Andrew Kelley d603121dc3 std.crypto.Certificate.Bundle.macos: rework
- use ArrayList strategically to reduce allocations
- use a BufferedReader to avoid unnecessary memcpy of the certs
- use for loops
- skip certs with invalid magic instead of asserting
2025-07-01 16:35:29 -07:00

126 lines
4.0 KiB
Zig

const std = @import("std");
const assert = std.debug.assert;
const fs = std.fs;
const mem = std.mem;
const Allocator = std.mem.Allocator;
const Bundle = @import("../Bundle.zig");
pub const RescanMacError = Allocator.Error || fs.File.OpenError || fs.File.ReadError || fs.File.SeekError || Bundle.ParseCertError || error{EndOfStream};
pub fn rescanMac(cb: *Bundle, gpa: Allocator) RescanMacError!void {
cb.bytes.clearRetainingCapacity();
cb.map.clearRetainingCapacity();
const keychainPaths = [2][]const u8{
"/System/Library/Keychains/SystemRootCertificates.keychain",
"/Library/Keychains/System.keychain",
};
const now_sec = std.time.timestamp();
var records: std.ArrayListUnmanaged(u32) = .empty;
defer records.deinit(gpa);
var tables: std.ArrayListUnmanaged(u32) = .empty;
defer tables.deinit(gpa);
for (keychainPaths) |keychainPath| {
const file = try fs.openFileAbsolute(keychainPath, .{});
defer file.close();
var in_buffer: [256]u8 = undefined;
comptime assert(in_buffer.len > @sizeOf(ApplDbHeader));
comptime assert(in_buffer.len > @sizeOf(ApplDbSchema));
comptime assert(in_buffer.len > @sizeOf(TableHeader));
comptime assert(in_buffer.len > @sizeOf(X509CertHeader));
var file_reader = file.reader();
var br = file_reader.interface().buffered(&in_buffer);
const db_header = try br.takeStructEndian(ApplDbHeader, .big);
if (!mem.eql(u8, &db_header.signature, "kych")) continue;
try file_reader.seekTo(db_header.schema_offset);
br = file_reader.interface().buffered(&in_buffer);
const db_schema = try br.takeStructEndian(ApplDbSchema, .big);
try tables.resize(db_schema.table_count);
for (tables.items) |*offset| offset.* = try br.takeInt(u32, .big);
for (tables.items) |table_offset| {
try file_reader.seekTo(db_header.schema_offset + table_offset);
br = file_reader.interface().buffered(&in_buffer);
const table_header = try br.takeStructEndian(TableHeader, .big);
if (@as(std.c.DB_RECORDTYPE, @enumFromInt(table_header.table_id)) != .X509_CERTIFICATE) {
continue;
}
try records.resize(gpa, table_header.record_count);
for (records.items) |*offset| offset.* = try br.takeInt(u32, .big);
for (records.items) |record_offset| {
// An offset of zero means that the record is not present.
// An offset that is not 4-byte-aligned is invalid.
if (record_offset == 0 or record_offset % 4 != 0) continue;
try file_reader.seekTo(db_header.schema_offset + table_offset + record_offset);
br = file_reader.interface().buffered(&in_buffer);
const cert_header = try br.takeStructEndian(X509CertHeader, .big);
if (cert_header.cert_size == 0) continue;
const cert_start: u32 = @intCast(cb.bytes.items.len);
const dest_buf = try cb.bytes.addManyAsSlice(gpa, cert_header.cert_size);
try br.readSlice(dest_buf);
try cb.parseCert(gpa, cert_start, now_sec);
}
}
}
cb.bytes.shrinkAndFree(gpa, cb.bytes.items.len);
}
const ApplDbHeader = extern struct {
signature: [4]u8,
version: u32,
header_size: u32,
schema_offset: u32,
auth_offset: u32,
};
const ApplDbSchema = extern struct {
schema_size: u32,
table_count: u32,
};
const TableHeader = extern struct {
table_size: u32,
table_id: u32,
record_count: u32,
records: u32,
indexes_offset: u32,
free_list_head: u32,
record_numbers_count: u32,
};
const X509CertHeader = extern struct {
record_size: u32,
record_number: u32,
unknown1: u32,
unknown2: u32,
cert_size: u32,
unknown3: u32,
cert_type: u32,
cert_encoding: u32,
print_name: u32,
alias: u32,
subject: u32,
issuer: u32,
serial_number: u32,
subject_key_identifier: u32,
public_key_hash: u32,
};