diff options
Diffstat (limited to 'common')
| -rw-r--r-- | common/Makefile.am | 29 | ||||
| -rw-r--r-- | common/debug.c | 174 | ||||
| -rw-r--r-- | common/debug.h | 53 | ||||
| -rw-r--r-- | common/userpref.c | 1172 | ||||
| -rw-r--r-- | common/userpref.h | 89 | 
5 files changed, 1517 insertions, 0 deletions
| diff --git a/common/Makefile.am b/common/Makefile.am new file mode 100644 index 0000000..ba7ed9c --- /dev/null +++ b/common/Makefile.am | |||
| @@ -0,0 +1,29 @@ | |||
| 1 | AM_CPPFLAGS = \ | ||
| 2 | -I$(top_srcdir)/include \ | ||
| 3 | -I$(top_srcdir) | ||
| 4 | |||
| 5 | AM_CFLAGS = \ | ||
| 6 | $(GLOBAL_CFLAGS) \ | ||
| 7 | $(ssl_lib_CFLAGS) \ | ||
| 8 | $(LFS_CFLAGS) \ | ||
| 9 | $(libusbmuxd_CFLAGS) \ | ||
| 10 | $(limd_glue_CFLAGS) \ | ||
| 11 | $(libplist_CFLAGS) | ||
| 12 | |||
| 13 | AM_LDFLAGS = \ | ||
| 14 | $(ssl_lib_LIBS) \ | ||
| 15 | ${libpthread_LIBS} \ | ||
| 16 | $(libusbmuxd_LIBS) \ | ||
| 17 | $(limd_glue_LIBS) \ | ||
| 18 | $(libplist_LIBS) | ||
| 19 | |||
| 20 | noinst_LTLIBRARIES = libinternalcommon.la | ||
| 21 | libinternalcommon_la_LIBADD = | ||
| 22 | libinternalcommon_la_LDFLAGS = $(AM_LDFLAGS) -no-undefined | ||
| 23 | libinternalcommon_la_SOURCES = \ | ||
| 24 | debug.c debug.h \ | ||
| 25 | userpref.c userpref.h | ||
| 26 | |||
| 27 | if WIN32 | ||
| 28 | libinternalcommon_la_LIBADD += -lole32 -lws2_32 | ||
| 29 | endif | ||
| diff --git a/common/debug.c b/common/debug.c new file mode 100644 index 0000000..7a593fc --- /dev/null +++ b/common/debug.c | |||
| @@ -0,0 +1,174 @@ | |||
| 1 | /* | ||
| 2 | * debug.c | ||
| 3 | * contains utilitary functions for debugging | ||
| 4 | * | ||
| 5 | * Copyright (c) 2008 Jonathan Beck All Rights Reserved. | ||
| 6 | * Copyright (c) 2010 Martin S. All Rights Reserved. | ||
| 7 | * | ||
| 8 | * This library is free software; you can redistribute it and/or | ||
| 9 | * modify it under the terms of the GNU Lesser General Public | ||
| 10 | * License as published by the Free Software Foundation; either | ||
| 11 | * version 2.1 of the License, or (at your option) any later version. | ||
| 12 | * | ||
| 13 | * This library is distributed in the hope that it will be useful, | ||
| 14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
| 15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
| 16 | * Lesser General Public License for more details. | ||
| 17 | * | ||
| 18 | * You should have received a copy of the GNU Lesser General Public | ||
| 19 | * License along with this library; if not, write to the Free Software | ||
| 20 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||
| 21 | */ | ||
| 22 | |||
| 23 | #ifdef HAVE_CONFIG_H | ||
| 24 | #include <config.h> | ||
| 25 | #endif | ||
| 26 | #include <stdarg.h> | ||
| 27 | #define _GNU_SOURCE 1 | ||
| 28 | #define __USE_GNU 1 | ||
| 29 | #include <stdio.h> | ||
| 30 | #include <stdint.h> | ||
| 31 | #include <stdlib.h> | ||
| 32 | #include <time.h> | ||
| 33 | #ifndef _WIN32 | ||
| 34 | #include <sys/time.h> | ||
| 35 | #endif | ||
| 36 | |||
| 37 | #include "src/idevice.h" | ||
| 38 | #include "debug.h" | ||
| 39 | #include "libimobiledevice/libimobiledevice.h" | ||
| 40 | |||
| 41 | #ifndef STRIP_DEBUG_CODE | ||
| 42 | #include "asprintf.h" | ||
| 43 | #endif | ||
| 44 | |||
| 45 | static int debug_level; | ||
| 46 | |||
| 47 | void internal_set_debug_level(int level) | ||
| 48 | { | ||
| 49 | debug_level = level; | ||
| 50 | } | ||
| 51 | |||
| 52 | #define MAX_PRINT_LEN (16*1024) | ||
| 53 | |||
| 54 | #ifndef STRIP_DEBUG_CODE | ||
| 55 | static void debug_print_line(const char *func, const char *file, int line, const char *buffer) | ||
| 56 | { | ||
| 57 | char str_time[24]; | ||
| 58 | #ifdef _WIN32 | ||
| 59 | SYSTEMTIME lt; | ||
| 60 | GetLocalTime(<); | ||
| 61 | snprintf(str_time, 24, "%02d:%02d:%02d.%03d", lt.wHour, lt.wMinute, lt.wSecond, lt.wMilliseconds); | ||
| 62 | #else | ||
| 63 | #ifdef HAVE_GETTIMEOFDAY | ||
| 64 | struct timeval tv; | ||
| 65 | struct tm *tp; | ||
| 66 | gettimeofday(&tv, NULL); | ||
| 67 | #ifdef HAVE_LOCALTIME_R | ||
| 68 | struct tm tp_; | ||
| 69 | tp = localtime_r(&tv.tv_sec, &tp_); | ||
| 70 | #else | ||
| 71 | tp = localtime(&tv.tv_sec); | ||
| 72 | #endif | ||
| 73 | strftime(str_time, 9, "%H:%M:%S", tp); | ||
| 74 | snprintf(str_time+8, 10, ".%03d", (int)tv.tv_usec/1000); | ||
| 75 | #else | ||
| 76 | time_t the_time; | ||
| 77 | time(&the_time); | ||
| 78 | strftime(str_time, 15, "%H:%M:%S", localtime (&the_time)); | ||
| 79 | #endif | ||
| 80 | #endif | ||
| 81 | fprintf(stderr, "%s %s:%d %s(): %s\n", str_time, file, line, func, buffer); | ||
| 82 | } | ||
| 83 | #endif | ||
| 84 | |||
| 85 | void debug_info_real(const char *func, const char *file, int line, const char *format, ...) | ||
| 86 | { | ||
| 87 | #ifndef STRIP_DEBUG_CODE | ||
| 88 | va_list args; | ||
| 89 | char *buffer = NULL; | ||
| 90 | |||
| 91 | if (!debug_level) | ||
| 92 | return; | ||
| 93 | |||
| 94 | /* run the real fprintf */ | ||
| 95 | va_start(args, format); | ||
| 96 | if(vasprintf(&buffer, format, args)<0){} | ||
| 97 | va_end(args); | ||
| 98 | |||
| 99 | debug_print_line(func, file, line, buffer); | ||
| 100 | |||
| 101 | free(buffer); | ||
| 102 | #endif | ||
| 103 | } | ||
| 104 | |||
| 105 | void debug_buffer(const char *data, const int length) | ||
| 106 | { | ||
| 107 | #ifndef STRIP_DEBUG_CODE | ||
| 108 | int i; | ||
| 109 | int j; | ||
| 110 | unsigned char c; | ||
| 111 | |||
| 112 | if (debug_level) { | ||
| 113 | for (i = 0; i < length; i += 16) { | ||
| 114 | fprintf(stderr, "%04x: ", i); | ||
| 115 | for (j = 0; j < 16; j++) { | ||
| 116 | if (i + j >= length) { | ||
| 117 | fprintf(stderr, " "); | ||
| 118 | continue; | ||
| 119 | } | ||
| 120 | fprintf(stderr, "%02x ", *(data + i + j) & 0xff); | ||
| 121 | } | ||
| 122 | fprintf(stderr, " | "); | ||
| 123 | for (j = 0; j < 16; j++) { | ||
| 124 | if (i + j >= length) | ||
| 125 | break; | ||
| 126 | c = *(data + i + j); | ||
| 127 | if ((c < 32) || (c > 127)) { | ||
| 128 | fprintf(stderr, "."); | ||
| 129 | continue; | ||
| 130 | } | ||
| 131 | fprintf(stderr, "%c", c); | ||
| 132 | } | ||
| 133 | fprintf(stderr, "\n"); | ||
| 134 | } | ||
| 135 | fprintf(stderr, "\n"); | ||
| 136 | } | ||
| 137 | #endif | ||
| 138 | } | ||
| 139 | |||
| 140 | void debug_buffer_to_file(const char *file, const char *data, const int length) | ||
| 141 | { | ||
| 142 | #ifndef STRIP_DEBUG_CODE | ||
| 143 | if (debug_level) { | ||
| 144 | FILE *f = fopen(file, "wb"); | ||
| 145 | fwrite(data, 1, length, f); | ||
| 146 | fflush(f); | ||
| 147 | fclose(f); | ||
| 148 | } | ||
| 149 | #endif | ||
| 150 | } | ||
| 151 | |||
| 152 | void debug_plist_real(const char *func, const char *file, int line, plist_t plist) | ||
| 153 | { | ||
| 154 | #ifndef STRIP_DEBUG_CODE | ||
| 155 | if (!plist) | ||
| 156 | return; | ||
| 157 | |||
| 158 | char *buffer = NULL; | ||
| 159 | uint32_t length = 0; | ||
| 160 | plist_to_xml(plist, &buffer, &length); | ||
| 161 | |||
| 162 | /* get rid of ending newline as one is already added in the debug line */ | ||
| 163 | if (buffer[length-1] == '\n') | ||
| 164 | buffer[length-1] = '\0'; | ||
| 165 | |||
| 166 | if (length <= MAX_PRINT_LEN) | ||
| 167 | debug_info_real(func, file, line, "printing %i bytes plist:\n%s", length, buffer); | ||
| 168 | else | ||
| 169 | debug_info_real(func, file, line, "supress printing %i bytes plist...\n", length); | ||
| 170 | |||
| 171 | free(buffer); | ||
| 172 | #endif | ||
| 173 | } | ||
| 174 | |||
| diff --git a/common/debug.h b/common/debug.h new file mode 100644 index 0000000..882072d --- /dev/null +++ b/common/debug.h | |||
| @@ -0,0 +1,53 @@ | |||
| 1 | /* | ||
| 2 | * debug.h | ||
| 3 | * contains utilitary functions for debugging | ||
| 4 | * | ||
| 5 | * Copyright (c) 2008 Jonathan Beck All Rights Reserved. | ||
| 6 | * Copyright (c) 2010 Martin S. All Rights Reserved. | ||
| 7 | * | ||
| 8 | * This library is free software; you can redistribute it and/or | ||
| 9 | * modify it under the terms of the GNU Lesser General Public | ||
| 10 | * License as published by the Free Software Foundation; either | ||
| 11 | * version 2.1 of the License, or (at your option) any later version. | ||
