2 * Copyright (c) 2006-2010 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // StaticCode - SecStaticCode API objects
27 #include "StaticCode.h"
30 #include "reqdumper.h"
32 #include "resources.h"
34 #include "detachedrep.h"
35 #include "csdatabase.h"
36 #include "csutilities.h"
37 #include <CoreFoundation/CFURLAccess.h>
38 #include <Security/SecPolicyPriv.h>
39 #include <Security/SecTrustPriv.h>
40 #include <Security/SecCertificatePriv.h>
41 #include <Security/CMSPrivate.h>
42 #include <Security/SecCmsContentInfo.h>
43 #include <Security/SecCmsSignerInfo.h>
44 #include <Security/SecCmsSignedData.h>
45 #include <security_utilities/unix++.h>
46 #include <security_utilities/cfmunge.h>
47 #include <Security/CMSDecoder.h>
51 namespace CodeSigning
{
53 using namespace UnixPlusPlus
;
57 // Construct a SecStaticCode object given a disk representation object
59 SecStaticCode::SecStaticCode(DiskRep
*rep
)
61 mValidated(false), mExecutableValidated(false),
62 mDesignatedReq(NULL
), mGotResourceBase(false), mEvalDetails(NULL
)
64 CODESIGN_STATIC_CREATE(this, rep
);
65 checkForSystemSignature();
70 // Clean up a SecStaticCode object
72 SecStaticCode::~SecStaticCode() throw()
74 ::free(const_cast<Requirement
*>(mDesignatedReq
));
81 // CF-level comparison of SecStaticCode objects compares CodeDirectory hashes if signed,
82 // and falls back on comparing canonical paths if (both are) not.
84 bool SecStaticCode::equal(SecCFObject
&secOther
)
86 SecStaticCode
*other
= static_cast<SecStaticCode
*>(&secOther
);
87 CFDataRef mine
= this->cdHash();
88 CFDataRef his
= other
->cdHash();
90 return mine
&& his
&& CFEqual(mine
, his
);
92 return CFEqual(this->canonicalPath(), other
->canonicalPath());
95 CFHashCode
SecStaticCode::hash()
97 if (CFDataRef h
= this->cdHash())
100 return CFHash(this->canonicalPath());
105 // Attach a detached signature.
107 void SecStaticCode::detachedSignature(CFDataRef sigData
)
110 mRep
= new DetachedRep(sigData
, mRep
->base(), "explicit detached");
111 CODESIGN_STATIC_ATTACH_EXPLICIT(this, mRep
);
114 CODESIGN_STATIC_ATTACH_EXPLICIT(this, NULL
);
120 // Consult the system detached signature database to see if it contains
121 // a detached signature for this StaticCode. If it does, fetch and attach it.
122 // We do this only if the code has no signature already attached.
124 void SecStaticCode::checkForSystemSignature()
126 if (!this->isSigned())
128 if (RefPointer
<DiskRep
> dsig
= signatureDatabase().findCode(mRep
)) {
129 CODESIGN_STATIC_ATTACH_SYSTEM(this, dsig
);
138 // Return a descriptive string identifying the source of the code signature
140 string
SecStaticCode::signatureSource()
144 if (DetachedRep
*rep
= dynamic_cast<DetachedRep
*>(mRep
.get()))
145 return rep
->source();
151 // Do ::required, but convert incoming SecCodeRefs to their SecStaticCodeRefs
154 SecStaticCode
*SecStaticCode::requiredStatic(SecStaticCodeRef ref
)
156 SecCFObject
*object
= SecCFObject::required(ref
, errSecCSInvalidObjectRef
);
157 if (SecStaticCode
*scode
= dynamic_cast<SecStaticCode
*>(object
))
159 else if (SecCode
*code
= dynamic_cast<SecCode
*>(object
))
160 return code
->staticCode();
161 else // neither (a SecSomethingElse)
162 MacOSError::throwMe(errSecCSInvalidObjectRef
);
165 SecCode
*SecStaticCode::optionalDynamic(SecStaticCodeRef ref
)
167 SecCFObject
*object
= SecCFObject::required(ref
, errSecCSInvalidObjectRef
);
168 if (dynamic_cast<SecStaticCode
*>(object
))
170 else if (SecCode
*code
= dynamic_cast<SecCode
*>(object
))
172 else // neither (a SecSomethingElse)
173 MacOSError::throwMe(errSecCSInvalidObjectRef
);
178 // Void all cached validity data.
180 // We also throw out cached components, because the new signature data may have
181 // a different idea of what components should be present. We could reconcile the
182 // cached data instead, if performance seems to be impacted.
184 void SecStaticCode::resetValidity()
186 CODESIGN_EVAL_STATIC_RESET(this);
188 mExecutableValidated
= false;
191 for (unsigned n
= 0; n
< cdSlotCount
; n
++)
194 mEntitlements
= NULL
;
195 mResourceDict
= NULL
;
196 mDesignatedReq
= NULL
;
197 mGotResourceBase
= false;
203 // we may just have updated the system database, so check again
204 checkForSystemSignature();
209 // Retrieve a sealed component by special slot index.
210 // If the CodeDirectory has already been validated, validate against that.
211 // Otherwise, retrieve the component without validation (but cache it). Validation
212 // will go through the cache and validate all cached components.
214 CFDataRef
SecStaticCode::component(CodeDirectory::SpecialSlot slot
, OSStatus fail
/* = errSecCSSignatureFailed */)
216 assert(slot
<= cdSlotMax
);
218 CFRef
<CFDataRef
> &cache
= mCache
[slot
];
220 if (CFRef
<CFDataRef
> data
= mRep
->component(slot
)) {
221 if (validated()) // if the directory has been validated...
