the Configure the Sample Code Project section in the README.md and configured the sample code project to build with automatic signing. I could run the app and activate the dext successfully and made sure the app could communicate with the dext. Great! That's how development signing is intended to work. Next, I tried the manual signing. I followed steps described in the Configure the Sample Code Project section carefully. Manually code-signing for what purpose/environment? If you're trying to manually sign for development, my advice is don't bother. While it is technically possible, it's a pain to set up, will break frequently, and doesn't provide any real benefit. If you're signing for any other environment, including: I would also like to know detailed steps to publicly distribute my dext and app using our Developer ID Application Certificate My description of the basic flow is here. In a different thread, I also posted a detailed write up on how the different configuration points relate an
Replies
Boosts
Views
Activity
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
codesign -d --entitlements :- /Applications/SampleEndpointApp.app Executable=/Applications/SampleEndpointApp.app/Contents/MacOS/SampleEndpointApp warning: Specifying ':' in the path is deprecated and will not work in a future release com.apple.application-identifierRKJVFVKFG3.com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3com.apple.developer.system-extension.installcom.apple.developer.team-identifierRKJVFVKFG3com.apple.security.files.user-selected.read-onlycom.apple.security.get-task-allow codesign -d --entitlements :- /Applications/SampleEndpointApp.app/Contents/Library/SystemExtensions/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension.systemextension Executable=/Applications/SampleEndpointApp.app/Contents/Library/SystemExtensions/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension.systemextension/Contents/MacOS/com.example.apple-samplecode.SampleEndpointAppRKJVFVKFG3.Extension warning: Specifying ':' in the path is deprecated and will not work in a
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to Run SampleEndpointApp but got Automatic signing failed
Yes, I'm trying to run Monitoring System Events with Endpoint Security sample code. By now, I disabled automatic signing in Xcode and use my private profile generated by apple site, build successfully. I read through this post and deleted both entitlements files of app and extension, codesign them. Then got error like this: Failed to install the extension ❌ Invalid extension configuration in Info.plist and/or entitlements: does not appear to belong to any extension categories.
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to Notarization service says signature invalid, but codesign says it's fine
Thank for those UUIDs. I asked the notary team for a copy of those submissions, so I could see exactly what the submitted zip archives look like, and that revealed a clear problem. Consider this file listing of your notarytool submission: % unzip -t ok-035482f3-855c-455f-bd60-6be63ceefd61.zip Archive: ok-035482f3-855c-455f-bd60-6be63ceefd61.zip … testing: Wwwwwwww.app/Contents/MacOS/graphviz/bin/gvmap.sh OK testing: __MACOSX/Wwwwwwww.app/Contents/MacOS/graphviz/bin/._gvmap.sh OK … No errors detected in compressed data of ok-035482f3-855c-455f-bd60-6be63ceefd61.zip. Note I’ve redacted stuff using my ‘patented’ ‘first letter’ algorithm [1]. First up, the __MACOSX indicates that you’ve sequestered Mac metadata. That doesn’t make sense in this context. I explain why in Extended Attributes and Zip Archives. However, the real issue is that you have Mac metadata at all! Unpacking the archive I see this: % xattr Wwwwwwww.app/Contents/MacOS/graphviz/bin/gvmap.sh com.apple.cs.CodeDirectory com.apple.cs.CodeRequirements
Replies
Boosts
Views
Activity
May ’25
codesign command failed - Requirement syntax error - unexpected token
I am trying to distribute my Unity app to test flight. Build works on iPhone locally, archiving also works but when I start distribution to test flight I get this Error codesign command failed (/var/folders/gn/ql1bht8j2z7b18b3xtt0j7rr0000gn/T/XcodeDistPipeline.~~~2gmyFJ/Root/Payload/TondoJigsaw2.app/Frameworks/UnityFramework.framework: replacing existing signature /var/folders/gn/ql1bht8j2z7b18b3xtt0j7rr0000gn/T/XcodeDistPipeline.~~~2gmyFJ/Root/Payload/TondoJigsaw2.app/Frameworks/UnityFramework.framework: invalid or corrupted code requirement(s) Requirement syntax error(s): line 1:152: unexpected token: sQuaricon ) I am not sure what is the problem Team name is: “sQuaricon” Name Surname s.p. Bundle ID is: com.Squaricon.TondoJigsaw2 When I change bundle ID to com.testasd.TondoJigsaw2 (I do this in Xcode before archiving) that error disappears and I reach the part where I have to pick language. Even though this is not the solution, I think it is interesting, it implies issue might be with Bundle ID but
Replies
2
Boosts
0
Views
139
Activity
May ’25
Notarization Successful but Stapling Fails with Error 65
Product: macOS, Notarization Tool: notarytool, Stapler Tool: xcrun stapler, Application: master-billing.app, DMG: master-billing.dmg I'm attempting to notarize and staple a macOS .dmg file containing a signed .app. Notarization completes successfully, but the stapling step fails with Error 65. All tools are up-to-date and I'm following the official Apple process. #!/bin/bash set -e APP=dist/mac-arm64/master-billing.app DMG=dist/mac-arm64/master-billing.dmg IDENTITY=Developer ID Application: NAME (TEAM ID) PROFILE=notarysiva VOLUME_NAME=MasterBilling Sign binaries and frameworks find $APP -type f ( -name .dylib -or -name .so -or -name *.node -or -perm -u+x ) -exec codesign --force --options runtime --timestamp --sign $IDENTITY {} ; find $APP -type d ( -name .app -or -name .framework ) -exec codesign --force --options runtime --timestamp --sign $IDENTITY {} ; codesign --deep --force --options runtime --timestamp --sign $IDENTITY $APP Create DMG hdiutil create -volname $VOLUME_NAME -sr
Replies
1
Boosts
0
Views
181
Activity
May ’25
Reply to security: SecKeychainItemImport: The user name or passphrase you entered is not correct.
security -v import bundle.p12 -k login.keychain -T /usr/bin/codesign -P https://1drv.ms/u/c/de13bcdacf228c88/ER4DNppbQQRMlY4tzawZ1s8BNLNcbEnuf54lLUOL1oD-Dg
Topic: Privacy & Security SubTopic: General Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to security: SecKeychainItemImport: The user name or passphrase you entered is not correct.