| 12 | * | ||
| 13 | * This library is distributed in the hope that it will be useful, | ||
| 14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
| 15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
| 16 | * Lesser General Public License for more details. | ||
| 17 | * | ||
| 18 | * You should have received a copy of the GNU Lesser General Public | ||
| 19 | * License along with this library; if not, write to the Free Software | ||
| 20 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||
| 21 | */ | ||
| 22 | |||
| 23 | #ifndef __DEBUG_H | ||
| 24 | #define __DEBUG_H | ||
| 25 | |||
| 26 | #include <plist/plist.h> | ||
| 27 | |||
| 28 | #if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 199901L && !defined(STRIP_DEBUG_CODE) | ||
| 29 | #define debug_info(...) debug_info_real (__func__, __FILE__, __LINE__, __VA_ARGS__) | ||
| 30 | #define debug_plist(a) debug_plist_real (__func__, __FILE__, __LINE__, a) | ||
| 31 | #elif defined(__GNUC__) && __GNUC__ >= 3 && !defined(STRIP_DEBUG_CODE) | ||
| 32 | #define debug_info(...) debug_info_real (__FUNCTION__, __FILE__, __LINE__, __VA_ARGS__) | ||
| 33 | #define debug_plist(a) debug_plist_real (__FUNCTION__, __FILE__, __LINE__, a) | ||
| 34 | #else | ||
| 35 | #define debug_info(...) | ||
| 36 | #define debug_plist(a) | ||
| 37 | #endif | ||
| 38 | |||
| 39 | void debug_info_real(const char *func, | ||
| 40 | const char *file, | ||
| 41 | int line, | ||
| 42 | const char *format, ...); | ||
| 43 | |||
| 44 | void debug_buffer(const char *data, const int length); | ||
| 45 | void debug_buffer_to_file(const char *file, const char *data, const int length); | ||
| 46 | void debug_plist_real(const char *func, | ||
| 47 | const char *file, | ||
| 48 | int line, | ||
| 49 | plist_t plist); | ||
| 50 | |||
| 51 | void internal_set_debug_level(int level); | ||
| 52 | |||
| 53 | #endif | ||
| diff --git a/common/userpref.c b/common/userpref.c new file mode 100644 index 0000000..76945e1 --- /dev/null +++ b/common/userpref.c | |||
| @@ -0,0 +1,1172 @@ | |||
| 1 | /* | ||
| 2 | * userpref.c | ||
| 3 | * contains methods to access user specific certificates IDs and more. | ||
| 4 | * | ||
| 5 | * Copyright (c) 2013-2021 Nikias Bassen, All Rights Reserved. | ||
| 6 | * Copyright (c) 2013-2014 Martin Szulecki All Rights Reserved. | ||
| 7 | * Copyright (c) 2008 Jonathan Beck All Rights Reserved. | ||
| 8 | * | ||
| 9 | * This library is free software; you can redistribute it and/or | ||
| 10 | * modify it under the terms of the GNU Lesser General Public | ||
| 11 | * License as published by the Free Software Foundation; either | ||
| 12 | * version 2.1 of the License, or (at your option) any later version. | ||
| 13 | * | ||
| 14 | * This library is distributed in the hope that it will be useful, | ||
| 15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
| 16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
| 17 | * Lesser General Public License for more details. | ||
| 18 | * | ||
| 19 | * You should have received a copy of the GNU Lesser General Public | ||
| 20 | * License along with this library; if not, write to the Free Software | ||
| 21 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||
| 22 | */ | ||
| 23 | |||
| 24 | #ifdef HAVE_CONFIG_H | ||
| 25 | #include <config.h> | ||
| 26 | #endif | ||
| 27 | |||
| 28 | #include <stdio.h> | ||
| 29 | #include <stdint.h> | ||
| 30 | #include <stdlib.h> | ||
| 31 | #include <string.h> | ||
| 32 | #include <errno.h> | ||
| 33 | |||
| 34 | #ifdef HAVE_SYS_TYPES_H | ||
| 35 | #include <sys/types.h> | ||
| 36 | #endif | ||
| 37 | #include <dirent.h> | ||
| 38 | #ifndef _WIN32 | ||
| 39 | #include <pwd.h> | ||
| 40 | #include <unistd.h> | ||
| 41 | #include <libgen.h> | ||
| 42 | #include <sys/stat.h> | ||
| 43 | #endif | ||
| 44 | #include <usbmuxd.h> | ||
| 45 | #if defined(HAVE_OPENSSL) | ||
| 46 | #include <openssl/bn.h> | ||
| 47 | #include <openssl/pem.h> | ||
| 48 | #include <openssl/rsa.h> | ||
| 49 | #include <openssl/x509.h> | ||
| 50 | #include <openssl/x509v3.h> | ||
| 51 | #if OPENSSL_VERSION_NUMBER < 0x1010000fL || \ | ||
| 52 | (defined(LIBRESSL_VERSION_NUMBER) && (LIBRESSL_VERSION_NUMBER < 0x20700000L)) | ||
| 53 | #define X509_set1_notBefore X509_set_notBefore | ||
| 54 | #define X509_set1_notAfter X509_set_notAfter | ||
| 55 | #endif | ||
| 56 | #elif defined(HAVE_GNUTLS) | ||
| 57 | #include <gnutls/gnutls.h> | ||
| 58 | #include <gnutls/crypto.h> | ||
| 59 | #include <gnutls/x509.h> | ||
| 60 | #include <gcrypt.h> | ||
| 61 | #include <libtasn1.h> | ||
| 62 | #elif defined(HAVE_MBEDTLS) | ||
| 63 | #include <mbedtls/ssl.h> | ||
| 64 | #include <mbedtls/entropy.h> | ||
| 65 | #include <mbedtls/ctr_drbg.h> | ||
| 66 | #include <mbedtls/asn1write.h> | ||
| 67 | #include <mbedtls/oid.h> | ||
| 68 | #else | ||
| 69 | #error No supported TLS/SSL library enabled | ||
| 70 | #endif | ||
| 71 | |||
| 72 | #ifdef _WIN32 | ||
| 73 | #include <shlobj.h> | ||
| 74 | #endif | ||
| 75 | |||
| 76 | #ifndef ETIMEDOUT | ||
| 77 | #define ETIMEDOUT 138 | ||
| 78 | #endif | ||
| 79 | |||
| 80 | #include <libimobiledevice/libimobiledevice.h> | ||
| 81 | #include <libimobiledevice-glue/utils.h> | ||
| 82 | |||
| 83 | #include "userpref.h" | ||
| 84 | #include "debug.h" | ||
| 85 | |||
| 86 | #if defined(HAVE_GNUTLS) | ||
| 87 | const ASN1_ARRAY_TYPE pkcs1_asn1_tab[] = { | ||
| 88 | {"PKCS1", 536872976, 0}, | ||
| 89 | {0, 1073741836, 0}, | ||
| 90 | {"RSAPublicKey", 536870917, 0}, | ||
| 91 | {"modulus", 1073741827, 0}, | ||
| 92 | {"publicExponent", 3, 0}, | ||
| 93 | {0, 0, 0} | ||
| 94 | }; | ||
| 95 | #endif | ||
| 96 | |||
| 97 | #ifdef _WIN32 | ||
| 98 | #define DIR_SEP '\\' | ||
| 99 | #define DIR_SEP_S "\\" | ||
| 100 | #else | ||
| 101 | #define DIR_SEP '/' | ||
| 102 | #define DIR_SEP_S "/" | ||
| 103 | #endif | ||
| 104 | |||
| 105 | #define USERPREF_CONFIG_EXTENSION ".plist" | ||
| 106 | |||
| 107 | #ifdef _WIN32 | ||
| 108 | #define USERPREF_CONFIG_DIR "Apple"DIR_SEP_S"Lockdown" | ||
| 109 | #else | ||
| 110 | #define USERPREF_CONFIG_DIR "lockdown" | ||
| 111 | #endif | ||
| 112 | |||
| 113 | #define USERPREF_CONFIG_FILE "SystemConfiguration"USERPREF_CONFIG_EXTENSION | ||
| 114 | |||
| 115 | static char *__config_dir = NULL; | ||
| 116 | |||
| 117 | #ifdef _WIN32 | ||
| 118 | static char *userpref_utf16_to_utf8(wchar_t *unistr, long len, long *items_read, long *items_written) | ||
| 119 | { | ||
| 120 | if (!unistr || (len <= 0)) return NULL; | ||
| 121 | char *outbuf = (char*)malloc(3*(len+1)); | ||
| 122 | int p = 0; | ||
| 123 | int i = 0; | ||
| 124 | |||
| 125 | wchar_t wc; | ||
| 126 | |||
| 127 | while (i < len) { | ||
| 128 | wc = unistr[i++]; | ||
| 129 | if (wc >= 0x800) { | ||
| 130 | outbuf[p++] = (char)(0xE0 + ((wc >> 12) & 0xF)); | ||
| 131 | outbuf[p++] = (char)(0x80 + ((wc >> 6) & 0x3F)); | ||
| 132 | outbuf[p++] = (char)(0x80 + (wc & 0x3F)); | ||
| 133 | } else if (wc >= 0x80) { | ||
| 134 | outbuf[p++] = (char)(0xC0 + ((wc >> 6) & 0x1F)); | ||
| 135 | outbuf[p++] = (char)(0x80 + (wc & 0x3F)); | ||
| 136 | } else { | ||
| 137 | outbuf[p++] = (char)(wc & 0x7F); | ||
| 138 | } | ||
| 139 | } | ||
| 140 | if (items_read) { | ||
| 141 | *items_read = i; | ||
| 142 | } | ||
| 143 | if (items_written) { | ||
| 144 | *items_written = p; | ||
| 145 | } | ||
| 146 | outbuf[p] = 0; | ||
| 147 | |||
| 148 | return outbuf; | ||
| 149 | } | ||
| 150 | #endif | ||
| 151 | |||
| 152 | const char *userpref_get_config_dir() | ||
| 153 | { | ||
| 154 | char *base_config_dir = NULL; | ||
| 155 | |||
| 156 | if (__config_dir) | ||
| 157 | return __config_dir; | ||
| 158 | |||
| 159 | #ifdef _WIN32 | ||
| 160 | wchar_t path[MAX_PATH+1]; | ||
| 161 | HRESULT hr; | ||
| 162 | LPITEMIDLIST pidl = NULL; | ||
| 163 | BOOL b = FALSE; | ||
| 164 | |||
| 165 | hr = SHGetSpecialFolderLocation (NULL, CSIDL_COMMON_APPDATA, &pidl); | ||
| 166 | if (hr == S_OK) { | ||
| 167 | b = SHGetPathFromIDListW (pidl, path); | ||
| 168 | if (b) { | ||
| 169 | base_config_dir = userpref_utf16_to_utf8 (path, wcslen(path), NULL, NULL); | ||
| 170 | CoTaskMemFree (pidl); | ||
| 171 | } | ||
| 172 | } | ||
| 173 | #else | ||
| 174 | #ifdef __APPLE__ | ||
| 175 | base_config_dir = strdup("/var/db"); | ||