222 if (!codeDirectory()->validateSlot(CFDataGetBytePtr(data
), // ... and it's no good
223 CFDataGetLength(data
), -slot
))
224 MacOSError::throwMe(fail
); // ... then bail
225 cache
= data
; // it's okay, cache it
226 } else { // absent, mark so
227 if (validated()) // if directory has been validated...
228 if (codeDirectory()->slotIsPresent(-slot
)) // ... and the slot is NOT missing
229 MacOSError::throwMe(fail
); // was supposed to be there
230 cache
= CFDataRef(kCFNull
); // white lie
233 return (cache
== CFDataRef(kCFNull
)) ? NULL
: cache
.get();
238 // Get the CodeDirectory.
239 // Throws (if check==true) or returns NULL (check==false) if there is none.
240 // Always throws if the CodeDirectory exists but is invalid.
241 // NEVER validates against the signature.
243 const CodeDirectory
*SecStaticCode::codeDirectory(bool check
/* = true */)
246 if (mDir
.take(mRep
->codeDirectory())) {
247 const CodeDirectory
*dir
= reinterpret_cast<const CodeDirectory
*>(CFDataGetBytePtr(mDir
));
248 dir
->checkIntegrity();
252 return reinterpret_cast<const CodeDirectory
*>(CFDataGetBytePtr(mDir
));
254 MacOSError::throwMe(errSecCSUnsigned
);
260 // Get the hash of the CodeDirectory.
261 // Returns NULL if there is none.
263 CFDataRef
SecStaticCode::cdHash()
266 if (const CodeDirectory
*cd
= codeDirectory(false)) {
268 hash(cd
, cd
->length());
271 mCDHash
.take(makeCFData(digest
, sizeof(digest
)));
272 CODESIGN_STATIC_CDHASH(this, digest
, sizeof(digest
));
280 // Return the CMS signature blob; NULL if none found.
282 CFDataRef
SecStaticCode::signature()
285 mSignature
.take(mRep
->signature());
288 MacOSError::throwMe(errSecCSUnsigned
);
293 // Verify the signature on the CodeDirectory.
294 // If this succeeds (doesn't throw), the CodeDirectory is statically trustworthy.
295 // Any outcome (successful or not) is cached for the lifetime of the StaticCode.
297 void SecStaticCode::validateDirectory()
299 // echo previous outcome, if any
302 // perform validation (or die trying)
303 CODESIGN_EVAL_STATIC_DIRECTORY(this);
304 mValidationExpired
= verifySignature();
305 component(cdInfoSlot
, errSecCSInfoPlistFailed
); // force load of Info Dictionary (if any)
306 CodeDirectory::SpecialSlot slot
= codeDirectory()->nSpecialSlots
;
307 if (slot
> cdSlotMax
) // might have more special slots than we know about...
308 slot
= cdSlotMax
; // ... but only process the ones we understand
309 for ( ; slot
>= 1; --slot
)
310 if (mCache
[slot
]) // if we already loaded that resource...
311 validateComponent(slot
); // ... then check it now
312 mValidated
= true; // we've done the deed...
313 mValidationResult
= noErr
; // ... and it was good
314 } catch (const CommonError
&err
) {
316 mValidationResult
= err
.osStatus();
319 secdebug("staticCode", "%p validation threw non-common exception", this);
321 mValidationResult
= errSecCSInternalError
;
325 if (mValidationResult
== noErr
) {
326 if (mValidationExpired
)
327 if ((apiFlags() & kSecCSConsiderExpiration
)
328 || (codeDirectory()->flags
& kSecCodeSignatureForceExpiration
))
329 MacOSError::throwMe(CSSMERR_TP_CERT_EXPIRED
);
331 MacOSError::throwMe(mValidationResult
);
336 // Get the (signed) signing date from the code signature.
337 // Sadly, we need to validate the signature to get the date (as a side benefit).
338 // This means that you can't get the signing time for invalidly signed code.
340 // We could run the decoder "almost to" verification to avoid this, but there seems
341 // little practical point to such a duplication of effort.
343 CFAbsoluteTime
SecStaticCode::signingTime()
351 // Verify the CMS signature on the CodeDirectory.
352 // This performs the cryptographic tango. It returns if the signature is valid,
353 // or throws if it is not. As a side effect, a successful return sets up the
354 // cached certificate chain for future use.
355 // Returns true if the signature is expired (the X.509 sense), false if it's not.
