2 * Copyright (c) 2006-2008 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // Requirements Language Grammar
27 // This file describes two distinct (related) grammars:
28 // Requirement => single requirement (Requirement *)
29 // RequirementSet => set of labeled requirements (Requirements *)
30 // The grammar can "autosense" - i.e. recognize which one it's fed and
31 // return appropriate semantic data.
33 // The semantic data compiled is a malloc'ed BlobCore * - a Requirement
34 // object or a SuperBlob containing multiple Requirements.
36 // Errors are indicated to the caller by accumulating error message strings
37 // in the errors member variable. Any non-empty error value indicates failure.
38 // Presence of semantic data is not a reliable indication of success.
40 header "post_include_hpp" {
41 #include "requirement.h"
42 using namespace CodeSigning;
43 typedef Requirement::Maker Maker;
46 header "post_include_cpp" {
47 #include "requirement.h"
49 #include "csutilities.h"
50 #include <security_utilities/cfutilities.h>
51 #include <security_utilities/hashing.h>
52 #include <security_cdsa_utilities/cssmdata.h> // OID coding
53 using namespace CodeSigning;
54 typedef Requirement::Maker Maker;
59 namespace="Security_CodeSigning";
61 namespaceAntlr="antlr";
68 // Collect error messages.
69 // Note that the immediate caller takes the absence of collected error messages
70 // to indicate compilation success.
72 void RequirementParser::reportError(const antlr::RecognitionException &ex)
74 errors += ex.toString() + "\n";
77 void RequirementParser::reportError(const std::string &s)
84 // Parser helper functions
86 string RequirementParser::hexString(const string &s)
89 throw antlr::SemanticException("odd number of digits");
90 const char *p = s.data();
92 for (unsigned n = 0; n < s.length(); n += 2) {
94 sscanf(p+n, "%2hhx", &c);
100 void RequirementParser::hashString(const string &s, SHA1::Digest hash)
102 if (s.size() != 2 * SHA1::digestLength)
103 throw antlr::SemanticException("invalid hash length");
104 memcpy(hash, hexString(s).data(), SHA1::digestLength);
107 static const char *matchPrefix(const string &key, const char *prefix)
109 unsigned pLength = strlen(prefix);
110 if (!key.compare(0, pLength, prefix, 0, pLength))
111 return key.c_str() + pLength;
116 void RequirementParser::certMatchOperation(Maker &maker, int32_t slot, string key)
118 if (matchPrefix(key, "subject.")) {
119 maker.put(opCertField);
122 } else if (const char *oids = matchPrefix(key, "field.")) {
123 maker.put(opCertGeneric);
125 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
126 maker.putData(oid.data(), oid.length());
127 } else if (const char *oids = matchPrefix(key, "extension.")) {
128 maker.put(opCertGeneric);
130 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
131 maker.putData(oid.data(), oid.length());
132 } else if (const char *oids = matchPrefix(key, "policy.")) {
133 maker.put(opCertPolicy);
135 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
136 maker.putData(oid.data(), oid.length());
138 throw antlr::SemanticException(key + ": unrecognized certificate field");
144 class RequirementParser extends Parser;
153 void reportError(const antlr::RecognitionException &ex);
154 void reportError(const std::string &s);
157 static string hexString(const string &s);
158 static void hashString(const string &s, SHA1::Digest hash);
159 void certMatchOperation(Maker &maker, int32_t slot, string key);
164 // Compound target; compiles single requirements or requirement sets
165 // and returns them as a BlobCore.
167 autosense returns [BlobCore *result = NULL]
169 | result=requirementSet
174 // A Requirements Set.
176 requirementSet returns [Requirements *result = NULL]
177 { Requirements::Maker maker; }
178 : ( { uint32_t t; Requirement *req; }
179 t=requirementType ARROW req=requirementElement
180 { maker.add(t, req); }
182 { result = errors.empty() ? maker() : NULL; }
186 requirementType returns [uint32_t type = kSecInvalidRequirementType]
188 { type = kSecGuestRequirementType; }
190 { type = kSecHostRequirementType; }
192 { type = kSecDesignatedRequirementType; }
194 { type = kSecLibraryRequirementType; }
196 { type = kSecPluginRequirementType; }
198 { type = atol(stype->getText().c_str()); }
203 // A single Requirement (untyped)
205 requirement returns [Requirement *result = NULL]
206 : result = requirementElement
210 requirementElement returns [Requirement *result = NULL]
211 { Requirement::Maker maker; }
213 { result = maker(); }
219 // Classic recursive expressions
222 { Maker::Label label(maker); }
223 : term[maker] ( "or" { maker.insert<ExprOp>(label) = opOr; } term[maker] )*
227 { Maker::Label label(maker); }
228 : primary[maker] ( "and" { maker.insert<ExprOp>(label) = opAnd; } primary[maker] )*
231 primary[Maker &maker]
232 : LPAREN expr[maker] RPAREN
233 | NOT { maker.put(opNot); } primary[maker]
234 | ( "always" | "true" )
235 { maker.put(opTrue); }
236 | ( "never" | "false" )
237 { maker.put(opFalse); }
240 | entitlementspec[maker]
241 | "identifier" { string code; } eql code=identifierString
242 { maker.ident(code); }
243 | "cdhash" { SHA1::Digest digest; } eql hash[digest]
244 { maker.cdhash(digest); }
245 | LPAREN { string name; } name=identifierString RPAREN
246 { maker.put(opNamedCode); maker.put(name); }
251 // Certificate specifications restrict certificates in the signing chain
253 certspec[Maker &maker]
254 : "anchor" "apple" appleanchor[maker]
255 | "anchor" "generic" "apple" // alternate form
256 { maker.put(opAppleGenericAnchor); }
257 | ( "certificate" | "cert" | "anchor" ) "trusted"
258 { maker.trustedAnchor(); }
259 | ( "certificate" | "cert" ) { int32_t slot; } slot=certSlot
260 ( certslotspec[maker, slot] | "trusted" { maker.trustedAnchor(slot); } )
261 | "anchor" certslotspec[maker, Requirement::anchorCert]
264 appleanchor[Maker &maker]
266 { maker.put(opAppleAnchor); }
268 { maker.put(opAppleGenericAnchor); }
269 | { string name; } name=identifierString
270 { maker.put(opNamedAnchor); maker.put(name); }
273 certslotspec[Maker &maker, int32_t slot] { string key; }
274 : eql { SHA1::Digest digest; } certificateDigest[digest]
275 { maker.anchor(slot, digest); }
277 { certMatchOperation(maker, slot, key); }
283 // Info specifications place conditions on entries in the Info.plist
285 infospec[Maker &maker] { string key; }
286 : "info" key=bracketKey
287 { maker.put(opInfoKeyField); maker.put(key); }
293 // Entitlement specifications place conditions on embedded entitlement entries
295 entitlementspec[Maker &maker] { string key; }
296 : "entitlement" key=bracketKey
297 { maker.put(opEntitlementField); maker.put(key); }
303 // Common match operations, written as a syntactic suffix (the operand precedes this)
305 match_suffix[Maker &maker]
306 : empty ( "exists" ) ?