| 176 | #else | ||
| 177 | base_config_dir = strdup("/var/lib"); | ||
| 178 | #endif | ||
| 179 | #endif | ||
| 180 | __config_dir = string_concat(base_config_dir, DIR_SEP_S, USERPREF_CONFIG_DIR, NULL); | ||
| 181 | |||
| 182 | if (__config_dir) { | ||
| 183 | int i = strlen(__config_dir)-1; | ||
| 184 | while ((i > 0) && (__config_dir[i] == DIR_SEP)) { | ||
| 185 | __config_dir[i--] = '\0'; | ||
| 186 | } | ||
| 187 | } | ||
| 188 | |||
| 189 | free(base_config_dir); | ||
| 190 | |||
| 191 | debug_info("initialized config_dir to %s", __config_dir); | ||
| 192 | |||
| 193 | return __config_dir; | ||
| 194 | } | ||
| 195 | |||
| 196 | /** | ||
| 197 | * Reads the SystemBUID from a previously generated configuration file. | ||
| 198 | * | ||
| 199 | * @note It is the responsibility of the calling function to free the returned system_buid. | ||
| 200 | * @param system_buid A pointer that will be set to a newly allocated string containing the | ||
| 201 | * SystemBUID upon successful return. | ||
| 202 | * @return 0 if the SystemBUID has been successfully retrieved or < 0 otherwise. | ||
| 203 | */ | ||
| 204 | int userpref_read_system_buid(char **system_buid) | ||
| 205 | { | ||
| 206 | int res = usbmuxd_read_buid(system_buid); | ||
| 207 | if (res == 0) { | ||
| 208 | debug_info("using %s as %s", *system_buid, USERPREF_SYSTEM_BUID_KEY); | ||
| 209 | } else { | ||
| 210 | debug_info("could not read system buid, error %d", res); | ||
| 211 | } | ||
| 212 | return res; | ||
| 213 | } | ||
| 214 | |||
| 215 | /** | ||
| 216 | * Fills a list with UDIDs of devices that have been connected to this | ||
| 217 | * system before, i.e. for which a public key file exists. | ||
| 218 | * | ||
| 219 | * @param list A pointer to a char** initially pointing to NULL that will | ||
| 220 | * hold a newly allocated list of UDIDs upon successful return. | ||
| 221 | * The caller is responsible for freeing the memory. Note that if | ||
| 222 | * no public key file was found the list has to be freed too as it | ||
| 223 | * points to a terminating NULL element. | ||
| 224 | * @param count The number of UDIDs found. This parameter can be NULL if it | ||
| 225 | * is not required. | ||
| 226 | * | ||
| 227 | * @return USERPREF_E_SUCCESS on success, or USERPREF_E_INVALID_ARG if the | ||
| 228 | * list parameter is not pointing to NULL. | ||
| 229 | */ | ||
| 230 | userpref_error_t userpref_get_paired_udids(char ***list, unsigned int *count) | ||
| 231 | { | ||
| 232 | DIR *config_dir; | ||
| 233 | const char *config_path = NULL; | ||
| 234 | unsigned int found = 0; | ||
| 235 | |||
| 236 | if (!list || (list && *list)) { | ||
| 237 | debug_info("ERROR: The list parameter needs to point to NULL!"); | ||
| 238 | return USERPREF_E_INVALID_ARG; | ||
| 239 | } | ||
| 240 | |||
| 241 | if (count) { | ||
| 242 | *count = 0; | ||
| 243 | } | ||
| 244 | *list = (char**)malloc(sizeof(char*)); | ||
| 245 | |||
| 246 | config_path = userpref_get_config_dir(); | ||
| 247 | config_dir = opendir(config_path); | ||
| 248 | if (config_dir) { | ||
| 249 | struct dirent *entry; | ||
| 250 | while ((entry = readdir(config_dir))) { | ||
| 251 | if (strcmp(entry->d_name, USERPREF_CONFIG_FILE) == 0) { | ||
| 252 | /* ignore SystemConfiguration.plist */ | ||
| 253 | continue; | ||
| 254 | } | ||
| 255 | char *ext = strrchr(entry->d_name, '.'); | ||
| 256 | if (ext && (strcmp(ext, USERPREF_CONFIG_EXTENSION) == 0)) { | ||
| 257 | size_t len = strlen(entry->d_name) - strlen(USERPREF_CONFIG_EXTENSION); | ||
| 258 | char **newlist = (char**)realloc(*list, sizeof(char*) * (found+2)); | ||
| 259 | if (!newlist) { | ||
| 260 | fprintf(stderr, "ERROR: Out of memory\n"); | ||
| 261 | break; | ||
| 262 | } | ||
| 263 | *list = newlist; | ||
| 264 | char *tmp = (char*)malloc(len+1); | ||
| 265 | if (tmp) { | ||
| 266 | strncpy(tmp, entry->d_name, len); | ||
| 267 | tmp[len] = '\0'; | ||
| 268 | } | ||
| 269 | (*list)[found] = tmp; | ||
| 270 | if (!tmp) { | ||
| 271 | fprintf(stderr, "ERROR: Out of memory\n"); | ||
| 272 | break; | ||
| 273 | } | ||
| 274 | found++; | ||
| 275 | } | ||
| 276 | } | ||
| 277 | closedir(config_dir); | ||
| 278 | } | ||
| 279 | (*list)[found] = NULL; | ||
| 280 | |||
| 281 | if (count) { | ||
| 282 | *count = found; | ||
| 283 | } | ||
| 284 | |||
| 285 | return USERPREF_E_SUCCESS; | ||
| 286 | } | ||
| 287 | |||
| 288 | /** | ||
| 289 | * Save a pair record for a device. | ||
| 290 | * | ||
| 291 | * @param udid The device UDID as given by the device | ||
| 292 | * @param device_id The usbmux device id (handle) of the connected device, or 0 | ||
| 293 | * @param pair_record The pair record to save | ||
| 294 | * | ||
| 295 | * @return 1 on success and 0 if no device record is given or if it has already | ||
| 296 | * been saved previously. | ||
| 297 | */ | ||
| 298 | userpref_error_t userpref_save_pair_record(const char *udid, uint32_t device_id, plist_t pair_record) | ||
| 299 | { | ||
| 300 | char* record_data = NULL; | ||
| 301 | uint32_t record_size = 0; | ||
| 302 | |||
| 303 | plist_to_bin(pair_record, &record_data, &record_size); | ||
| 304 | |||
| 305 | int res = usbmuxd_save_pair_record_with_device_id(udid, device_id, record_data, record_size); | ||
| 306 | |||
| 307 | free(record_data); | ||
| 308 | |||
| 309 | return res == 0 ? USERPREF_E_SUCCESS: USERPREF_E_UNKNOWN_ERROR; | ||
| 310 | } | ||
| 311 | |||
| 312 | /** | ||
| 313 | * Read a pair record for a device. | ||
| 314 | * | ||
| 315 | * @param udid The device UDID as given by the device | ||
| 316 | * @param pair_record The pair record to read | ||
| 317 | * | ||
| 318 | * @return USERPREF_E_SUCCESS on success, | ||
| 319 | * USERPREF_E_NOENT if no pairing record was found, | ||
| 320 | * USERPREF_E_READ_ERROR if retrieving the pairing record from usbmuxd failed, | ||
| 321 | * or USERPREF_E_INVALID_CONF otherwise. | ||
| 322 | */ | ||
| 323 | userpref_error_t userpref_read_pair_record(const char *udid, plist_t *pair_record) | ||
| 324 | { | ||
| 325 | char* record_data = NULL; | ||
| 326 | uint32_t record_size = 0; | ||
| 327 | |||
| 328 | int res = usbmuxd_read_pair_record(udid, &record_data, &record_size); | ||
| 329 | if (res < 0) { | ||
| 330 | free(record_data); | ||
| 331 | switch (-res) { | ||
| 332 | case ENOENT: | ||
| 333 | return USERPREF_E_NOENT; | ||
| 334 | case ETIMEDOUT: | ||
| 335 | return USERPREF_E_READ_ERROR; | ||
| 336 | default: | ||
| 337 | return USERPREF_E_INVALID_CONF; | ||
| 338 | } | ||
| 339 | } | ||
| 340 | |||
| 341 | *pair_record = NULL; | ||
| 342 | plist_from_memory(record_data, record_size, pair_record, NULL); | ||
| 343 | free(record_data); | ||
| 344 | |||
| 345 | if (!*pair_record) { | ||
| 346 | debug_info("Failed to parse pairing record"); | ||
| 347 | return USERPREF_E_INVALID_CONF; | ||
| 348 | } | ||
| 349 | return USERPREF_E_SUCCESS; | ||
| 350 | } | ||
| 351 | |||
| 352 | /** | ||
| 353 | * Remove the pairing record stored for a device from this host. | ||
| 354 | * | ||
| 355 | * @param udid The udid of the device | ||
| 356 | * | ||
| 357 | * @return USERPREF_E_SUCCESS on success. | ||
| 358 | */ | ||
| 359 | userpref_error_t userpref_delete_pair_record(const char *udid) | ||
| 360 | { | ||
| 361 | int res = usbmuxd_delete_pair_record(udid); | ||
| 362 | |||
| 363 | return res == 0 ? USERPREF_E_SUCCESS: USERPREF_E_UNKNOWN_ERROR; | ||
| 364 | } | ||
| 365 | |||
| 366 | #if defined(HAVE_OPENSSL) | ||
| 367 | static int X509_add_ext_helper(X509 *cert, int nid, char *value) | ||
| 368 | { | ||
| 369 | X509_EXTENSION *ex; | ||
| 370 | X509V3_CTX ctx; | ||
| 371 | |||
| 372 | /* No configuration database */ | ||
| 373 | X509V3_set_ctx_nodb(&ctx); | ||
| 374 | |||
| 375 | X509V3_set_ctx(&ctx, NULL, cert, NULL, NULL, 0); | ||
| 376 | ex = X509V3_EXT_conf_nid(NULL, &ctx, nid, value); | ||
| 377 | if (!ex) { | ||
| 378 | debug_info("ERROR: X509V3_EXT_conf_nid(%d, %s) failed", nid, value); | ||
| 379 | return 0; | ||
| 380 | } | ||
| 381 | |||
| 382 | X509_add_ext(cert, ex, -1); | ||
| 383 | X509_EXTENSION_free(ex); | ||
| 384 | |||
| 385 | return 1; | ||
| 386 | } | ||
| 387 | #elif defined(HAVE_MBEDTLS) | ||