357 bool SecStaticCode::verifySignature()
359 // ad-hoc signed code is considered validly signed by definition
360 if (flag(kSecCodeSignatureAdhoc
)) {
361 CODESIGN_EVAL_STATIC_SIGNATURE_ADHOC(this);
365 DTRACK(CODESIGN_EVAL_STATIC_SIGNATURE
, this, (char*)this->mainExecutablePath().c_str());
367 // decode CMS and extract SecTrust for verification
368 CFRef
<CMSDecoderRef
> cms
;
369 MacOSError::check(CMSDecoderCreate(&cms
.aref())); // create decoder
370 CFDataRef sig
= this->signature();
371 MacOSError::check(CMSDecoderUpdateMessage(cms
, CFDataGetBytePtr(sig
), CFDataGetLength(sig
)));
372 this->codeDirectory(); // load CodeDirectory (sets mDir)
373 MacOSError::check(CMSDecoderSetDetachedContent(cms
, mDir
));
374 MacOSError::check(CMSDecoderFinalizeMessage(cms
));
375 MacOSError::check(CMSDecoderSetSearchKeychain(cms
, cfEmptyArray()));
376 CMSSignerStatus status
;
377 MacOSError::check(CMSDecoderCopySignerStatus(cms
, 0, verificationPolicy(),
378 false, &status
, &mTrust
.aref(), NULL
));
379 if (status
!= kCMSSignerValid
)
380 MacOSError::throwMe(errSecCSSignatureFailed
);
382 // get signing date (we've got the decoder handle right here)
383 mSigningTime
= 0; // "not present" marker (nobody could code sign on Jan 1, 2001 :-)
384 SecCmsMessageRef cmsg
;
385 MacOSError::check(CMSDecoderGetCmsMessage(cms
, &cmsg
));
386 SecCmsSignedDataRef signedData
= NULL
;
387 int numContentInfos
= SecCmsMessageContentLevelCount(cmsg
);
388 for(int dex
= 0; !signedData
&& dex
< numContentInfos
; dex
++) {
389 SecCmsContentInfoRef ci
= SecCmsMessageContentLevel(cmsg
, dex
);
390 SECOidTag tag
= SecCmsContentInfoGetContentTypeTag(ci
);
392 case SEC_OID_PKCS7_SIGNED_DATA
:
393 if (SecCmsSignedDataRef signedData
= SecCmsSignedDataRef(SecCmsContentInfoGetContent(ci
)))
394 if (SecCmsSignerInfoRef signerInfo
= SecCmsSignedDataGetSignerInfo(signedData
, 0))
395 SecCmsSignerInfoGetSigningTime(signerInfo
, &mSigningTime
);
402 // set up the environment for SecTrust
403 MacOSError::check(SecTrustSetAnchorCertificates(mTrust
, cfEmptyArray())); // no anchors
404 CSSM_APPLE_TP_ACTION_DATA actionData
= {
405 CSSM_APPLE_TP_ACTION_VERSION
, // version of data structure
406 CSSM_TP_ACTION_IMPLICIT_ANCHORS
// action flags
409 for (;;) { // at most twice
410 MacOSError::check(SecTrustSetParameters(mTrust
,
411 CSSM_TP_ACTION_DEFAULT
, CFTempData(&actionData
, sizeof(actionData
))));
413 // evaluate trust and extract results
414 SecTrustResultType trustResult
;
415 MacOSError::check(SecTrustEvaluate(mTrust
, &trustResult
));
416 MacOSError::check(SecTrustGetResult(mTrust
, &trustResult
, &mCertChain
.aref(), &mEvalDetails
));
417 CODESIGN_EVAL_STATIC_SIGNATURE_RESULT(this, trustResult
, mCertChain
? CFArrayGetCount(mCertChain
) : 0);
418 switch (trustResult
) {
419 case kSecTrustResultProceed
:
420 case kSecTrustResultConfirm
:
421 case kSecTrustResultUnspecified
:
423 case kSecTrustResultDeny
:
424 MacOSError::throwMe(CSSMERR_APPLETP_TRUST_SETTING_DENY
); // user reject
425 case kSecTrustResultInvalid
:
426 assert(false); // should never happen
427 MacOSError::throwMe(CSSMERR_TP_NOT_TRUSTED
);
428 case kSecTrustResultRecoverableTrustFailure
:
429 case kSecTrustResultFatalTrustFailure
:
430 case kSecTrustResultOtherError
:
433 MacOSError::check(SecTrustGetCssmResultCode(mTrust
, &result
));
434 if (((result
== CSSMERR_TP_CERT_EXPIRED
) || (result
== CSSMERR_TP_CERT_NOT_VALID_YET
))
435 && !(actionData
.ActionFlags
& CSSM_TP_ACTION_ALLOW_EXPIRED
)) {
436 CODESIGN_EVAL_STATIC_SIGNATURE_EXPIRED(this);
437 actionData
.ActionFlags
|= CSSM_TP_ACTION_ALLOW_EXPIRED
; // (this also allows postdated certs)
438 continue; // retry validation
440 MacOSError::throwMe(result
);
443 return actionData
.ActionFlags
& CSSM_TP_ACTION_ALLOW_EXPIRED
;
449 // Return the TP policy used for signature verification.
450 // This policy object is cached and reused.
452 SecPolicyRef
SecStaticCode::verificationPolicy()
455 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3
,
456 &CSSMOID_APPLE_TP_CODE_SIGNING
, &mPolicy
.aref()));
462 // Validate a particular sealed, cached resource against its (special) CodeDirectory slot.
463 // The resource must already have been placed in the cache.
464 // This does NOT perform basic validation.
466 void SecStaticCode::validateComponent(CodeDirectory::SpecialSlot slot
, OSStatus fail
/* = errSecCSSignatureFailed */)
468 assert(slot
<= cdSlotMax
);
469 CFDataRef data
= mCache
[slot
];
470 assert(data
); // must be cached
471 if (data
== CFDataRef(kCFNull
)) {
472 if (codeDirectory()->slotIsPresent(-slot
)) // was supposed to be there...
473 MacOSError::throwMe(fail
); // ... and is missing
475 if (!codeDirectory()->validateSlot(CFDataGetBytePtr(data
), CFDataGetLength(data
), -slot
))
476 MacOSError::throwMe(fail
);
482 // Perform static validation of the main executable.
483 // This reads the main executable from disk and validates it against the
484 // CodeDirectory code slot array.
485 // Note that this is NOT an in-memory validation, and is thus potentially
486 // subject to timing attacks.
