1 /*
2 * Copyright (c) 2021 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "bundle_verify_mgr.h"
17
18 #include <map>
19
20 #include "app_log_wrapper.h"
21 #include "bundle_constants.h"
22 #include "interfaces/hap_verify.h"
23 #include "ipc_skeleton.h"
24
25 using namespace OHOS::Security::Verify;
26
27 namespace OHOS {
28 namespace AppExecFwk {
29 namespace {
30 const std::map<int32_t, ErrCode> HAP_VERIFY_ERR_MAP = {
31 {HapVerifyResultCode::VERIFY_SUCCESS, ERR_OK},
32 {HapVerifyResultCode::FILE_PATH_INVALID, ERR_APPEXECFWK_INSTALL_FAILED_INVALID_SIGNATURE_FILE_PATH},
33 {HapVerifyResultCode::OPEN_FILE_ERROR, ERR_APPEXECFWK_INSTALL_FAILED_BAD_BUNDLE_SIGNATURE_FILE},
34 {HapVerifyResultCode::SIGNATURE_NOT_FOUND, ERR_APPEXECFWK_INSTALL_FAILED_NO_BUNDLE_SIGNATURE},
35 {HapVerifyResultCode::VERIFY_APP_PKCS7_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_VERIFY_APP_PKCS7_FAIL},
36 {HapVerifyResultCode::PROFILE_PARSE_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_PROFILE_PARSE_FAIL},
37 {HapVerifyResultCode::APP_SOURCE_NOT_TRUSTED, ERR_APPEXECFWK_INSTALL_FAILED_APP_SOURCE_NOT_TRUESTED},
38 {HapVerifyResultCode::GET_DIGEST_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_BAD_DIGEST},
39 {HapVerifyResultCode::VERIFY_INTEGRITY_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_BUNDLE_INTEGRITY_VERIFICATION_FAILURE},
40 {HapVerifyResultCode::FILE_SIZE_TOO_LARGE, ERR_APPEXECFWK_INSTALL_FAILED_FILE_SIZE_TOO_LARGE},
41 {HapVerifyResultCode::GET_PUBLICKEY_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_BAD_PUBLICKEY},
42 {HapVerifyResultCode::GET_SIGNATURE_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_BAD_BUNDLE_SIGNATURE},
43 {HapVerifyResultCode::NO_PROFILE_BLOCK_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_NO_PROFILE_BLOCK_FAIL},
44 {HapVerifyResultCode::VERIFY_SIGNATURE_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_BUNDLE_SIGNATURE_VERIFICATION_FAILURE},
45 {HapVerifyResultCode::VERIFY_SOURCE_INIT_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_VERIFY_SOURCE_INIT_FAIL}
46 };
47 } // namespace
48
HapVerify(const std::string & filePath,HapVerifyResult & hapVerifyResult)49 ErrCode BundleVerifyMgr::HapVerify(const std::string &filePath, HapVerifyResult &hapVerifyResult)
50 {
51 auto ret = Security::Verify::HapVerify(filePath, hapVerifyResult);
52 APP_LOGI("HapVerify result %{public}d", ret);
53 if (HAP_VERIFY_ERR_MAP.find(ret) == HAP_VERIFY_ERR_MAP.end()) {
54 return ERR_APPEXECFWK_INSTALL_INTERNAL_ERROR;
55 }
56 return HAP_VERIFY_ERR_MAP.at(ret);
57 }
58
59 bool BundleVerifyMgr::isDebug_ = false;
60
EnableDebug()61 void BundleVerifyMgr::EnableDebug()
62 {
63 if (isDebug_) {
64 APP_LOGD("verify mode is already debug mode");
65 return;
66 }
67 if (!Security::Verify::EnableDebugMode()) {
68 APP_LOGE("start debug mode failed");
69 return;
70 }
71 isDebug_ = true;
72 }
73
DisableDebug()74 void BundleVerifyMgr::DisableDebug()
75 {
76 if (!isDebug_) {
77 APP_LOGD("verify mode is already signature mode");
78 return;
79 }
80 Security::Verify::DisableDebugMode();
81 isDebug_ = false;
82 }
83
ParseHapProfile(const std::string & filePath,HapVerifyResult & hapVerifyResult)84 ErrCode BundleVerifyMgr::ParseHapProfile(const std::string &filePath, HapVerifyResult &hapVerifyResult)
85 {
86 auto ret = Security::Verify::ParseHapProfile(filePath, hapVerifyResult);
87 APP_LOGI("ParseHapProfile result %{public}d", ret);
88 if (HAP_VERIFY_ERR_MAP.find(ret) == HAP_VERIFY_ERR_MAP.end()) {
89 return ERR_APPEXECFWK_INSTALL_INTERNAL_ERROR;
90 }
91 return HAP_VERIFY_ERR_MAP.at(ret);
92 }
93 } // namespace AppExecFwk
94 } // namespace OHOS