| 388 | static int _mbedtls_x509write_crt_set_basic_constraints_critical(mbedtls_x509write_cert *ctx, int is_ca, int max_pathlen) | ||
| 389 | { | ||
| 390 | int ret; | ||
| 391 | unsigned char buf[9]; | ||
| 392 | unsigned char *c = buf + sizeof(buf); | ||
| 393 | size_t len = 0; | ||
| 394 | |||
| 395 | memset( buf, 0, sizeof(buf) ); | ||
| 396 | |||
| 397 | if (is_ca && max_pathlen > 127) | ||
| 398 | return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); | ||
| 399 | |||
| 400 | if (is_ca) { | ||
| 401 | if (max_pathlen >= 0) { | ||
| 402 | MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_int( &c, buf, max_pathlen ) ); | ||
| 403 | } | ||
| 404 | MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_bool( &c, buf, 1 ) ); | ||
| 405 | } | ||
| 406 | |||
| 407 | MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( &c, buf, len ) ); | ||
| 408 | MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( &c, buf, MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ); | ||
| 409 | |||
| 410 | return mbedtls_x509write_crt_set_extension( ctx, MBEDTLS_OID_BASIC_CONSTRAINTS, MBEDTLS_OID_SIZE( MBEDTLS_OID_BASIC_CONSTRAINTS ), 1, buf + sizeof(buf) - len, len ); | ||
| 411 | } | ||
| 412 | #endif | ||
| 413 | |||
| 414 | /** | ||
| 415 | * Private function to generate required private keys and certificates. | ||
| 416 | * | ||
| 417 | * @param pair_record a #PLIST_DICT that will be filled with the keys | ||
| 418 | * and certificates | ||
| 419 | * @param public_key the public key to use (device public key) | ||
| 420 | * | ||
| 421 | * @return 1 if keys were successfully generated, 0 otherwise | ||
| 422 | */ | ||
| 423 | userpref_error_t pair_record_generate_keys_and_certs(plist_t pair_record, key_data_t public_key, unsigned int device_version) | ||
| 424 | { | ||
| 425 | userpref_error_t ret = USERPREF_E_SSL_ERROR; | ||
| 426 | |||
| 427 | key_data_t dev_cert_pem = { NULL, 0 }; | ||
| 428 | key_data_t root_key_pem = { NULL, 0 }; | ||
| 429 | key_data_t root_cert_pem = { NULL, 0 }; | ||
| 430 | key_data_t host_key_pem = { NULL, 0 }; | ||
| 431 | key_data_t host_cert_pem = { NULL, 0 }; | ||
| 432 | |||
| 433 | if (!pair_record || !public_key.data) | ||
| 434 | return USERPREF_E_INVALID_ARG; | ||
| 435 | |||
| 436 | debug_info("Generating keys and certificates..."); | ||
| 437 | |||
| 438 | #if defined(HAVE_OPENSSL) | ||
| 439 | #if OPENSSL_VERSION_NUMBER >= 0x30000000L | ||
| 440 | EVP_PKEY* root_pkey = EVP_RSA_gen(2048); | ||
| 441 | EVP_PKEY* host_pkey = EVP_RSA_gen(2048); | ||
| 442 | #else | ||
| 443 | BIGNUM *e = BN_new(); | ||
| 444 | RSA* root_keypair = RSA_new(); | ||
| 445 | RSA* host_keypair = RSA_new(); | ||
| 446 | |||
| 447 | BN_set_word(e, 65537); | ||
| 448 | |||
| 449 | RSA_generate_key_ex(root_keypair, 2048, e, NULL); | ||
| 450 | RSA_generate_key_ex(host_keypair, 2048, e, NULL); | ||
| 451 | |||
| 452 | BN_free(e); | ||
| 453 | |||
| 454 | EVP_PKEY* root_pkey = EVP_PKEY_new(); | ||
| 455 | EVP_PKEY_assign_RSA(root_pkey, root_keypair); | ||
| 456 | |||
| 457 | EVP_PKEY* host_pkey = EVP_PKEY_new(); | ||
| 458 | EVP_PKEY_assign_RSA(host_pkey, host_keypair); | ||
| 459 | #endif | ||
| 460 | |||
| 461 | /* generate root certificate */ | ||
| 462 | X509* root_cert = X509_new(); | ||
| 463 | { | ||
| 464 | /* set serial number */ | ||
| 465 | ASN1_INTEGER* sn = ASN1_INTEGER_new(); | ||
| 466 | ASN1_INTEGER_set(sn, 0); | ||
| 467 | X509_set_serialNumber(root_cert, sn); | ||
| 468 | ASN1_INTEGER_free(sn); | ||
| 469 | |||
| 470 | /* set version */ | ||
| 471 | X509_set_version(root_cert, 2); | ||
| 472 | |||
| 473 | /* set x509v3 basic constraints */ | ||
| 474 | X509_add_ext_helper(root_cert, NID_basic_constraints, (char*)"critical,CA:TRUE"); | ||
| 475 | |||
| 476 | /* set key validity */ | ||
| 477 | ASN1_TIME* asn1time = ASN1_TIME_new(); | ||
| 478 | ASN1_TIME_set(asn1time, time(NULL)); | ||
| 479 | X509_set1_notBefore(root_cert, asn1time); | ||
| 480 | ASN1_TIME_set(asn1time, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 481 | X509_set1_notAfter(root_cert, asn1time); | ||
| 482 | ASN1_TIME_free(asn1time); | ||
| 483 | |||
| 484 | /* use root public key for root cert */ | ||
| 485 | X509_set_pubkey(root_cert, root_pkey); | ||
| 486 | |||
| 487 | /* sign root cert with root private key */ | ||
| 488 | X509_sign(root_cert, root_pkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? EVP_sha1() : EVP_sha256()); | ||
| 489 | } | ||
| 490 | |||
| 491 | /* create host certificate */ | ||
| 492 | X509* host_cert = X509_new(); | ||
| 493 | { | ||
| 494 | /* set serial number */ | ||
| 495 | ASN1_INTEGER* sn = ASN1_INTEGER_new(); | ||
| 496 | ASN1_INTEGER_set(sn, 0); | ||
| 497 | X509_set_serialNumber(host_cert, sn); | ||
| 498 | ASN1_INTEGER_free(sn); | ||
| 499 | |||
| 500 | /* set version */ | ||
| 501 | X509_set_version(host_cert, 2); | ||
| 502 | |||
| 503 | /* set x509v3 basic constraints */ | ||
| 504 | X509_add_ext_helper(host_cert, NID_basic_constraints, (char*)"critical,CA:FALSE"); | ||
| 505 | |||
| 506 | /* set x509v3 key usage */ | ||
| 507 | X509_add_ext_helper(host_cert, NID_key_usage, (char*)"critical,digitalSignature,keyEncipherment"); | ||
| 508 | |||
| 509 | /* set key validity */ | ||
| 510 | ASN1_TIME* asn1time = ASN1_TIME_new(); | ||
| 511 | ASN1_TIME_set(asn1time, time(NULL)); | ||
| 512 | X509_set1_notBefore(host_cert, asn1time); | ||
| 513 | ASN1_TIME_set(asn1time, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 514 | X509_set1_notAfter(host_cert, asn1time); | ||
| 515 | ASN1_TIME_free(asn1time); | ||
| 516 | |||
| 517 | /* use host public key for host cert */ | ||
| 518 | X509_set_pubkey(host_cert, host_pkey); | ||
| 519 | |||
| 520 | /* sign host cert with root private key */ | ||
| 521 | X509_sign(host_cert, root_pkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? EVP_sha1() : EVP_sha256()); | ||
| 522 | } | ||
| 523 | |||
| 524 | if (root_cert && root_pkey && host_cert && host_pkey) { | ||
| 525 | BIO* membp; | ||
| 526 | char *bdata; | ||
| 527 | |||
| 528 | membp = BIO_new(BIO_s_mem()); | ||
| 529 | if (PEM_write_bio_X509(membp, root_cert) > 0) { | ||
| 530 | root_cert_pem.size = BIO_get_mem_data(membp, &bdata); | ||
| 531 | root_cert_pem.data = (unsigned char*)malloc(root_cert_pem.size); | ||
| 532 | if (root_cert_pem.data) { | ||
| 533 | memcpy(root_cert_pem.data, bdata, root_cert_pem.size); | ||
| 534 | } | ||
| 535 | BIO_free(membp); | ||
| 536 | membp = NULL; | ||
| 537 | } | ||
| 538 | membp = BIO_new(BIO_s_mem()); | ||
| 539 | if (PEM_write_bio_PrivateKey(membp, root_pkey, NULL, NULL, 0, 0, NULL) > 0) { | ||
| 540 | root_key_pem.size = BIO_get_mem_data(membp, &bdata); | ||
| 541 | root_key_pem.data = (unsigned char*)malloc(root_key_pem.size); | ||
| 542 | if (root_key_pem.data) { | ||
| 543 | memcpy(root_key_pem.data, bdata, root_key_pem.size); | ||
| 544 | } | ||
| 545 | BIO_free(membp); | ||
| 546 | membp = NULL; | ||
| 547 | } | ||
| 548 | membp = BIO_new(BIO_s_mem()); | ||
| 549 | if (PEM_write_bio_X509(membp, host_cert) > 0) { | ||
| 550 | host_cert_pem.size = BIO_get_mem_data(membp, &bdata); | ||
| 551 | host_cert_pem.data = (unsigned char*)malloc(host_cert_pem.size); | ||
| 552 | if (host_cert_pem.data) { | ||
| 553 | memcpy(host_cert_pem.data, bdata, host_cert_pem.size); | ||
| 554 | } | ||
| 555 | BIO_free(membp); | ||
| 556 | membp = NULL; | ||
| 557 | } | ||
| 558 | membp = BIO_new(BIO_s_mem()); | ||
| 559 | if (PEM_write_bio_PrivateKey(membp, host_pkey, NULL, NULL, 0, 0, NULL) > 0) { | ||
| 560 | host_key_pem.size = BIO_get_mem_data(membp, &bdata); | ||
| 561 | host_key_pem.data = (unsigned char*)malloc(host_key_pem.size); | ||
| 562 | if (host_key_pem.data) { | ||
| 563 | memcpy(host_key_pem.data, bdata, host_key_pem.size); | ||
| 564 | } | ||
| 565 | BIO_free(membp); | ||
| 566 | membp = NULL; | ||
| 567 | } | ||
| 568 | } | ||
| 569 | |||
| 570 | EVP_PKEY *pubkey = NULL; | ||
| 571 | { | ||
| 572 | BIO *membp = BIO_new_mem_buf(public_key.data, public_key.size); | ||
| 573 | #if OPENSSL_VERSION_NUMBER >= 0x30000000L | ||
| 574 | if (!PEM_read_bio_PUBKEY(membp, &pubkey, NULL, NULL)) { | ||
| 575 | debug_info("WARNING: Could not read public key"); | ||
| 576 | } | ||
| 577 | #else | ||
| 578 | RSA *rsa_pubkey = NULL; | ||