488 void SecStaticCode::validateExecutable()
490 DTRACK(CODESIGN_EVAL_STATIC_EXECUTABLE
, this,
491 (char*)this->mainExecutablePath().c_str(), codeDirectory()->nCodeSlots
);
492 const CodeDirectory
*cd
= this->codeDirectory();
494 MacOSError::throwMe(errSecCSUnsigned
);
495 AutoFileDesc
fd(mainExecutablePath(), O_RDONLY
);
496 fd
.fcntl(F_NOCACHE
, true); // turn off page caching (one-pass)
497 if (Universal
*fat
= mRep
->mainExecutableImage())
498 fd
.seek(fat
->archOffset());
499 size_t pageSize
= cd
->pageSize
? (1 << cd
->pageSize
) : 0;
500 size_t remaining
= cd
->codeLimit
;
501 for (size_t slot
= 0; slot
< cd
->nCodeSlots
; ++slot
) {
502 size_t size
= min(remaining
, pageSize
);
503 if (!cd
->validateSlot(fd
, size
, slot
)) {
504 CODESIGN_EVAL_STATIC_EXECUTABLE_FAIL(this, slot
);
505 mExecutableValidated
= true; // we tried
506 mExecutableValid
= false; // it failed
507 MacOSError::throwMe(errSecCSSignatureFailed
);
511 mExecutableValidated
= true; // we tried
512 mExecutableValid
= true; // it worked
517 // Perform static validation of sealed resources.
519 // This performs a whole-code static resource scan and effectively
520 // computes a concordance between what's on disk and what's in the ResourceDirectory.
521 // Any unsanctioned difference causes an error.
523 void SecStaticCode::validateResources()
526 CFDictionaryRef sealedResources
= resourceDictionary();
527 if (this->resourceBase()) // disk has resources
529 /* go to work below */;
531 MacOSError::throwMe(errSecCSResourcesNotFound
);
532 else // disk has no resources
534 MacOSError::throwMe(errSecCSResourcesNotFound
);
536 return; // no resources, not sealed - fine (no work)
538 // found resources, and they are sealed
539 CFDictionaryRef rules
= cfget
<CFDictionaryRef
>(sealedResources
, "rules");
540 CFDictionaryRef files
= cfget
<CFDictionaryRef
>(sealedResources
, "files");
541 DTRACK(CODESIGN_EVAL_STATIC_RESOURCES
, this,
542 (char*)this->mainExecutablePath().c_str(), int(CFDictionaryGetCount(files
)));
544 // make a shallow copy of the ResourceDirectory so we can "check off" what we find
545 CFRef
<CFMutableDictionaryRef
> resourceMap
= makeCFMutableDictionary(files
);
547 // scan through the resources on disk, checking each against the resourceDirectory
548 CollectingContext
ctx(*this); // collect all failures in here
549 ResourceBuilder
resources(cfString(this->resourceBase()), rules
, codeDirectory()->hashType
);
550 mRep
->adjustResources(resources
);
552 ResourceBuilder::Rule
*rule
;
554 while (resources
.next(path
, rule
)) {
555 validateResource(path
, ctx
);
556 CFDictionaryRemoveValue(resourceMap
, CFTempString(path
));
559 if (CFDictionaryGetCount(resourceMap
) > 0) {
560 secdebug("staticCode", "%p sealed resource(s) not found in code", this);
561 CFDictionaryApplyFunction(resourceMap
, SecStaticCode::checkOptionalResource
, &ctx
);
564 // now check for any errors found in the reporting context
570 void SecStaticCode::checkOptionalResource(CFTypeRef key
, CFTypeRef value
, void *context
)
572 CollectingContext
*ctx
= static_cast<CollectingContext
*>(context
);
573 ResourceSeal
seal(value
);
574 if (!seal
.optional())
575 if (key
&& CFGetTypeID(key
) == CFStringGetTypeID()) {
576 ctx
->reportProblem(errSecCSBadResource
, kSecCFErrorResourceMissing
,
577 CFTempURL(CFStringRef(key
), false, ctx
->code
.resourceBase()));
579 ctx
->reportProblem(errSecCSBadResource
, kSecCFErrorResourceSeal
, key
);
584 // Load, validate, cache, and return CFDictionary forms of sealed resources.
586 CFDictionaryRef
SecStaticCode::infoDictionary()
589 mInfoDict
.take(getDictionary(cdInfoSlot
, errSecCSInfoPlistFailed
));
590 secdebug("staticCode", "%p loaded InfoDict %p", this, mInfoDict
.get());
595 CFDictionaryRef
SecStaticCode::entitlements()
597 if (!mEntitlements
) {
599 if (CFDataRef entitlementData
= component(cdEntitlementSlot
)) {
600 validateComponent(cdEntitlementSlot
);
601 const EntitlementBlob
*blob
= reinterpret_cast<const EntitlementBlob
*>(CFDataGetBytePtr(entitlementData
));
602 if (blob
->validateBlob()) {
603 mEntitlements
.take(blob
->entitlements());
604 secdebug("staticCode", "%p loaded Entitlements %p", this, mEntitlements
.get());
606 // we do not consider a different blob type to be an error. We think it's a new format we don't understand
609 return mEntitlements
;
612 CFDictionaryRef
SecStaticCode::resourceDictionary()
614 if (mResourceDict
) // cached
615 return mResourceDict
;
616 if (CFRef
<CFDictionaryRef
> dict
= getDictionary(cdResourceDirSlot
, errSecCSSignatureFailed
))
617 if (cfscan(dict
, "{rules=%Dn,files=%Dn}")) {
618 secdebug("staticCode", "%p loaded ResourceDict %p",
619 this, mResourceDict
.get());
620 return mResourceDict
= dict
;
628 // Load and cache the resource directory base.
