2 * Copyright (c) 2006-2013 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // csutilities - miscellaneous utilities for the code signing implementation
27 #include "csutilities.h"
28 #include <Security/SecCertificatePriv.h>
29 #include <security_codesigning/requirement.h>
30 #include <security_utilities/hashing.h>
31 #include <security_utilities/debugging.h>
32 #include <security_utilities/errors.h>
35 namespace CodeSigning
{
39 // The (SHA-1) hash of the canonical Apple certificate root anchor
41 static const SHA1::Digest gAppleAnchorHash
=
42 { 0x61, 0x1e, 0x5b, 0x66, 0x2c, 0x59, 0x3a, 0x08, 0xff, 0x58,
43 0xd1, 0x4a, 0xe2, 0x24, 0x52, 0xd1, 0x98, 0xdf, 0x6c, 0x60 };
48 // Test for the canonical Apple CA certificate
50 bool isAppleCA(SecCertificateRef cert
)
52 return verifyHash(cert
, gAppleAnchorHash
);
55 bool isAppleCA(const Hashing::Byte
*sha1
)
57 return !memcmp(sha1
, gAppleAnchorHash
, SHA1::digestLength
);
62 // Calculate the canonical hash of a certificate, given its raw (DER) data.
64 void hashOfCertificate(const void *certData
, size_t certLength
, SHA1::Digest digest
)
67 hasher(certData
, certLength
);
68 hasher
.finish(digest
);
73 // Ditto, given a SecCertificateRef
75 void hashOfCertificate(SecCertificateRef cert
, SHA1::Digest digest
)
79 MacOSError::check(SecCertificateGetData(cert
, &certData
));
80 hashOfCertificate(certData
.Data
, certData
.Length
, digest
);
85 // One-stop hash-certificate-and-compare
87 bool verifyHash(SecCertificateRef cert
, const Hashing::Byte
*digest
)
90 hashOfCertificate(cert
, dig
);
91 return !memcmp(dig
, digest
, SHA1::digestLength
);
96 // Check to see if a certificate contains a particular field, by OID. This works for extensions,
97 // even ones not recognized by the local CL. It does not return any value, only presence.
99 bool certificateHasField(SecCertificateRef cert
, const CSSM_OID
&oid
)
103 switch (OSStatus rc
= SecCertificateCopyFirstFieldValue(cert
, &oid
, &value
)) {
105 MacOSError::check(SecCertificateReleaseFirstFieldValue(cert
, &oid
, value
));
106 return true; // extension found by oid
107 case errSecUnknownTag
:
108 break; // oid not recognized by CL - continue below
110 MacOSError::throwMe(rc
); // error: fail
113 // check the CL's bag of unrecognized extensions
116 if (SecCertificateCopyFieldValues(cert
, &CSSMOID_X509V3CertificateExtensionCStruct
, &values
))
117 return false; // no unrecognized extensions - no match
119 for (CSSM_DATA
**p
= values
; *p
; p
++) {
120 const CSSM_X509_EXTENSION
*ext
= (const CSSM_X509_EXTENSION
*)(*p
)->Data
;
121 if (oid
== ext
->extnId
) {
126 MacOSError::check(SecCertificateReleaseFieldValues(cert
, &CSSMOID_X509V3CertificateExtensionCStruct
, values
));
132 // Retrieve X.509 policy extension OIDs, if any.
133 // This currently ignores policy qualifiers.
135 bool certificateHasPolicy(SecCertificateRef cert
, const CSSM_OID
&policyOid
)
137 bool matched
= false;
140 if (OSStatus rc
= SecCertificateCopyFirstFieldValue(cert
, &CSSMOID_CertificatePolicies
, &data
))
141 MacOSError::throwMe(rc
);
142 if (data
&& data
->Data
&& data
->Length
== sizeof(CSSM_X509_EXTENSION
)) {
143 const CSSM_X509_EXTENSION
*ext
= (const CSSM_X509_EXTENSION
*)data
->Data
;
144 assert(ext
->format
== CSSM_X509_DATAFORMAT_PARSED
);
145 const CE_CertPolicies
*policies
= (const CE_CertPolicies
*)ext
->value
.parsedValue
;
147 for (unsigned int n
= 0; n
< policies
->numPolicies
; n
++) {
148 const CE_PolicyInformation
&cp
= policies
->policies
[n
];
149 if (cp
.certPolicyId
== policyOid
) {
155 SecCertificateReleaseFirstFieldValue(cert
, &CSSMOID_PolicyConstraints
, data
);
165 if (!(mState
= copyfile_state_alloc()))
166 UnixError::throwMe();
169 void Copyfile::set(uint32_t flag
, const void *value
)
171 check(::copyfile_state_set(mState
, flag
, value
));
174 void Copyfile::get(uint32_t flag
, void *value
)
176 check(::copyfile_state_set(mState
, flag
, value
));
179 void Copyfile::operator () (const char *src
, const char *dst
, copyfile_flags_t flags
)
181 check(::copyfile(src
, dst
, mState
, flags
));
184 void Copyfile::check(int rc
)
187 UnixError::throwMe();
192 // MessageTracer support
194 MessageTrace::MessageTrace(const char *domain
, const char *signature
)
196 mAsl
= asl_new(ASL_TYPE_MSG
);
198 asl_set(mAsl
, "com.apple.message.domain", domain
);
200 asl_set(mAsl
, "com.apple.message.signature", signature
);
203 void MessageTrace::add(const char *key
, const char *format
, ...)
206 va_start(args
, format
);
208 vsnprintf(value
, sizeof(value
), format
, args
);
210 asl_set(mAsl
, (string("com.apple.message.") + key
).c_str(), value
);
213 void MessageTrace::send(const char *format
, ...)
216 va_start(args
, format
);
217 asl_vlog(NULL
, mAsl
, ASL_LEVEL_NOTICE
, format
, args
);
223 // Resource limited async workers for doing work on nested bundles
224 LimitedAsync::LimitedAsync(bool async
)
226 // validate multiple resources concurrently if bundle resides on solid-state media
228 // How many async workers to spin off. If zero, validating only happens synchronously.
229 long async_workers
= 0;
231 long ncpu
= sysconf(_SC_NPROCESSORS_ONLN
);
233 if (async
&& ncpu
> 0)
234 async_workers
= ncpu
- 1; // one less because this thread also validates
236 mResourceSemaphore
= new Dispatch::Semaphore(async_workers
);
239 LimitedAsync::LimitedAsync(LimitedAsync
&limitedAsync
)
241 mResourceSemaphore
= new Dispatch::Semaphore(*limitedAsync
.mResourceSemaphore
);
244 LimitedAsync::~LimitedAsync()
246 delete mResourceSemaphore
;
249 bool LimitedAsync::perform(Dispatch::Group
&groupRef
, void (^block
)()) {
250 __block
Dispatch::SemaphoreWait
wait(*mResourceSemaphore
, DISPATCH_TIME_NOW
);
252 if (wait
.acquired()) {
253 dispatch_queue_t defaultQueue
= dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT
, 0);
255 groupRef
.enqueue(defaultQueue
, ^{
256 // Hold the semaphore count until the worker is done validating.
257 Dispatch::SemaphoreWait
innerWait(wait
);
267 } // end namespace CodeSigning
268 } // end namespace Security