| 579 | if (!PEM_read_bio_RSAPublicKey(membp, &rsa_pubkey, NULL, NULL)) { | ||
| 580 | debug_info("WARNING: Could not read public key"); | ||
| 581 | } else { | ||
| 582 | pubkey = EVP_PKEY_new(); | ||
| 583 | EVP_PKEY_assign_RSA(pubkey, rsa_pubkey); | ||
| 584 | } | ||
| 585 | #endif | ||
| 586 | BIO_free(membp); | ||
| 587 | } | ||
| 588 | |||
| 589 | X509* dev_cert = X509_new(); | ||
| 590 | if (pubkey && dev_cert) { | ||
| 591 | /* generate device certificate */ | ||
| 592 | ASN1_INTEGER* sn = ASN1_INTEGER_new(); | ||
| 593 | ASN1_INTEGER_set(sn, 0); | ||
| 594 | X509_set_serialNumber(dev_cert, sn); | ||
| 595 | ASN1_INTEGER_free(sn); | ||
| 596 | X509_set_version(dev_cert, 2); | ||
| 597 | |||
| 598 | X509_add_ext_helper(dev_cert, NID_basic_constraints, (char*)"critical,CA:FALSE"); | ||
| 599 | |||
| 600 | ASN1_TIME* asn1time = ASN1_TIME_new(); | ||
| 601 | ASN1_TIME_set(asn1time, time(NULL)); | ||
| 602 | X509_set1_notBefore(dev_cert, asn1time); | ||
| 603 | ASN1_TIME_set(asn1time, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 604 | X509_set1_notAfter(dev_cert, asn1time); | ||
| 605 | ASN1_TIME_free(asn1time); | ||
| 606 | |||
| 607 | X509_set_pubkey(dev_cert, pubkey); | ||
| 608 | |||
| 609 | X509_add_ext_helper(dev_cert, NID_subject_key_identifier, (char*)"hash"); | ||
| 610 | X509_add_ext_helper(dev_cert, NID_key_usage, (char*)"critical,digitalSignature,keyEncipherment"); | ||
| 611 | |||
| 612 | /* sign device certificate with root private key */ | ||
| 613 | if (X509_sign(dev_cert, root_pkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? EVP_sha1() : EVP_sha256())) { | ||
| 614 | /* if signing succeeded, export in PEM format */ | ||
| 615 | BIO* membp = BIO_new(BIO_s_mem()); | ||
| 616 | if (PEM_write_bio_X509(membp, dev_cert) > 0) { | ||
| 617 | char *bdata = NULL; | ||
| 618 | dev_cert_pem.size = BIO_get_mem_data(membp, &bdata); | ||
| 619 | dev_cert_pem.data = (unsigned char*)malloc(dev_cert_pem.size); | ||
| 620 | if (dev_cert_pem.data) { | ||
| 621 | memcpy(dev_cert_pem.data, bdata, dev_cert_pem.size); | ||
| 622 | } | ||
| 623 | BIO_free(membp); | ||
| 624 | membp = NULL; | ||
| 625 | } | ||
| 626 | } else { | ||
| 627 | debug_info("ERROR: Signing device certificate with root private key failed!"); | ||
| 628 | } | ||
| 629 | } | ||
| 630 | |||
| 631 | X509_free(dev_cert); | ||
| 632 | |||
| 633 | EVP_PKEY_free(pubkey); | ||
| 634 | EVP_PKEY_free(root_pkey); | ||
| 635 | EVP_PKEY_free(host_pkey); | ||
| 636 | |||
| 637 | X509_free(host_cert); | ||
| 638 | X509_free(root_cert); | ||
| 639 | #elif defined(HAVE_GNUTLS) | ||
| 640 | gnutls_x509_privkey_t root_privkey; | ||
| 641 | gnutls_x509_crt_t root_cert; | ||
| 642 | gnutls_x509_privkey_t host_privkey; | ||
| 643 | gnutls_x509_crt_t host_cert; | ||
| 644 | |||
| 645 | /* use less secure random to speed up key generation */ | ||
| 646 | gcry_control(GCRYCTL_ENABLE_QUICK_RANDOM); | ||
| 647 | |||
| 648 | gnutls_x509_privkey_init(&root_privkey); | ||
| 649 | gnutls_x509_privkey_init(&host_privkey); | ||
| 650 | |||
| 651 | gnutls_x509_crt_init(&root_cert); | ||
| 652 | gnutls_x509_crt_init(&host_cert); | ||
| 653 | |||
| 654 | /* generate root key */ | ||
| 655 | gnutls_x509_privkey_generate(root_privkey, GNUTLS_PK_RSA, 2048, 0); | ||
| 656 | gnutls_x509_privkey_generate(host_privkey, GNUTLS_PK_RSA, 2048, 0); | ||
| 657 | |||
| 658 | /* generate certificates */ | ||
| 659 | gnutls_x509_crt_set_key(root_cert, root_privkey); | ||
| 660 | gnutls_x509_crt_set_serial(root_cert, "\x01", 1); | ||
| 661 | gnutls_x509_crt_set_version(root_cert, 3); | ||
| 662 | gnutls_x509_crt_set_ca_status(root_cert, 1); | ||
| 663 | gnutls_x509_crt_set_activation_time(root_cert, time(NULL)); | ||
| 664 | gnutls_x509_crt_set_expiration_time(root_cert, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 665 | gnutls_x509_crt_sign2(root_cert, root_cert, root_privkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? GNUTLS_DIG_SHA1 : GNUTLS_DIG_SHA256, 0); | ||
| 666 | |||
| 667 | gnutls_x509_crt_set_key(host_cert, host_privkey); | ||
| 668 | gnutls_x509_crt_set_serial(host_cert, "\x01", 1); | ||
| 669 | gnutls_x509_crt_set_version(host_cert, 3); | ||
| 670 | gnutls_x509_crt_set_ca_status(host_cert, 0); | ||
| 671 | gnutls_x509_crt_set_key_usage(host_cert, GNUTLS_KEY_KEY_ENCIPHERMENT | GNUTLS_KEY_DIGITAL_SIGNATURE); | ||
| 672 | gnutls_x509_crt_set_activation_time(host_cert, time(NULL)); | ||
| 673 | gnutls_x509_crt_set_expiration_time(host_cert, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 674 | gnutls_x509_crt_sign2(host_cert, root_cert, root_privkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? GNUTLS_DIG_SHA1 : GNUTLS_DIG_SHA256, 0); | ||
| 675 | |||
| 676 | /* export to PEM format */ | ||
| 677 | size_t root_key_export_size = 0; | ||
| 678 | size_t host_key_export_size = 0; | ||
| 679 | |||
| 680 | gnutls_x509_privkey_export(root_privkey, GNUTLS_X509_FMT_PEM, NULL, &root_key_export_size); | ||
| 681 | gnutls_x509_privkey_export(host_privkey, GNUTLS_X509_FMT_PEM, NULL, &host_key_export_size); | ||
| 682 | |||
| 683 | root_key_pem.data = gnutls_malloc(root_key_export_size); | ||
| 684 | host_key_pem.data = gnutls_malloc(host_key_export_size); | ||
| 685 | |||
| 686 | gnutls_x509_privkey_export(root_privkey, GNUTLS_X509_FMT_PEM, root_key_pem.data, &root_key_export_size); | ||
| 687 | root_key_pem.size = root_key_export_size; | ||
| 688 | gnutls_x509_privkey_export(host_privkey, GNUTLS_X509_FMT_PEM, host_key_pem.data, &host_key_export_size); | ||
| 689 | host_key_pem.size = host_key_export_size; | ||
| 690 | |||
| 691 | size_t root_cert_export_size = 0; | ||
| 692 | size_t host_cert_export_size = 0; | ||
| 693 | |||
| 694 | gnutls_x509_crt_export(root_cert, GNUTLS_X509_FMT_PEM, NULL, &root_cert_export_size); | ||
| 695 | gnutls_x509_crt_export(host_cert, GNUTLS_X509_FMT_PEM, NULL, &host_cert_export_size); | ||
| 696 | |||
| 697 | root_cert_pem.data = gnutls_malloc(root_cert_export_size); | ||
| 698 | host_cert_pem.data = gnutls_malloc(host_cert_export_size); | ||
| 699 | |||
| 700 | gnutls_x509_crt_export(root_cert, GNUTLS_X509_FMT_PEM, root_cert_pem.data, &root_cert_export_size); | ||
| 701 | root_cert_pem.size = root_cert_export_size; | ||
| 702 | gnutls_x509_crt_export(host_cert, GNUTLS_X509_FMT_PEM, host_cert_pem.data, &host_cert_export_size); | ||
| 703 | host_cert_pem.size = host_cert_export_size; | ||
| 704 | |||
| 705 | gnutls_datum_t modulus = { NULL, 0 }; | ||
| 706 | gnutls_datum_t exponent = { NULL, 0 }; | ||
| 707 | |||
| 708 | /* now decode the PEM encoded key */ | ||
| 709 | gnutls_datum_t der_pub_key = { NULL, 0 }; | ||
| 710 | int gnutls_error = gnutls_pem_base64_decode_alloc("RSA PUBLIC KEY", &public_key, &der_pub_key); | ||
| 711 | if (GNUTLS_E_SUCCESS == gnutls_error) { | ||
| 712 | /* initalize asn.1 parser */ | ||
| 713 | ASN1_TYPE pkcs1 = ASN1_TYPE_EMPTY; | ||
| 714 | if (ASN1_SUCCESS == asn1_array2tree(pkcs1_asn1_tab, &pkcs1, NULL)) { | ||
| 715 | |||
| 716 | ASN1_TYPE asn1_pub_key = ASN1_TYPE_EMPTY; | ||
| 717 | asn1_create_element(pkcs1, "PKCS1.RSAPublicKey", &asn1_pub_key); | ||
| 718 | |||
| 719 | if (ASN1_SUCCESS == asn1_der_decoding(&asn1_pub_key, der_pub_key.data, der_pub_key.size, NULL)) { | ||
| 720 | |||
| 721 | /* get size to read */ | ||
| 722 | int ret1 = asn1_read_value(asn1_pub_key, "modulus", NULL, (int*)&modulus.size); | ||
| 723 | int ret2 = asn1_read_value(asn1_pub_key, "publicExponent", NULL, (int*)&exponent.size); | ||
| 724 | |||
| 725 | modulus.data = gnutls_malloc(modulus.size); | ||
| 726 | exponent.data = gnutls_malloc(exponent.size); | ||
| 727 | |||
| 728 | ret1 = asn1_read_value(asn1_pub_key, "modulus", modulus.data, (int*)&modulus.size); | ||
| 729 | ret2 = asn1_read_value(asn1_pub_key, "publicExponent", exponent.data, (int*)&exponent.size); | ||
| 730 | if (ret1 != ASN1_SUCCESS || ret2 != ASN1_SUCCESS) { | ||
| 731 | gnutls_free(modulus.data); | ||
| 732 | modulus.data = NULL; | ||
| 733 | modulus.size = 0; | ||
| 734 | gnutls_free(exponent.data); | ||
| 735 | exponent.data = NULL; | ||
| 736 | exponent.size = 0; | ||
| 737 | } | ||
| 738 | } | ||
| 739 | if (asn1_pub_key) | ||
| 740 | asn1_delete_structure(&asn1_pub_key); | ||