307 { maker.put(matchExists); }
309 { MatchOperation mop = matchEqual; string value; }
310 ( STAR { mop = matchEndsWith; } ) ?
312 ( STAR { mop = (mop == matchEndsWith) ? matchContains : matchBeginsWith; } ) ?
313 { maker.put(mop); maker.put(value); }
314 | SUBS { string value; } value=datavalue
315 { maker.put(matchContains); maker.put(value); }
316 | LESS { string value; } value=datavalue
317 { maker.put(matchLessThan); maker.put(value); }
318 | GT { string value; } value=datavalue
319 { maker.put(matchGreaterThan); maker.put(value); }
320 | LE { string value; } value=datavalue
321 { maker.put(matchLessEqual); maker.put(value); }
322 | GE { string value; } value=datavalue
323 { maker.put(matchGreaterEqual); maker.put(value); }
326 bracketKey returns [string key]
327 : LBRACK key=stringvalue RBRACK
331 // A certSlot identifies one certificate from the certificate chain
333 certSlot returns [int32_t slot = 0]
334 : s:INTEGER // counting from the anchor up
335 { slot = atol(s->getText().c_str()); }
336 | NEG ss:INTEGER // counting from the leaf down
337 { slot = -atol(ss->getText().c_str()); }
338 | "leaf" // the leaf ( == -1)
339 { slot = Requirement::leafCert; }
340 | "root" // the root ( == 0)
341 { slot = Requirement::anchorCert; }
344 // an arbitrary digest value
345 hash[SHA1::Digest digest]
347 { hashString(hash->getText(), digest); }
350 // various forms to specify a certificate hash
351 certificateDigest[SHA1::Digest digest]
353 | { string path; } path=pathstring
354 { if (CFRef<CFDataRef> certData = cfLoadFile(path))
355 hashOfCertificate(CFDataGetBytePtr(certData), CFDataGetLength(certData), digest);
357 throw antlr::SemanticException(path + ": not found");
361 // generic data - can be simple string, quoted string, or 0x-style hex
362 datavalue returns [string result]
364 | hex:HEXCONSTANT { result = hexString(hex->getText()); }
367 // strings can always be quoted, but DOTKEYs don't need to be
368 stringvalue returns [string result]
369 : dk:DOTKEY { result = dk->getText(); }
370 | s:STRING { result = s->getText(); }
373 // pathstrings are like strings, but PATHNAMEs don't need to be quoted either
374 pathstring returns [string result]
375 : dk:DOTKEY { result = dk->getText(); }
376 | s:STRING { result = s->getText(); }
377 | pn:PATHNAME { result = pn->getText(); }
380 // unique identifier value
381 identifierString returns [string result]
382 : dk:DOTKEY { result = dk->getText(); }
383 | s:STRING { result = s->getText(); }
386 // syntactic cavity generators
401 // The lexer for the Requirement language.
402 // Really straightforward and conventional.
403 // A subset of strings don't need to be quoted (DOTKEYs). Neither do some simple
404 // pathnames starting with "/".
405 // Hash values have a special syntax H"abcd" (abcd in straight hex).
406 // Hex constants of the form 0xabcd can have any length; they are carried
407 // around as strings (which are in turn stored as data in the language binary).
409 class RequirementLexer extends Lexer;
417 IDENT options { testLiterals=true; }
418 : ( 'A' .. 'Z' | 'a' .. 'z' ) ( 'A' .. 'Z' | 'a' .. 'z' | '0' .. '9' )*
421 DOTKEY options { testLiterals=true; }
422 : IDENT ( "." ( IDENT | INTEGER ) )*
426 : "/" IDENT ( "/" IDENT )+
430 : 'H'! '"'! ( HEX )+ '"'!
438 : '"'! ( ( '\\'! '"' ) | ( ~ ( '"' | '\\' ) ) )* '"'!
446 HEX : '0' .. '9' | 'a' .. 'f' | 'A' .. 'F' ;
471 WS : ( ' ' | '\n' { newline(); } | '\t' )+
472 { $setType(antlr::Token::SKIP); }
477 { $setType(antlr::Token::SKIP); }
481 : "/*" ( (~'*')|('*'(~'/')) )* "*/"
482 { $setType(antlr::Token::SKIP); }
487 { $setType(antlr::Token::SKIP); }