]>
git.saurik.com Git - apple/libsecurity_codesigning.git/blob - lib/requirement.cpp
f4b294ab74336f647329765f29fcc1e8594909aa
2 * Copyright (c) 2006-2007 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // requirement - Code Requirement Blob description
27 #include "requirement.h"
28 #include "reqinterp.h"
29 #include <security_utilities/errors.h>
30 #include <security_utilities/unix++.h>
31 #include <security_utilities/logging.h>
32 #include <security_utilities/cfutilities.h>
33 #include <security_utilities/hashing.h>
36 #include <security_codesigning/reqdumper.h>
40 namespace CodeSigning
{
44 // The (SHA-1) hash of the canonical Apple certificate root anchor
46 static const SHA1::Digest gAppleAnchorHash
=
47 { 0x61, 0x1e, 0x5b, 0x66, 0x2c, 0x59, 0x3a, 0x08, 0xff, 0x58,
48 0xd1, 0x4a, 0xe2, 0x24, 0x52, 0xd1, 0x98, 0xdf, 0x6c, 0x60 };
52 // Canonical names for requirement types
54 const char *const Requirement::typeNames
[] = {
64 // validate a requirement against a code context
66 void Requirement::validate(const Requirement::Context
&ctx
, OSStatus failure
/* = errSecCSReqFailed */) const
70 if (!Requirement::Interpreter(this, &ctx
).evaluate())
71 MacOSError::throwMe(failure
);
74 secdebug("reqval", "unrecognized requirement kind %d", kind());
75 MacOSError::throwMe(errSecCSReqUnsupported
);
81 // Retrieve one certificate from the cert chain.
82 // Positive and negative indices can be used:
83 // [ leaf, intermed-1, ..., intermed-n, anchor ]
85 // Returns NULL if unavailable for any reason.
87 SecCertificateRef
Requirement::Context::cert(int ix
) const
92 if (CFTypeRef element
= CFArrayGetValueAtIndex(certs
, ix
))
93 return SecCertificateRef(element
);
98 unsigned int Requirement::Context::certCount() const
101 return CFArrayGetCount(certs
);
108 // Return the hash of the canonical Apple certificate root (anchor).
109 // In a special test mode, also return an alternate root hash for testing.
111 const SHA1::Digest
&Requirement::appleAnchorHash()
113 return gAppleAnchorHash
;
116 #if defined(TEST_APPLE_ANCHOR)
118 const char Requirement::testAppleAnchorEnv
[] = "TEST_APPLE_ANCHOR";
120 const SHA1::Digest
&Requirement::testAppleAnchorHash()
122 static bool tried
= false;
123 static SHA1::Digest testHash
;
125 // see if we have one configured
126 if (const char *path
= getenv(testAppleAnchorEnv
))
128 UnixPlusPlus::FileDesc
fd(path
);
129 char buffer
[2048]; // arbitrary limit
130 size_t size
= fd
.read(buffer
, sizeof(buffer
));
133 hash
.finish(testHash
);
134 Syslog::alert("ACCEPTING TEST AUTHORITY %s FOR APPLE CODE IDENTITY", path
);
138 return testHash
; // will be zeroes (no match) if not configured
141 #endif //TEST_APPLE_ANCHOR
146 // Debug dump support
150 void Requirement::dump() const
152 Debug::dump("%s\n", Dumper::dump(this).c_str());