629 // Note that the base is optional for each DiskRep.
631 CFURLRef
SecStaticCode::resourceBase()
633 if (!mGotResourceBase
) {
634 string base
= mRep
->resourcesRootPath();
636 mResourceBase
.take(makeCFURL(base
, true));
637 mGotResourceBase
= true;
639 return mResourceBase
;
644 // Load a component, validate it, convert it to a CFDictionary, and return that.
645 // This will force load and validation, which means that it will perform basic
646 // validation if it hasn't been done yet.
648 CFDictionaryRef
SecStaticCode::getDictionary(CodeDirectory::SpecialSlot slot
, OSStatus fail
/* = errSecCSSignatureFailed */)
651 if (CFDataRef infoData
= component(slot
, fail
)) {
652 validateComponent(slot
, fail
);
653 if (CFDictionaryRef dict
= makeCFDictionaryFrom(infoData
))
656 MacOSError::throwMe(errSecCSBadDictionaryFormat
);
663 // Load, validate, and return a sealed resource.
664 // The resource data (loaded in to memory as a blob) is returned and becomes
665 // the responsibility of the caller; it is NOT cached by SecStaticCode.
667 // A resource that is not sealed will not be returned, and an error will be thrown.
668 // A missing resource will cause an error unless it's marked optional in the Directory.
669 // Under no circumstances will a corrupt resource be returned.
670 // NULL will only be returned for a resource that is neither sealed nor present
671 // (or that is sealed, absent, and marked optional).
672 // If the ResourceDictionary itself is not sealed, this function will always fail.
674 // There is currently no interface for partial retrieval of the resource data.
675 // (Since the ResourceDirectory does not currently support segmentation, all the
676 // data would have to be read anyway, but it could be read into a reusable buffer.)
678 CFDataRef
SecStaticCode::resource(string path
, ValidationContext
&ctx
)
680 if (CFDictionaryRef rdict
= resourceDictionary()) {
681 if (CFTypeRef file
= cfget(rdict
, "files.%s", path
.c_str())) {
682 ResourceSeal seal
= file
;
683 if (!resourceBase()) // no resources in DiskRep
684 MacOSError::throwMe(errSecCSResourcesNotFound
);
685 CFRef
<CFURLRef
> fullpath
= makeCFURL(path
, false, resourceBase());
686 if (CFRef
<CFDataRef
> data
= cfLoadFile(fullpath
)) {
687 MakeHash
<CodeDirectory
> hasher(this->codeDirectory());
688 hasher
->update(CFDataGetBytePtr(data
), CFDataGetLength(data
));
689 if (hasher
->verify(seal
.hash()))
690 return data
.yield(); // good
692 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceAltered
, fullpath
); // altered
694 if (!seal
.optional())
695 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceMissing
, fullpath
); // was sealed but is now missing
697 return NULL
; // validly missing
700 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceAdded
, CFTempURL(path
, false, resourceBase()));
703 MacOSError::throwMe(errSecCSResourcesNotSealed
);
706 CFDataRef
SecStaticCode::resource(string path
)
708 ValidationContext ctx
;
709 return resource(path
, ctx
);
713 void SecStaticCode::validateResource(string path
, ValidationContext
&ctx
)
715 if (CFDictionaryRef rdict
= resourceDictionary()) {
716 if (CFTypeRef file
= cfget(rdict
, "files.%s", path
.c_str())) {
717 ResourceSeal seal
= file
;
718 if (!resourceBase()) // no resources in DiskRep
719 MacOSError::throwMe(errSecCSResourcesNotFound
);
720 CFRef
<CFURLRef
> fullpath
= makeCFURL(path
, false, resourceBase());
721 AutoFileDesc
fd(cfString(fullpath
), O_RDONLY
, FileDesc::modeMissingOk
); // open optional filee
723 MakeHash
<CodeDirectory
> hasher(this->codeDirectory());
724 hashFileData(fd
, hasher
.get());
725 if (hasher
->verify(seal
.hash()))
726 return; // verify good
728 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceAltered
, fullpath
); // altered
730 if (!seal
.optional())
731 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceMissing
, fullpath
); // was sealed but is now missing
733 return; // validly missing
736 ctx
.reportProblem(errSecCSBadResource
, kSecCFErrorResourceAdded
, CFTempURL(path
, false, resourceBase()));
738 MacOSError::throwMe(errSecCSResourcesNotSealed
);
743 // Test a CodeDirectory flag.
744 // Returns false if there is no CodeDirectory.
745 // May throw if the CodeDirectory is present but somehow invalid.
747 bool SecStaticCode::flag(uint32_t tested
)
749 if (const CodeDirectory
*cd
= this->codeDirectory(false))
750 return cd
->flags
& tested
;
757 // Retrieve the full SuperBlob containing all internal requirements.
759 const Requirements
*SecStaticCode::internalRequirements()
761 if (CFDataRef req
= component(cdRequirementsSlot
))
762 return (const Requirements
*)CFDataGetBytePtr(req
);
769 // Retrieve a particular internal requirement by type.
771 const Requirement
*SecStaticCode::internalRequirement(SecRequirementType type
)
773 if (const Requirements
*reqs
= internalRequirements())
774 return reqs
->find
<Requirement
>(type
);
781 // Return the Designated Requirement. This can be either explicit in the
782 // Internal Requirements resource, or implicitly generated.
