]> git.saurik.com Git - apple/security.git/blobdiff - OSX/libsecurity_codesigning/lib/diskimagerep.cpp
Security-57337.40.85.tar.gz
[apple/security.git] / OSX / libsecurity_codesigning / lib / diskimagerep.cpp
diff --git a/OSX/libsecurity_codesigning/lib/diskimagerep.cpp b/OSX/libsecurity_codesigning/lib/diskimagerep.cpp
new file mode 100644 (file)
index 0000000..7bc89b4
--- /dev/null
@@ -0,0 +1,255 @@
+/*
+ * Copyright (c) 2015 Apple Inc. All Rights Reserved.
+ * 
+ * @APPLE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+//
+// diskimagerep - DiskRep representing a single read-only compressed disk image file
+//
+#include "diskimagerep.h"
+#include "sigblob.h"
+#include "CodeSigner.h"
+#include <security_utilities/endian.h>
+#include <algorithm>
+
+
+namespace Security {
+namespace CodeSigning {
+
+using Security::n2h;
+using Security::h2n;
+using namespace UnixPlusPlus;
+
+
+static const int32_t udifVersion = 4;          // supported image file version
+       
+
+//
+// Temporary hack to imply a fUDIFCryptosigFieldsset at the start of the "reserved" area of an UDIF header
+//
+struct UDIFSigning {
+       uint64_t fCodeSignatureOffset;
+       uint64_t fCodeSignatureLength;
+};
+       
+UDIFSigning& sigFields(UDIFFileHeader& header);
+const UDIFSigning& sigFields(const UDIFFileHeader& header);
+       
+UDIFSigning& sigFields(UDIFFileHeader& header)
+{
+       return *(UDIFSigning*)&header.fReserved;
+}
+
+const UDIFSigning& sigFields(const UDIFFileHeader& header)
+{
+       return *(UDIFSigning*)&header.fReserved;
+}
+       
+bool DiskImageRep::readHeader(FileDesc& fd, UDIFFileHeader& header)
+{
+       // the UDIF "header" is in fact the last 512 bytes of the file, with no particular alignment
+       static const size_t headerLength = sizeof(header);
+       size_t length = fd.fileSize();
+       if (length < sizeof(UDIFFileHeader) + sizeof(BlobCore))
+               return false;
+       size_t headerOffset = length - sizeof(UDIFFileHeader);
+       if (fd.read(&header, headerLength, headerOffset) != headerLength)
+               return false;
+       if (n2h(header.fUDIFSignature) != kUDIFSignature)
+               return false;
+       if (n2h(header.fUDIFVersion) != udifVersion)    // current as of this writing
+               return false;
+       
+       return true;
+}
+
+
+//
+// Object management.
+//
+DiskImageRep::DiskImageRep(const char *path)
+       : SingleDiskRep(path)
+{
+       this->setup();
+}
+
+void DiskImageRep::setup()
+{
+       mSigningData = NULL;
+       
+       // the UDIF "header" is in fact the last 512 bytes of the file, with no particular alignment
+       if (!readHeader(fd(), this->mHeader))
+               UnixError::throwMe(errSecCSBadDiskImageFormat);
+
+       mHeaderOffset = fd().fileSize() - sizeof(UDIFFileHeader);
+       size_t signatureOffset = size_t(n2h(sigFields(this->mHeader).fCodeSignatureOffset));
+       size_t signatureLength = size_t(n2h(sigFields(this->mHeader).fCodeSignatureLength));
+       sigFields(this->mHeader).fCodeSignatureLength = 0;              // blind length (signature covers header)
+       if (signatureOffset == 0) {
+               mEndOfDataOffset = mHeaderOffset;
+               sigFields(mHeader).fCodeSignatureOffset = h2n(mHeaderOffset);
+               return;         // unsigned, header prepared for possible signing
+       } else {
+               mEndOfDataOffset = signatureOffset;
+       }
+       
+       // read the signature superblob
+       const size_t frameLength = mHeaderOffset - signatureOffset;             // room to following header
+       if (EmbeddedSignatureBlob* blob = EmbeddedSignatureBlob::readBlob(fd(), signatureOffset, frameLength)) {
+               if (blob->length() != frameLength || frameLength != signatureLength) {
+                       free(blob);
+                       MacOSError::throwMe(errSecCSBadDiskImageFormat);
+               }
+               mSigningData = blob;
+       }
+}
+       
+       
+//
+// The default binary identification of a SingleDiskRep is the (SHA-1) hash
+// of the entire file itself.