| 741 | } | ||
| 742 | if (pkcs1) | ||
| 743 | asn1_delete_structure(&pkcs1); | ||
| 744 | } else { | ||
| 745 | debug_info("ERROR: Could not parse public key: %s", gnutls_strerror(gnutls_error)); | ||
| 746 | } | ||
| 747 | |||
| 748 | /* generate device certificate */ | ||
| 749 | if (modulus.data && 0 != modulus.size && exponent.data && 0 != exponent.size) { | ||
| 750 | |||
| 751 | gnutls_datum_t prime_p = { (unsigned char*)"\x00\xca\x4a\x03\x13\xdf\x9d\x7a\xfd", 9 }; | ||
| 752 | gnutls_datum_t prime_q = { (unsigned char*)"\x00\xf2\xff\xe0\x15\xd1\x60\x37\x63", 9 }; | ||
| 753 | gnutls_datum_t coeff = { (unsigned char*)"\x32\x07\xf1\x68\x57\xdf\x9a\xf4", 8 }; | ||
| 754 | |||
| 755 | gnutls_x509_privkey_t fake_privkey; | ||
| 756 | gnutls_x509_crt_t dev_cert; | ||
| 757 | |||
| 758 | gnutls_x509_privkey_init(&fake_privkey); | ||
| 759 | gnutls_x509_crt_init(&dev_cert); | ||
| 760 | |||
| 761 | gnutls_error = gnutls_x509_privkey_import_rsa_raw(fake_privkey, &modulus, &exponent, &exponent, &prime_p, &prime_q, &coeff); | ||
| 762 | if (GNUTLS_E_SUCCESS == gnutls_error) { | ||
| 763 | /* now generate device certificate */ | ||
| 764 | gnutls_x509_crt_set_key(dev_cert, fake_privkey); | ||
| 765 | gnutls_x509_crt_set_serial(dev_cert, "\x01", 1); | ||
| 766 | gnutls_x509_crt_set_version(dev_cert, 3); | ||
| 767 | gnutls_x509_crt_set_ca_status(dev_cert, 0); | ||
| 768 | gnutls_x509_crt_set_activation_time(dev_cert, time(NULL)); | ||
| 769 | gnutls_x509_crt_set_expiration_time(dev_cert, time(NULL) + (60 * 60 * 24 * 365 * 10)); | ||
| 770 | |||
| 771 | /* use custom hash generation for compatibility with the "Apple ecosystem" */ | ||
| 772 | const gnutls_digest_algorithm_t dig_sha = (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? GNUTLS_DIG_SHA1 : GNUTLS_DIG_SHA256; | ||
| 773 | size_t hash_size = gnutls_hash_get_len(dig_sha); | ||
| 774 | unsigned char hash[hash_size]; | ||
| 775 | if (gnutls_hash_fast(dig_sha, der_pub_key.data, der_pub_key.size, (unsigned char*)&hash) < 0) { | ||
| 776 | debug_info("ERROR: Failed to generate SHA for public key"); | ||
| 777 | } else { | ||
| 778 | gnutls_x509_crt_set_subject_key_id(dev_cert, hash, hash_size); | ||
| 779 | } | ||
| 780 | |||
| 781 | gnutls_x509_crt_set_key_usage(dev_cert, GNUTLS_KEY_DIGITAL_SIGNATURE | GNUTLS_KEY_KEY_ENCIPHERMENT); | ||
| 782 | gnutls_error = gnutls_x509_crt_sign2(dev_cert, root_cert, root_privkey, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? GNUTLS_DIG_SHA1 : GNUTLS_DIG_SHA256, 0); | ||
| 783 | if (GNUTLS_E_SUCCESS == gnutls_error) { | ||
| 784 | /* if everything went well, export in PEM format */ | ||
| 785 | size_t export_size = 0; | ||
| 786 | gnutls_x509_crt_export(dev_cert, GNUTLS_X509_FMT_PEM, NULL, &export_size); | ||
| 787 | dev_cert_pem.data = gnutls_malloc(export_size); | ||
| 788 | gnutls_x509_crt_export(dev_cert, GNUTLS_X509_FMT_PEM, dev_cert_pem.data, &export_size); | ||
| 789 | dev_cert_pem.size = export_size; | ||
| 790 | } else { | ||
| 791 | debug_info("ERROR: Signing device certificate with root private key failed: %s", gnutls_strerror(gnutls_error)); | ||
| 792 | } | ||
| 793 | } else { | ||
| 794 | debug_info("ERROR: Failed to import RSA key data: %s", gnutls_strerror(gnutls_error)); | ||
| 795 | } | ||
| 796 | gnutls_x509_crt_deinit(dev_cert); | ||
| 797 | gnutls_x509_privkey_deinit(fake_privkey); | ||
| 798 | } | ||
| 799 | |||
| 800 | gnutls_x509_crt_deinit(root_cert); | ||
| 801 | gnutls_x509_crt_deinit(host_cert); | ||
| 802 | gnutls_x509_privkey_deinit(root_privkey); | ||
| 803 | gnutls_x509_privkey_deinit(host_privkey); | ||
| 804 | |||
| 805 | gnutls_free(modulus.data); | ||
| 806 | gnutls_free(exponent.data); | ||
| 807 | |||
| 808 | gnutls_free(der_pub_key.data); | ||
| 809 | #elif defined(HAVE_MBEDTLS) | ||
| 810 | time_t now = time(NULL); | ||
| 811 | struct tm* timestamp = gmtime(&now); | ||
| 812 | char notbefore[16]; | ||
| 813 | strftime(notbefore, sizeof(notbefore), "%Y%m%d%H%M%S", timestamp); | ||
| 814 | time_t then = now + 60 * 60 * 24 * 365 * 10; | ||
| 815 | char notafter[16]; | ||
| 816 | timestamp = gmtime(&then); | ||
| 817 | strftime(notafter, sizeof(notafter), "%Y%m%d%H%M%S", timestamp); | ||
| 818 | |||
| 819 | mbedtls_mpi sn; | ||
| 820 | mbedtls_mpi_init(&sn); | ||
| 821 | mbedtls_mpi_lset(&sn, 1); /* 0 doesn't work, so we have to use 1 (like GnuTLS) */ | ||
| 822 | |||
| 823 | mbedtls_ctr_drbg_context ctr_drbg; | ||
| 824 | mbedtls_ctr_drbg_init(&ctr_drbg); | ||
| 825 | |||
| 826 | mbedtls_pk_context root_pkey; | ||
| 827 | mbedtls_pk_init(&root_pkey); | ||
| 828 | |||
| 829 | mbedtls_pk_context host_pkey; | ||
| 830 | mbedtls_pk_init(&host_pkey); | ||
| 831 | |||
| 832 | mbedtls_pk_context dev_public_key; | ||
| 833 | mbedtls_pk_init(&dev_public_key); | ||
| 834 | |||
| 835 | mbedtls_entropy_context entropy; | ||
| 836 | mbedtls_entropy_init(&entropy); | ||
| 837 | |||
| 838 | mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, (const unsigned char *)"limd", 4); | ||
| 839 | |||
| 840 | /* ----- root key & cert ----- */ | ||
| 841 | ret = mbedtls_pk_setup(&root_pkey, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)); | ||
| 842 | if (ret != 0) { | ||
| 843 | debug_info("mbedtls_pk_setup returned -0x%04x", -ret); | ||
| 844 | goto cleanup; | ||
| 845 | } | ||
| 846 | |||
| 847 | ret = mbedtls_rsa_gen_key(mbedtls_pk_rsa(root_pkey), mbedtls_ctr_drbg_random, &ctr_drbg, 2048, 65537); | ||
| 848 | if (ret != 0) { | ||
| 849 | debug_info("mbedtls_rsa_gen_key returned -0x%04x", -ret); | ||
| 850 | goto cleanup; | ||
| 851 | } | ||
| 852 | |||
| 853 | mbedtls_x509write_cert cert; | ||
| 854 | mbedtls_x509write_crt_init(&cert); | ||
| 855 | |||
| 856 | /* set serial number */ | ||
| 857 | mbedtls_x509write_crt_set_serial(&cert, &sn); | ||
| 858 | |||
| 859 | /* set version */ | ||
| 860 | mbedtls_x509write_crt_set_version(&cert, 2); | ||
| 861 | |||
| 862 | /* set x509v3 basic constraints */ | ||
| 863 | _mbedtls_x509write_crt_set_basic_constraints_critical(&cert, 1, -1); | ||
| 864 | |||
| 865 | /* use root public key for root cert */ | ||
| 866 | mbedtls_x509write_crt_set_subject_key(&cert, &root_pkey); | ||
| 867 | |||
| 868 | /* set x509v3 subject key identifier */ | ||
| 869 | mbedtls_x509write_crt_set_subject_key_identifier(&cert); | ||
| 870 | |||
| 871 | /* set key validity */ | ||
| 872 | mbedtls_x509write_crt_set_validity(&cert, notbefore, notafter); | ||
| 873 | |||
| 874 | /* sign root cert with root private key */ | ||
| 875 | mbedtls_x509write_crt_set_issuer_key(&cert, &root_pkey); | ||
| 876 | mbedtls_x509write_crt_set_md_alg(&cert, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? MBEDTLS_MD_SHA1 : MBEDTLS_MD_SHA256); | ||
| 877 | |||
| 878 | unsigned char outbuf[16384]; | ||
| 879 | |||
| 880 | /* write root private key */ | ||
| 881 | mbedtls_pk_write_key_pem(&root_pkey, outbuf, sizeof(outbuf)); | ||
| 882 | root_key_pem.size = strlen((const char*)outbuf); | ||
| 883 | root_key_pem.data = malloc(root_key_pem.size+1); | ||
| 884 | memcpy(root_key_pem.data, outbuf, root_key_pem.size); | ||
| 885 | root_key_pem.data[root_key_pem.size] = '\0'; | ||
| 886 | |||
| 887 | /* write root certificate */ | ||
| 888 | mbedtls_x509write_crt_pem(&cert, outbuf, sizeof(outbuf), mbedtls_ctr_drbg_random, &ctr_drbg); | ||
| 889 | root_cert_pem.size = strlen((const char*)outbuf); | ||
| 890 | root_cert_pem.data = malloc(root_cert_pem.size+1); | ||
| 891 | memcpy(root_cert_pem.data, outbuf, root_cert_pem.size); | ||
| 892 | root_cert_pem.data[root_cert_pem.size] = '\0'; | ||
| 893 | |||
| 894 | mbedtls_x509write_crt_free(&cert); | ||
| 895 | |||
| 896 | |||
| 897 | /* ----- host key & cert ----- */ | ||
| 898 | ret = mbedtls_pk_setup(&host_pkey, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)); | ||
| 899 | if (ret != 0) { | ||
| 900 | debug_info("mbedtls_pk_setup returned -0x%04x", -ret); | ||
| 901 | goto cleanup; | ||
| 902 | } | ||
| 903 | |||
| 904 | ret = mbedtls_rsa_gen_key(mbedtls_pk_rsa(host_pkey), mbedtls_ctr_drbg_random, &ctr_drbg, 2048, 65537); | ||
| 905 | if (ret != 0) { | ||
| 906 | debug_info("mbedtls_rsa_gen_key returned -0x%04x", -ret); | ||
| 907 | goto cleanup; | ||
| 908 | } | ||
| 909 | |||