784 const Requirement
*SecStaticCode::designatedRequirement()
786 if (const Requirement
*req
= internalRequirement(kSecDesignatedRequirementType
)) {
787 return req
; // explicit in signing data
790 mDesignatedReq
= defaultDesignatedRequirement();
791 return mDesignatedReq
;
797 // Generate the default (implicit) Designated Requirement for this StaticCode.
798 // This is a heuristic of sorts, and may change over time (for the better, we hope).
800 // The current logic is this:
801 // * If the code is ad-hoc signed, use the CodeDirectory hash directory.
802 // * Otherwise, use the form anchor (anchor) and identifier (CodeDirectory identifier).
803 // ** If the root CA is Apple's, we use the "anchor apple" construct. Otherwise,
804 // we default to the leaf (directly signing) certificate.
806 const Requirement
*SecStaticCode::defaultDesignatedRequirement()
808 validateDirectory(); // need the cert chain
809 Requirement::Maker maker
;
811 // if this is an ad-hoc (unsigned) object, return a cdhash requirement
812 if (flag(kSecCodeSignatureAdhoc
)) {
814 hash(codeDirectory(), codeDirectory()->length());
817 maker
.cdhash(digest
);
819 // always require the identifier
821 maker
.ident(codeDirectory()->identifier());
823 SHA1::Digest anchorHash
;
824 hashOfCertificate(cert(Requirement::anchorCert
), anchorHash
);
825 if (!memcmp(anchorHash
, Requirement::appleAnchorHash(), SHA1::digestLength
)
826 #if defined(TEST_APPLE_ANCHOR)
827 || !memcmp(anchorHash
, Requirement::testAppleAnchorHash(), SHA1::digestLength
)
830 defaultDesignatedAppleAnchor(maker
);
832 defaultDesignatedNonAppleAnchor(maker
);
838 static const uint8_t adcSdkMarker
[] = { APPLE_EXTENSION_OID
, 2, 1 }; // iOS intermediate marker
839 static const CSSM_DATA adcSdkMarkerOID
= { sizeof(adcSdkMarker
), (uint8_t *)adcSdkMarker
};
841 static const uint8_t caspianSdkMarker
[] = { APPLE_EXTENSION_OID
, 2, 6 }; // Caspian intermediate marker
842 static const CSSM_DATA caspianSdkMarkerOID
= { sizeof(caspianSdkMarker
), (uint8_t *)caspianSdkMarker
};
843 static const uint8_t caspianLeafMarker
[] = { APPLE_EXTENSION_OID
, 1, 13 }; // Caspian leaf certificate marker
844 static const CSSM_DATA caspianLeafMarkerOID
= { sizeof(caspianLeafMarker
), (uint8_t *)caspianLeafMarker
};
846 void SecStaticCode::defaultDesignatedAppleAnchor(Requirement::Maker
&maker
)
848 if (isAppleSDKSignature()) {
849 // get the Common Name DN element for the leaf
850 CFRef
<CFStringRef
> leafCN
;
851 MacOSError::check(SecCertificateCopySubjectComponent(cert(Requirement::leafCert
),
852 &CSSMOID_CommonName
, &leafCN
.aref()));
854 // apple anchor generic and ...
856 maker
.anchorGeneric(); // apple generic anchor and...
857 // ... leaf[subject.CN] = <leaf's subject> and ...
859 maker
.put(opCertField
); // certificate
860 maker
.put(0); // leaf
861 maker
.put("subject.CN"); // [subject.CN]
862 maker
.put(matchEqual
); // =
863 maker
.putData(leafCN
); // <leaf CN>
864 // ... cert 1[field.<marker>] exists
865 maker
.put(opCertGeneric
); // certificate
867 maker
.putData(adcSdkMarkerOID
.Data
, adcSdkMarkerOID
.Length
); // [field.<marker>]
868 maker
.put(matchExists
); // exists
872 if (isAppleCaspianSignature()) {
873 // get the Organizational Unit DN element for the leaf (it contains the TEAMID)
874 CFRef
<CFStringRef
> teamID
;
875 MacOSError::check(SecCertificateCopySubjectComponent(cert(Requirement::leafCert
),
876 &CSSMOID_OrganizationalUnitName
, &teamID
.aref()));
878 // apple anchor generic and ...
880 maker
.anchorGeneric(); // apple generic anchor and...
882 // ... certificate 1[intermediate marker oid] exists and ...
884 maker
.put(opCertGeneric
); // certificate
886 maker
.putData(caspianSdkMarker
, sizeof(caspianSdkMarker
));
887 maker
.put(matchExists
); // exists
889 // ... certificate leaf[Caspian cert oid] exists and ...