Any updates on the bug ? Same issue. Sequoia 15.4.1 (24E263) OpenSSL 3.4.0 Steps for repoducing: Create .p12 without password openssl genpkey -algorithm RSA -out private_key.pem openssl req -new -key private_key.pem -out csr.pem openssl x509 -req -days 365 -in csr.pem -signkey private_key.pem -out certificate.pem openssl pkcs12 -export -out bundle.p12 -inkey private_key.pem -in certificate.pem Import .p12 to a keychain import bundle.p12 -k login.keychain -T /usr/bin/codesign -P And voila you've got the bug: security: SecKeychainItemImport: MAC verification failed during PKCS12 import (wrong password?)
Topic: Privacy & Security SubTopic: General Tags:
Replies
Boosts
Views
Activity
May ’25
Reply to Notarization Fails: “The binary is not signed with a valid Developer ID certificate” for Flutter macOS App Plugins (file_picker, file_saver, url_launcher_macos)
It’s really hard to read your post. Please take a look at Quinn’s Top Ten DevForums Tips, which has lots of suggestions for how to work effectively on the forums. Anyway, what I can see is this: [quote='784184021, BenAuerDev, /thread/784184, /profile/BenAuerDev'] Are there known issues with signing Flutter plugin frameworks for notarization? [/quote] I think you might have more luck asking that via the support channel for the third-party tool you’re using. However, my experience is that third-party tooling tends to bend the bundle placement rules outlined in Placing Content in a Bundle, and that causes all sorts of weird problems. [quote='784184021, BenAuerDev, /thread/784184, /profile/BenAuerDev'] Using both codesign --deep [/quote] I strongly recommend against using --deep when signing code. See --deep Considered Harmful. As to what you should do, you can find my general advice in: Creating distribution-signed code for macOS Packaging Mac software for distribution Beyond that, it’s hard to offer sp
Topic: Code Signing SubTopic: Notarization Tags:
Replies
Boosts
Views
Activity
May ’25
Notarization Fails: “The binary is not signed with a valid Developer ID certificate” for Flutter macOS App Plugins (file_picker, file_saver, url_launcher_macos)
Hi all, I’m trying to notarize a Flutter macOS app built in CI (GitHub Actions). The app builds and signs fine locally—codesign --verify --deep --strict and spctl --assess both pass. However, Apple’s notarization service consistently rejects the app with errors like: The binary is not signed with a valid Developer ID certificate: file_picker.framework The binary is not signed with a valid Developer ID certificate: file_saver.framework The binary is not signed with a valid Developer ID certificate: url_launcher_macos.framework What I’ve tried: Explicitly re-signing all frameworks with my Developer ID Application certificate and --timestamp Removing existing signatures before re-signing Ensuring correct entitlements and bundle identifier Matching the app bundle name and identifier in all places Using both codesign --deep and manual signing of each binary Local validation always passes, but notarization fails in CI Certificate: I am using a “Developer ID Application” certificate (not a “Mac Dev
Replies
1
Boosts
0
Views
169
Activity
May ’25
Reply to Integrating CryptoTokenKit with productsign
I’ve not looked into the installer package side of this in depth but, in general, the transition from SHA1 to SHA256 is driven by the deployment target. If your product supports old releases, the system has to include both hashes to ensure compatibility with those systems. Now, with codesign I’m familiar with how that’s controlled, that is, via various Mach-O load commands. You can dump these using vtool. For installer packages, the productbuild man page described how you set the minimum supported OS version. Are you doing that? And just for testing, try setting it way up, to something silly like macOS 15. If that works, you can then step it back to determine the inflexion point. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Privacy & Security SubTopic: General Tags:
Replies
Boosts
Views
Activity
May ’25
Integrating CryptoTokenKit with productsign
Hi all, I'm using a CryptoTokenKit (CTK) extension to perform code signing without having the private key stored on my laptop. The extension currently only supports the rsaSignatureDigestPKCS1v15SHA256 algorithm: func tokenSession(_ session: TKTokenSession, supports operation: TKTokenOperation, keyObjectID: TKToken.ObjectID, algorithm: TKTokenKeyAlgorithm) -> Bool { return algorithm.isAlgorithm(SecKeyAlgorithm.rsaSignatureDigestPKCS1v15SHA256) } This setup works perfectly with codesign, and signing completes without any issues. However, when I try to use productsign, the system correctly detects and delegates signing to my CTK extension, but it seems to always request rsaSignatureDigestPKCS1v15SHA1 instead: productsign --timestamp --sign unsigned.pkg signed.pkg productsign: using timestamp authority for signature productsign: signing product with identity Developer ID Installer: () from keychain (null) ... Error Domain=NSOSStatusErrorDomain Code=-50 algid:sign:RSA:digest-PKCS1v15:SHA1: algorithm
Replies
7
Boosts
0
Views
627
Activity
May ’25