| 910 | mbedtls_x509write_crt_init(&cert); | ||
| 911 | |||
| 912 | /* set serial number */ | ||
| 913 | mbedtls_x509write_crt_set_serial(&cert, &sn); | ||
| 914 | |||
| 915 | /* set version */ | ||
| 916 | mbedtls_x509write_crt_set_version(&cert, 2); | ||
| 917 | |||
| 918 | /* set x509v3 basic constraints */ | ||
| 919 | _mbedtls_x509write_crt_set_basic_constraints_critical(&cert, 0, -1); | ||
| 920 | |||
| 921 | /* use host public key for host cert */ | ||
| 922 | mbedtls_x509write_crt_set_subject_key(&cert, &host_pkey); | ||
| 923 | |||
| 924 | /* set x509v3 subject key identifier */ | ||
| 925 | mbedtls_x509write_crt_set_subject_key_identifier(&cert); | ||
| 926 | |||
| 927 | /* set x509v3 key usage */ | ||
| 928 | mbedtls_x509write_crt_set_key_usage(&cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_KEY_ENCIPHERMENT); | ||
| 929 | |||
| 930 | /* set key validity */ | ||
| 931 | mbedtls_x509write_crt_set_validity(&cert, notbefore, notafter); | ||
| 932 | |||
| 933 | /* sign host cert with root private key */ | ||
| 934 | mbedtls_x509write_crt_set_issuer_key(&cert, &root_pkey); | ||
| 935 | mbedtls_x509write_crt_set_md_alg(&cert, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? MBEDTLS_MD_SHA1 : MBEDTLS_MD_SHA256); | ||
| 936 | |||
| 937 | /* write host private key */ | ||
| 938 | mbedtls_pk_write_key_pem(&host_pkey, outbuf, sizeof(outbuf)); | ||
| 939 | host_key_pem.size = strlen((const char*)outbuf); | ||
| 940 | host_key_pem.data = malloc(host_key_pem.size+1); | ||
| 941 | memcpy(host_key_pem.data, outbuf, host_key_pem.size); | ||
| 942 | host_key_pem.data[host_key_pem.size] = '\0'; | ||
| 943 | |||
| 944 | /* write host certificate */ | ||
| 945 | mbedtls_x509write_crt_pem(&cert, outbuf, sizeof(outbuf), mbedtls_ctr_drbg_random, &ctr_drbg); | ||
| 946 | host_cert_pem.size = strlen((const char*)outbuf); | ||
| 947 | host_cert_pem.data = malloc(host_cert_pem.size+1); | ||
| 948 | memcpy(host_cert_pem.data, outbuf, host_cert_pem.size); | ||
| 949 | host_cert_pem.data[host_cert_pem.size] = '\0'; | ||
| 950 | |||
| 951 | mbedtls_x509write_crt_free(&cert); | ||
| 952 | |||
| 953 | |||
| 954 | /* ----- device certificate ----- */ | ||
| 955 | unsigned char* pubkey_data = malloc(public_key.size+1); | ||
| 956 | if (!pubkey_data) { | ||
| 957 | debug_info("malloc() failed\n"); | ||
| 958 | goto cleanup; | ||
| 959 | } | ||
| 960 | memcpy(pubkey_data, public_key.data, public_key.size); | ||
| 961 | pubkey_data[public_key.size] = '\0'; | ||
| 962 | |||
| 963 | int pr = mbedtls_pk_parse_public_key(&dev_public_key, pubkey_data, public_key.size+1); | ||
| 964 | free(pubkey_data); | ||
| 965 | if (pr != 0) { | ||
| 966 | debug_info("Failed to read device public key: -0x%x\n", -pr); | ||
| 967 | goto cleanup; | ||
| 968 | } | ||
| 969 | |||
| 970 | mbedtls_x509write_crt_init(&cert); | ||
| 971 | |||
| 972 | /* set serial number */ | ||
| 973 | mbedtls_x509write_crt_set_serial(&cert, &sn); | ||
| 974 | |||
| 975 | /* set version */ | ||
| 976 | mbedtls_x509write_crt_set_version(&cert, 2); | ||
| 977 | |||
| 978 | /* set x509v3 basic constraints */ | ||
| 979 | _mbedtls_x509write_crt_set_basic_constraints_critical(&cert, 0, -1); | ||
| 980 | |||
| 981 | /* use root public key for dev cert subject key */ | ||
| 982 | mbedtls_x509write_crt_set_subject_key(&cert, &dev_public_key); | ||
| 983 | |||
| 984 | /* set x509v3 subject key identifier */ | ||
| 985 | mbedtls_x509write_crt_set_subject_key_identifier(&cert); | ||
| 986 | |||
| 987 | /* set x509v3 key usage */ | ||
| 988 | mbedtls_x509write_crt_set_key_usage(&cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_KEY_ENCIPHERMENT); | ||
| 989 | |||
| 990 | /* set key validity */ | ||
| 991 | mbedtls_x509write_crt_set_validity(&cert, notbefore, notafter); | ||
| 992 | |||
| 993 | /* sign device certificate with root private key */ | ||
| 994 | mbedtls_x509write_crt_set_issuer_key(&cert, &root_pkey); | ||
| 995 | mbedtls_x509write_crt_set_md_alg(&cert, (device_version < IDEVICE_DEVICE_VERSION(4,0,0)) ? MBEDTLS_MD_SHA1 : MBEDTLS_MD_SHA256); | ||
| 996 | |||
| 997 | /* write device certificate */ | ||
| 998 | mbedtls_x509write_crt_pem(&cert, outbuf, sizeof(outbuf), mbedtls_ctr_drbg_random, &ctr_drbg); | ||
| 999 | dev_cert_pem.size = strlen((const char*)outbuf); | ||
| 1000 | dev_cert_pem.data = malloc(dev_cert_pem.size+1); | ||
| 1001 | memcpy(dev_cert_pem.data, outbuf, dev_cert_pem.size); | ||
| 1002 | dev_cert_pem.data[dev_cert_pem.size] = '\0'; | ||
| 1003 | |||
| 1004 | mbedtls_x509write_crt_free(&cert); | ||
| 1005 | |||
| 1006 | /* cleanup */ | ||
| 1007 | cleanup: | ||
| 1008 | mbedtls_mpi_free(&sn); | ||
| 1009 | mbedtls_pk_free(&dev_public_key); | ||
| 1010 | mbedtls_entropy_free(&entropy); | ||
| 1011 | mbedtls_pk_free(&host_pkey); | ||
| 1012 | mbedtls_pk_free(&root_pkey); | ||
| 1013 | mbedtls_ctr_drbg_free(&ctr_drbg); | ||
| 1014 | #endif | ||
| 1015 | |||
| 1016 | /* make sure that we have all we need */ | ||
| 1017 | if (root_cert_pem.data && 0 != root_cert_pem.size | ||
| 1018 | && root_key_pem.data && 0 != root_key_pem.size | ||
| 1019 | && host_cert_pem.data && 0 != host_cert_pem.size | ||
| 1020 | && host_key_pem.data && 0 != host_key_pem.size | ||
| 1021 | && dev_cert_pem.data && 0 != dev_cert_pem.size) { | ||
| 1022 | /* now set keys and certificates */ | ||
| 1023 | pair_record_set_item_from_key_data(pair_record, USERPREF_DEVICE_CERTIFICATE_KEY, &dev_cert_pem); | ||
| 1024 | pair_record_set_item_from_key_data(pair_record, USERPREF_HOST_PRIVATE_KEY_KEY, &host_key_pem); | ||
| 1025 | pair_record_set_item_from_key_data(pair_record, USERPREF_HOST_CERTIFICATE_KEY, &host_cert_pem); | ||
| 1026 | pair_record_set_item_from_key_data(pair_record, USERPREF_ROOT_PRIVATE_KEY_KEY, &root_key_pem); | ||
| 1027 | pair_record_set_item_from_key_data(pair_record, USERPREF_ROOT_CERTIFICATE_KEY, &root_cert_pem); | ||
| 1028 | ret = USERPREF_E_SUCCESS; | ||
| 1029 | } | ||
| 1030 | |||
| 1031 | free(dev_cert_pem.data); | ||
| 1032 | free(root_key_pem.data); | ||
| 1033 | free(root_cert_pem.data); | ||
| 1034 | free(host_key_pem.data); | ||
| 1035 | free(host_cert_pem.data); | ||
| 1036 | |||
| 1037 | return ret; | ||
| 1038 | } | ||
| 1039 | |||
| 1040 | /** | ||
| 1041 | * Private function which import the given key into a gnutls structure. | ||
| 1042 | * | ||
| 1043 | * @param name The name of the private key to import. | ||
| 1044 | * @param key the gnutls key structure. | ||
| 1045 | * | ||
| 1046 | * @return 1 if the key was successfully imported. | ||
| 1047 | */ | ||
| 1048 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1049 | userpref_error_t pair_record_import_key_with_name(plist_t pair_record, const char* name, key_data_t* key) | ||
| 1050 | #elif defined(HAVE_GNUTLS) | ||
| 1051 | userpref_error_t pair_record_import_key_with_name(plist_t pair_record, const char* name, gnutls_x509_privkey_t key) | ||
| 1052 | #endif | ||
| 1053 | { | ||
| 1054 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1055 | if (!key) | ||
| 1056 | return USERPREF_E_SUCCESS; | ||
| 1057 | #endif | ||
| 1058 | userpref_error_t ret = USERPREF_E_INVALID_CONF; | ||
| 1059 | |||
| 1060 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1061 | ret = pair_record_get_item_as_key_data(pair_record, name, key); | ||
| 1062 | #elif defined(HAVE_GNUTLS) | ||
| 1063 | key_data_t pem = { NULL, 0 }; | ||
| 1064 | ret = pair_record_get_item_as_key_data(pair_record, name, &pem); | ||
| 1065 | if (ret == USERPREF_E_SUCCESS && GNUTLS_E_SUCCESS == gnutls_x509_privkey_import(key, &pem, GNUTLS_X509_FMT_PEM)) | ||
| 1066 | ret = USERPREF_E_SUCCESS; | ||
| 1067 | else | ||
| 1068 | ret = USERPREF_E_SSL_ERROR; | ||
| 1069 | |||
| 1070 | if (pem.data) | ||
| 1071 | free(pem.data); | ||
| 1072 | #endif | ||
| 1073 | return ret; | ||
| 1074 | } | ||
| 1075 | |||
| 1076 | /** | ||
| 1077 | * Private function which import the given certificate into a gnutls structure. | ||
| 1078 | * | ||
| 1079 | * @param name The name of the certificate to import. | ||
| 1080 | * @param cert the gnutls certificate structure. | ||
| 1081 | * | ||
| 1082 | * @return IDEVICE_E_SUCCESS if the certificate was successfully imported. | ||
| 1083 | */ | ||