+//
+CFDataRef DiskImageRep::identification()
+{
+       SHA1 hash;              // not security sensitive
+       hash(&mHeader, sizeof(mHeader));
+       SHA1::Digest digest;
+       hash.finish(digest);
+       return makeCFData(digest, sizeof(digest));
+}
+
+
+//
+// Sniffer function for UDIF disk image files.
+// This just looks for the trailing "header" and its magic number.
+//
+bool DiskImageRep::candidate(FileDesc &fd)
+{
+       UDIFFileHeader header;
+       return readHeader(fd, header) == true;
+}
+
+
+//
+// Signing limit is the start of the (trailing) signature
+//
+size_t DiskImageRep::signingLimit()
+{
+       return mEndOfDataOffset;
+}
+
+void DiskImageRep::strictValidate(const CodeDirectory* cd, const ToleratedErrors& tolerated, SecCSFlags flags)
+{
+    DiskRep::strictValidate(cd, tolerated, flags);
+
+    if (cd) {
+        size_t cd_limit = cd->signingLimit();
+        size_t dr_limit = signingLimit();
+        if (cd_limit != dr_limit &&         // must cover exactly the entire data
+            cd_limit != fd().fileSize())    // or, for legacy detached sigs, the entire file
+            MacOSError::throwMe(errSecCSSignatureInvalid);
+    }
+}
+
+
+//
+// Retrieve a component from the executable.
+// Our mCache has mapped the entire file, so we just fish the contents out of
+// the mapped area as needed.
+//
+CFDataRef DiskImageRep::component(CodeDirectory::SpecialSlot slot)
+{
+       switch (slot) {
+       case cdRepSpecificSlot:
+               return makeCFData(&mHeader, sizeof(mHeader));
+       default:
+               return mSigningData ? mSigningData->component(slot) : NULL;
+       }
+}
+
+
+//
+// Provide a (vaguely) human readable characterization of this code
+//
+string DiskImageRep::format()
+{
+       return "disk image";
+}
+       
+void DiskImageRep::prepareForSigning(SigningContext& context)
+{
+       // default to SHA256 unconditionally - we have no legacy issues to worry about
+       if (context.digestAlgorithms().empty())
+               context.setDigestAlgorithm(kSecCodeSignatureHashSHA256);
+}
+
+
+//
+// DiskImageRep::Writers
+//
+DiskRep::Writer *DiskImageRep::writer()
+{
+       return new Writer(this);
+}
+
+
+//
+// Write a component.
+//
+void DiskImageRep::Writer::component(CodeDirectory::SpecialSlot slot, CFDataRef data)
+{
+       assert(slot != cdRepSpecificSlot);
+       EmbeddedSignatureBlob::Maker::component(slot, data);
+}
+
+
+//
+// Append the superblob we built to the cache file.
+//
+void DiskImageRep::Writer::flush()
+{
+       delete mSigningData;                    // ditch previous blob just in case
+       mSigningData = Maker::make();   // assemble new signature SuperBlob
+       
+       // write signature superblob
+       size_t location = rep->mEndOfDataOffset;
+       assert(location);
+       fd().seek(location);
+       fd().writeAll(*mSigningData);   // write signature
+       
+       // now (re)write disk image header after it
+       UDIFFileHeader fullHeader = rep->mHeader;
+       sigFields(fullHeader).fCodeSignatureOffset = h2n(location);
+       sigFields(fullHeader).fCodeSignatureLength = h2n(mSigningData->length());
+       fd().writeAll(&fullHeader, sizeof(rep->mHeader));
+}
+
+
+//
+// Discretionary manipulations
+//
+void DiskImageRep::Writer::addDiscretionary(CodeDirectory::Builder &builder)
+{
+}
+
+
+} // end namespace CodeSigning
+} // end namespace Security