1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "cert_verify.h"
17
18 #include <sys/stat.h>
19 #include "dump.h"
20 #include "openssl_util.h"
21 #include "pkg_utils.h"
22 #include "utils.h"
23
24 using namespace std;
25 using namespace Updater;
26 namespace Hpackage {
RegisterCertHelper(void)27 extern "C" __attribute__((constructor)) void RegisterCertHelper(void)
28 {
29 CertVerify::GetInstance().RegisterCertHelper(std::make_unique<SingleCertHelper>());
30 }
31
RegisterCertHelper(std::unique_ptr<CertHelper> ptr)32 void CertVerify::RegisterCertHelper(std::unique_ptr<CertHelper> ptr)
33 {
34 helper_ = std::move(ptr);
35 }
36
GetInstance()37 CertVerify &CertVerify::GetInstance()
38 {
39 static CertVerify certVerify;
40 return certVerify;
41 }
42
Init()43 int32_t CertVerify::Init()
44 {
45 if (helper_ == nullptr) {
46 PKG_LOGE("helper_ null error");
47 return -1;
48 }
49 return helper_->Init();
50 }
51
CheckCertChain(STACK_OF (X509)* certStack,X509 * cert)52 int32_t CertVerify::CheckCertChain(STACK_OF(X509) *certStack, X509 *cert)
53 {
54 if (helper_ == nullptr) {
55 PKG_LOGE("helper_ null error");
56 return -1;
57 }
58 return helper_->CertChainCheck(certStack, cert);
59 }
60
~SingleCertHelper()61 SingleCertHelper::~SingleCertHelper()
62 {
63 if (rootInfo_.rootCert != nullptr) {
64 X509_free(rootInfo_.rootCert);
65 }
66 }
67
Init()68 int32_t SingleCertHelper::Init()
69 {
70 int32_t ret = InitRootCert();
71 if (ret != 0) {
72 PKG_LOGE("Init root cert fail");
73 return -1;
74 }
75 return 0;
76 }
77
CertChainCheck(STACK_OF (X509)* certStack,X509 * cert)78 int32_t SingleCertHelper::CertChainCheck(STACK_OF(X509) * certStack, X509 *cert)
79 {
80 UNUSED(certStack);
81 if (cert == nullptr) {
82 return -1;
83 }
84
85 return VerifySingleCert(cert);
86 }
87
InitRootCert()88 int32_t SingleCertHelper::InitRootCert()
89 {
90 #ifndef DIFF_PATCH_SDK
91 X509 *rootCert = GetX509CertFromPemFile(Utils::GetCertName());
92 if (rootCert == nullptr) {
93 PKG_LOGE("Get root cert fail, file: %s", Utils::GetCertName().c_str());
94 UPDATER_LAST_WORD(-1);
95 return -1;
96 }
97 if (rootInfo_.rootCert != nullptr) {
98 X509_free(rootInfo_.rootCert);
99 rootInfo_.rootCert = nullptr;
100 }
101 rootInfo_.rootCert = rootCert;
102 rootInfo_.subject = GetX509CertSubjectName(rootCert);
103 rootInfo_.issuer = GetX509CertIssuerName(rootCert);
104 #endif
105
106 return 0;
107 }
108
VerifySingleCert(X509 * cert)109 int32_t SingleCertHelper::VerifySingleCert(X509 *cert)
110 {
111 int32_t ret = CompareCertSubjectAndIssuer(cert);
112 if (ret != 0) {
113 PKG_LOGE("compare cert subject and issuer fail");
114 return -1;
115 }
116
117 return ((VerifyX509CertByIssuerCert(cert, rootInfo_.rootCert)) ? 0 : -1);
118 }
119
CompareCertSubjectAndIssuer(X509 * cert)120 int32_t SingleCertHelper::CompareCertSubjectAndIssuer(X509 *cert)
121 {
122 string certSubject = GetX509CertSubjectName(cert);
123 string certIssuer = GetX509CertIssuerName(cert);
124 if (rootInfo_.subject.compare(certSubject) == 0 &&
125 rootInfo_.issuer.compare(certIssuer) == 0) {
126 return 0;
127 }
128
129 return -1;
130 }
131
Init()132 int32_t CertHelper::Init()
133 {
134 return 0;
135 }
136 } // namespace Hpackage
137