| 1084 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1085 | userpref_error_t pair_record_import_crt_with_name(plist_t pair_record, const char* name, key_data_t* cert) | ||
| 1086 | #else | ||
| 1087 | userpref_error_t pair_record_import_crt_with_name(plist_t pair_record, const char* name, gnutls_x509_crt_t cert) | ||
| 1088 | #endif | ||
| 1089 | { | ||
| 1090 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1091 | if (!cert) | ||
| 1092 | return USERPREF_E_SUCCESS; | ||
| 1093 | #endif | ||
| 1094 | userpref_error_t ret = USERPREF_E_INVALID_CONF; | ||
| 1095 | |||
| 1096 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 1097 | ret = pair_record_get_item_as_key_data(pair_record, name, cert); | ||
| 1098 | #elif defined(HAVE_GNUTLS) | ||
| 1099 | key_data_t pem = { NULL, 0 }; | ||
| 1100 | ret = pair_record_get_item_as_key_data(pair_record, name, &pem); | ||
| 1101 | if (ret == USERPREF_E_SUCCESS && GNUTLS_E_SUCCESS == gnutls_x509_crt_import(cert, &pem, GNUTLS_X509_FMT_PEM)) | ||
| 1102 | ret = USERPREF_E_SUCCESS; | ||
| 1103 | else | ||
| 1104 | ret = USERPREF_E_SSL_ERROR; | ||
| 1105 | |||
| 1106 | if (pem.data) | ||
| 1107 | free(pem.data); | ||
| 1108 | #endif | ||
| 1109 | return ret; | ||
| 1110 | } | ||
| 1111 | |||
| 1112 | userpref_error_t pair_record_get_host_id(plist_t pair_record, char** host_id) | ||
| 1113 | { | ||
| 1114 | plist_t node = plist_dict_get_item(pair_record, USERPREF_HOST_ID_KEY); | ||
| 1115 | |||
| 1116 | if (node && plist_get_node_type(node) == PLIST_STRING) { | ||
| 1117 | plist_get_string_val(node, host_id); | ||
| 1118 | } | ||
| 1119 | |||
| 1120 | return USERPREF_E_SUCCESS; | ||
| 1121 | } | ||
| 1122 | |||
| 1123 | userpref_error_t pair_record_set_host_id(plist_t pair_record, const char* host_id) | ||
| 1124 | { | ||
| 1125 | plist_dict_set_item(pair_record, USERPREF_HOST_ID_KEY, plist_new_string(host_id)); | ||
| 1126 | |||
| 1127 | return USERPREF_E_SUCCESS; | ||
| 1128 | } | ||
| 1129 | |||
| 1130 | userpref_error_t pair_record_get_item_as_key_data(plist_t pair_record, const char* name, key_data_t *value) | ||
| 1131 | { | ||
| 1132 | if (!pair_record || !value) | ||
| 1133 | return USERPREF_E_INVALID_ARG; | ||
| 1134 | |||
| 1135 | userpref_error_t ret = USERPREF_E_SUCCESS; | ||
| 1136 | char* buffer = NULL; | ||
| 1137 | uint64_t length = 0; | ||
| 1138 | |||
| 1139 | plist_t node = plist_dict_get_item(pair_record, name); | ||
| 1140 | |||
| 1141 | if (node && plist_get_node_type(node) == PLIST_DATA) { | ||
| 1142 | plist_get_data_val(node, &buffer, &length); | ||
| 1143 | value->data = (unsigned char*)malloc(length+1); | ||
| 1144 | memcpy(value->data, buffer, length); | ||
| 1145 | value->data[length] = '\0'; | ||
| 1146 | value->size = length+1; | ||
| 1147 | free(buffer); | ||
| 1148 | buffer = NULL; | ||
| 1149 | } else { | ||
| 1150 | ret = USERPREF_E_INVALID_CONF; | ||
| 1151 | } | ||
| 1152 | |||
| 1153 | if (buffer) | ||
| 1154 | free(buffer); | ||
| 1155 | |||
| 1156 | return ret; | ||
| 1157 | } | ||
| 1158 | |||
| 1159 | userpref_error_t pair_record_set_item_from_key_data(plist_t pair_record, const char* name, key_data_t *value) | ||
| 1160 | { | ||
| 1161 | userpref_error_t ret = USERPREF_E_SUCCESS; | ||
| 1162 | |||
| 1163 | if (!pair_record || !value) { | ||
| 1164 | return USERPREF_E_INVALID_ARG; | ||
| 1165 | } | ||
| 1166 | |||
| 1167 | /* set new item */ | ||
| 1168 | plist_dict_set_item(pair_record, name, plist_new_data((char*)value->data, value->size)); | ||
| 1169 | |||
| 1170 | return ret; | ||
| 1171 | } | ||
| 1172 | |||
| diff --git a/common/userpref.h b/common/userpref.h new file mode 100644 index 0000000..9a1832c --- /dev/null +++ b/common/userpref.h | |||
| @@ -0,0 +1,89 @@ | |||
| 1 | /* | ||
| 2 | * userpref.h | ||
| 3 | * contains methods to access user specific certificates IDs and more. | ||
| 4 | * | ||
| 5 | * Copyright (c) 2013-2014 Martin Szulecki All Rights Reserved. | ||
| 6 | * Copyright (c) 2008 Jonathan Beck All Rights Reserved. | ||
| 7 | * | ||
| 8 | * This library is free software; you can redistribute it and/or | ||
| 9 | * modify it under the terms of the GNU Lesser General Public | ||
| 10 | * License as published by the Free Software Foundation; either | ||
| 11 | * version 2.1 of the License, or (at your option) any later version. | ||
| 12 | * | ||
| 13 | * This library is distributed in the hope that it will be useful, | ||
| 14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
| 15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
| 16 | * Lesser General Public License for more details. | ||
| 17 | * | ||
| 18 | * You should have received a copy of the GNU Lesser General Public | ||
| 19 | * License along with this library; if not, write to the Free Software | ||
| 20 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||
| 21 | */ | ||
| 22 | |||
| 23 | #ifndef __USERPREF_H | ||
| 24 | #define __USERPREF_H | ||
| 25 | |||
| 26 | #ifdef HAVE_CONFIG_H | ||
| 27 | #include <config.h> | ||
| 28 | #endif | ||
| 29 | |||
| 30 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 31 | typedef struct { | ||
| 32 | unsigned char *data; | ||
| 33 | unsigned int size; | ||
| 34 | } key_data_t; | ||
| 35 | #else | ||
| 36 | #include <gnutls/gnutls.h> | ||
| 37 | typedef gnutls_datum_t key_data_t; | ||
| 38 | #endif | ||
| 39 | |||
| 40 | #include <stdint.h> | ||
| 41 | #include <plist/plist.h> | ||
| 42 | |||
| 43 | #define USERPREF_DEVICE_CERTIFICATE_KEY "DeviceCertificate" | ||
| 44 | #define USERPREF_ESCROW_BAG_KEY "EscrowBag" | ||
| 45 | #define USERPREF_HOST_CERTIFICATE_KEY "HostCertificate" | ||
| 46 | #define USERPREF_ROOT_CERTIFICATE_KEY "RootCertificate" | ||
| 47 | #define USERPREF_HOST_PRIVATE_KEY_KEY "HostPrivateKey" | ||
| 48 | #define USERPREF_ROOT_PRIVATE_KEY_KEY "RootPrivateKey" | ||
| 49 | #define USERPREF_HOST_ID_KEY "HostID" | ||
| 50 | #define USERPREF_SYSTEM_BUID_KEY "SystemBUID" | ||
| 51 | #define USERPREF_WIFI_MAC_ADDRESS_KEY "WiFiMACAddress" | ||
| 52 | |||
| 53 | /** Error Codes */ | ||
| 54 | typedef enum { | ||
| 55 | USERPREF_E_SUCCESS = 0, | ||
| 56 | USERPREF_E_INVALID_ARG = -1, | ||
| 57 | USERPREF_E_NOENT = -2, | ||
| 58 | USERPREF_E_INVALID_CONF = -3, | ||
| 59 | USERPREF_E_SSL_ERROR = -4, | ||
| 60 | USERPREF_E_READ_ERROR = -5, | ||
| 61 | USERPREF_E_WRITE_ERROR = -6, | ||
| 62 | USERPREF_E_UNKNOWN_ERROR = -256 | ||
| 63 | } userpref_error_t; | ||
| 64 | |||
| 65 | const char *userpref_get_config_dir(void); | ||
| 66 | int userpref_read_system_buid(char **system_buid); | ||
| 67 | userpref_error_t userpref_read_pair_record(const char *udid, plist_t *pair_record); | ||
| 68 | userpref_error_t userpref_save_pair_record(const char *udid, uint32_t device_id, plist_t pair_record); | ||
| 69 | userpref_error_t userpref_delete_pair_record(const char *udid); | ||
| 70 | |||
| 71 | userpref_error_t pair_record_generate_keys_and_certs(plist_t pair_record, key_data_t public_key, unsigned int device_version); | ||
| 72 | #if defined(HAVE_OPENSSL) || defined(HAVE_MBEDTLS) | ||
| 73 | userpref_error_t pair_record_import_key_with_name(plist_t pair_record, const char* name, key_data_t* key); | ||
| 74 | userpref_error_t pair_record_import_crt_with_name(plist_t pair_record, const char* name, key_data_t* cert); | ||
| 75 | #else | ||
| 76 | userpref_error_t pair_record_import_key_with_name(plist_t pair_record, const char* name, gnutls_x509_privkey_t key); | ||
| 77 | userpref_error_t pair_record_import_crt_with_name(plist_t pair_record, const char* name, gnutls_x509_crt_t cert); | ||
| 78 | #endif | ||
| 79 | |||
| 80 | userpref_error_t pair_record_get_host_id(plist_t pair_record, char** host_id); | ||
| 81 | userpref_error_t pair_record_set_host_id(plist_t pair_record, const char* host_id); | ||
| 82 | userpref_error_t pair_record_get_item_as_key_data(plist_t pair_record, const char* name, key_data_t *value); | ||
| 83 | userpref_error_t pair_record_set_item_from_key_data(plist_t pair_record, const char* name, key_data_t *value); | ||
| 84 | |||
| 85 | /* deprecated */ | ||
| 86 | userpref_error_t userpref_get_paired_udids(char ***list, unsigned int *count); | ||
| 87 | int userpref_has_pair_record(const char *udid); | ||
| 88 | |||
| 89 | #endif | ||
