mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
84 lines
2.2 KiB
Go
84 lines
2.2 KiB
Go
|
// Copyright 2011 The Go Authors. All rights reserved.
|
||
|
// Use of this source code is governed by a BSD-style
|
||
|
// license that can be found in the LICENSE file.
|
||
|
|
||
|
// +build darwin,cgo
|
||
|
|
||
|
package x509
|
||
|
|
||
|
/*
|
||
|
#cgo CFLAGS: -mmacosx-version-min=10.6 -D__MAC_OS_X_VERSION_MAX_ALLOWED=1060
|
||
|
#cgo LDFLAGS: -framework CoreFoundation -framework Security
|
||
|
|
||
|
#include <CoreFoundation/CoreFoundation.h>
|
||
|
#include <Security/Security.h>
|
||
|
|
||
|
// FetchPEMRootsCTX509 fetches the system's list of trusted X.509 root certificates.
|
||
|
//
|
||
|
// On success it returns 0 and fills pemRoots with a CFDataRef that contains the extracted root
|
||
|
// certificates of the system. On failure, the function returns -1.
|
||
|
//
|
||
|
// Note: The CFDataRef returned in pemRoots must be released (using CFRelease) after
|
||
|
// we've consumed its content.
|
||
|
int FetchPEMRootsCTX509(CFDataRef *pemRoots) {
|
||
|
if (pemRoots == NULL) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
CFArrayRef certs = NULL;
|
||
|
OSStatus err = SecTrustCopyAnchorCertificates(&certs);
|
||
|
if (err != noErr) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
CFMutableDataRef combinedData = CFDataCreateMutable(kCFAllocatorDefault, 0);
|
||
|
int i, ncerts = CFArrayGetCount(certs);
|
||
|
for (i = 0; i < ncerts; i++) {
|
||
|
CFDataRef data = NULL;
|
||
|
SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i);
|
||
|
if (cert == NULL) {
|
||
|
continue;
|
||
|
}
|
||
|
|
||
|
// Note: SecKeychainItemExport is deprecated as of 10.7 in favor of SecItemExport.
|
||
|
// Once we support weak imports via cgo we should prefer that, and fall back to this
|
||
|
// for older systems.
|
||
|
err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data);
|
||
|
if (err != noErr) {
|
||
|
continue;
|
||
|
}
|
||
|
|
||
|
if (data != NULL) {
|
||
|
CFDataAppendBytes(combinedData, CFDataGetBytePtr(data), CFDataGetLength(data));
|
||
|
CFRelease(data);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
CFRelease(certs);
|
||
|
|
||
|
*pemRoots = combinedData;
|
||
|
return 0;
|
||
|
}
|
||
|
*/
|
||
|
import "C"
|
||
|
import "unsafe"
|
||
|
|
||
|
func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
|
||
|
return nil, nil
|
||
|
}
|
||
|
|
||
|
func initSystemRoots() {
|
||
|
roots := NewCertPool()
|
||
|
|
||
|
var data C.CFDataRef = nil
|
||
|
err := C.FetchPEMRootsCTX509(&data)
|
||
|
if err == -1 {
|
||
|
return
|
||
|
}
|
||
|
|
||
|
defer C.CFRelease(C.CFTypeRef(data))
|
||
|
buf := C.GoBytes(unsafe.Pointer(C.CFDataGetBytePtr(data)), C.int(C.CFDataGetLength(data)))
|
||
|
roots.AppendCertsFromPEM(buf)
|
||
|
systemRoots = roots
|
||
|
}
|