891 maker
.put(opCertGeneric
); // certificate
892 maker
.put(0); // leaf
893 maker
.putData(caspianLeafMarker
, sizeof(caspianLeafMarker
));
894 maker
.put(matchExists
); // exists
896 // ... leaf[subject.OU] = <leaf's subject>
897 maker
.put(opCertField
); // certificate
898 maker
.put(0); // leaf
899 maker
.put("subject.OU"); // [subject.OU]
900 maker
.put(matchEqual
); // =
901 maker
.putData(teamID
); // TEAMID
905 // otherwise, claim this program for Apple Proper
909 bool SecStaticCode::isAppleSDKSignature()
911 if (CFArrayRef certChain
= certificates()) // got cert chain
912 if (CFArrayGetCount(certChain
) == 3) // leaf, one intermediate, anchor
913 if (SecCertificateRef intermediate
= cert(1)) // get intermediate
914 if (certificateHasField(intermediate
, CssmOid::overlay(adcSdkMarkerOID
)))
919 bool SecStaticCode::isAppleCaspianSignature()
921 if (CFArrayRef certChain
= certificates()) // got cert chain
922 if (CFArrayGetCount(certChain
) == 3) // leaf, one intermediate, anchor
923 if (SecCertificateRef intermediate
= cert(1)) // get intermediate
924 if (certificateHasField(intermediate
, CssmOid::overlay(caspianSdkMarkerOID
)))
929 void SecStaticCode::defaultDesignatedNonAppleAnchor(Requirement::Maker
&maker
)
931 // get the Organization DN element for the leaf
932 CFRef
<CFStringRef
> leafOrganization
;
933 MacOSError::check(SecCertificateCopySubjectComponent(cert(Requirement::leafCert
),
934 &CSSMOID_OrganizationName
, &leafOrganization
.aref()));
936 // now step up the cert chain looking for the first cert with a different one
937 int slot
= Requirement::leafCert
; // start at leaf
938 if (leafOrganization
) {
939 while (SecCertificateRef ca
= cert(slot
+1)) { // NULL if you over-run the anchor slot
940 CFRef
<CFStringRef
> caOrganization
;
941 MacOSError::check(SecCertificateCopySubjectComponent(ca
, &CSSMOID_OrganizationName
, &caOrganization
.aref()));
942 if (!caOrganization
|| CFStringCompare(leafOrganization
, caOrganization
, 0) != kCFCompareEqualTo
)
946 if (slot
== CFArrayGetCount(mCertChain
) - 1) // went all the way to the anchor...
947 slot
= Requirement::anchorCert
; // ... so say that
950 // nail the last cert with the leaf's Organization value
951 SHA1::Digest authorityHash
;
952 hashOfCertificate(cert(slot
), authorityHash
);
953 maker
.anchor(slot
, authorityHash
);
958 // Validate a SecStaticCode against the internal requirement of a particular type.
960 void SecStaticCode::validateRequirements(SecRequirementType type
, SecStaticCode
*target
,
961 OSStatus nullError
/* = noErr */)
963 DTRACK(CODESIGN_EVAL_STATIC_INTREQ
, this, type
, target
, nullError
);
964 if (const Requirement
*req
= internalRequirement(type
))
965 target
->validateRequirement(req
, nullError
? nullError
: errSecCSReqFailed
);
967 MacOSError::throwMe(nullError
);
974 // Validate this StaticCode against an external Requirement
976 bool SecStaticCode::satisfiesRequirement(const Requirement
*req
, OSStatus failure
)
980 return req
->validates(Requirement::Context(mCertChain
, infoDictionary(), entitlements(), codeDirectory()), failure
);
983 void SecStaticCode::validateRequirement(const Requirement
*req
, OSStatus failure
)
985 if (!this->satisfiesRequirement(req
, failure
))
986 MacOSError::throwMe(failure
);
991 // Retrieve one certificate from the cert chain.
992 // Positive and negative indices can be used:
993 // [ leaf, intermed-1, ..., intermed-n, anchor ]
995 // Returns NULL if unavailable for any reason.
997 SecCertificateRef
SecStaticCode::cert(int ix
)
999 validateDirectory(); // need cert chain
1001 CFIndex length
= CFArrayGetCount(mCertChain
);
1004 if (ix
>= 0 && ix
< length
)
1005 return SecCertificateRef(CFArrayGetValueAtIndex(mCertChain
, ix
));
1010 CFArrayRef
SecStaticCode::certificates()
1012 validateDirectory(); // need cert chain
1018 // Gather (mostly) API-official information about this StaticCode.
1020 // This method lives in the twilight between the API and internal layers,
1021 // since it generates API objects (Sec*Refs) for return.
1023 CFDictionaryRef
SecStaticCode::signingInformation(SecCSFlags flags
)
1026 // Start with the pieces that we return even for unsigned code.
1027 // This makes Sec[Static]CodeRefs useful as API-level replacements
1028 // of our internal OSXCode objects.
1030 CFRef
<CFMutableDictionaryRef
> dict
= makeCFMutableDictionary(1,
1031 kSecCodeInfoMainExecutable
, CFTempURL(this->mainExecutablePath()).get()
1035 // If we're not signed, this is all you get
1037 if (!this->isSigned())
1038 return dict
.yield();
1041 // Add the generic attributes that we always include
1043 CFDictionaryAddValue(dict
, kSecCodeInfoIdentifier
, CFTempString(this->identifier()));
1044 CFDictionaryAddValue(dict
, kSecCodeInfoFormat
, CFTempString(this->format()));
1045 CFDictionaryAddValue(dict
, kSecCodeInfoSource
, CFTempString(this->signatureSource()));
1046 if (CFDictionaryRef info
= this->infoDictionary())
1047 CFDictionaryAddValue(dict
, kSecCodeInfoPList
, info
);
1048 CFDictionaryAddValue(dict
, kSecCodeInfoUnique
, this->cdHash());
1049 CFDictionaryAddValue(dict
, kSecCodeInfoDigestAlgorithm
, CFTempNumber(this->codeDirectory(false)->hashType
));
1052 // kSecCSSigningInformation adds information about signing certificates and chains
1054 if (flags
& kSecCSSigningInformation
) {
1055 if (CFArrayRef certs
= this->certificates())
1056 CFDictionaryAddValue(dict
, kSecCodeInfoCertificates
, certs
);
1057 if (CFDataRef sig
= this->signature())
1058 CFDictionaryAddValue(dict
, kSecCodeInfoCMS
, sig
);
1060 CFDictionaryAddValue(dict
, kSecCodeInfoTrust
, mTrust
);
1061 if (CFAbsoluteTime time
= this->signingTime())
1062 if (CFRef
<CFDateRef
> date
= CFDateCreate(NULL
, time
))
1063 CFDictionaryAddValue(dict
, kSecCodeInfoTime
, date
);
1067 // kSecCSRequirementInformation adds information on requirements
1069 if (flags
& kSecCSRequirementInformation
) {
1070 if (const Requirements
*reqs
= this->internalRequirements()) {
1071 CFDictionaryAddValue(dict
, kSecCodeInfoRequirements
,
1072 CFTempString(Dumper::dump(reqs
)));
1073 CFDictionaryAddValue(dict
, kSecCodeInfoRequirementData
, CFTempData(*reqs
));
1076 const Requirement
*dreq
= this->designatedRequirement();
1077 CFRef
<SecRequirementRef
> dreqRef
= (new SecRequirement(dreq
))->handle();
1078 CFDictionaryAddValue(dict
, kSecCodeInfoDesignatedRequirement
, dreqRef
);
1079 if (this->internalRequirement(kSecDesignatedRequirementType
)) { // explicit
1080 CFRef
<SecRequirementRef
> ddreqRef
= (new SecRequirement(this->defaultDesignatedRequirement(), true))->handle();
1081 CFDictionaryAddValue(dict
, kSecCodeInfoImplicitDesignatedRequirement
, ddreqRef
);
1082 } else { // implicit
1083 CFDictionaryAddValue(dict
, kSecCodeInfoImplicitDesignatedRequirement
, dreqRef
);
1086 if (CFDataRef ent
= this->component(cdEntitlementSlot
))
1087 CFDictionaryAddValue(dict
, kSecCodeInfoEntitlements
, ent
);
1091 // kSecCSInternalInformation adds internal information meant to be for Apple internal
1092 // use (SPI), and not guaranteed to be stable. Primarily, this is data we want
1093 // to reliably transmit through the API wall so that code outside the Security.framework
1094 // can use it without having to play nasty tricks to get it.
1096 if (flags
& kSecCSInternalInformation
) {
1098 CFDictionaryAddValue(dict
, kSecCodeInfoCodeDirectory
, mDir
);
1099 CFDictionaryAddValue(dict
, kSecCodeInfoCodeOffset
, CFTempNumber(mRep
->signingBase()));
1100 if (CFDictionaryRef resources
= resourceDictionary())
1101 CFDictionaryAddValue(dict
, kSecCodeInfoResourceDirectory
, resources
);
1106 // kSecCSContentInformation adds more information about the physical layout
1107 // of the signed code. This is (only) useful for packaging or patching-oriented
1110 if (flags
& kSecCSContentInformation
)
1111 if (CFRef
<CFArrayRef
> files
= mRep
->modifiedFiles())
1112 CFDictionaryAddValue(dict
, kSecCodeInfoChangedFiles
, files
);
1114 return dict
.yield();
1119 // Resource validation contexts.
1120 // The default context simply throws a CSError, rudely terminating the operation.
1122 SecStaticCode::ValidationContext::~ValidationContext()
1125 void SecStaticCode::ValidationContext::reportProblem(OSStatus rc
, CFStringRef type
, CFTypeRef value
)
1127 CSError::throwMe(rc
, type
, value
);
1130 void SecStaticCode::CollectingContext::reportProblem(OSStatus rc
, CFStringRef type
, CFTypeRef value
)
1132 if (mStatus
== noErr
)
1133 mStatus
= rc
; // record first failure for eventual error return
1136 mCollection
.take(makeCFMutableDictionary());
1137 CFMutableArrayRef element
= CFMutableArrayRef(CFDictionaryGetValue(mCollection
, type
));
1139 element
= makeCFMutableArray(0);
1142 CFDictionaryAddValue(mCollection
, type
, element
);
1145 CFArrayAppendValue(element
, value
);
1149 void SecStaticCode::CollectingContext::throwMe()
1151 assert(mStatus
!= noErr
);
1152 throw CSError(mStatus
, mCollection
.yield());
1157 // SecStaticCode::AllArchitectures produces SecStaticCode objects separately
1158 // for each architecture represented by a base object.
1160 // Performance note: This is a simple, straight-forward implementation that
1161 // does not heroically try to share resources between the code objects produced.
1162 // In practice, this means we'll re-open files and re-read resource files.
1163 // In exchange, we enter all the code paths in the normal way, and do not have
1164 // special sharing paths to worry about.
1165 // If a performance tool brings you here because you have *proof* of a performance
1166 // problem, consider digging up MachO and Universal (for sharing file descriptors),
1167 // and SecStaticCode (for sharing resource iterators). That ought to cover most of
1168 // the big chunks. If you're just offended by the simplicity of this implementation,
1169 // go play somewhere else.
1171 SecStaticCode::AllArchitectures::AllArchitectures(SecStaticCode
*code
)
1174 if (Universal
*fat
= code
->diskRep()->mainExecutableImage()) {
1175 fat
->architectures(mArchitectures
);
1176 mCurrent
= mArchitectures
.begin();
1179 mState
= firstNonFat
;
1183 SecStaticCode
*SecStaticCode::AllArchitectures::operator () ()
1191 if (mCurrent
== mArchitectures
.end())
1193 Architecture arch
= *mCurrent
++;
1194 if (arch
== mBase
->diskRep()->mainExecutableImage()->bestNativeArch()) {
1197 DiskRep::Context ctx
;
1199 return new SecStaticCode(DiskRep::bestGuess(mBase
->mainExecutablePath(), &ctx
));
1208 } // end namespace CodeSigning
1209 } // end namespace Security