1// 2// trustAnchors.c 3// 4// To build and run this tool (from Terminal): 5// cc -framework Security -framework CoreFoundation -o trustAnchors trustAnchors.c 6// ./trustAnchors 7// 8#include <CoreFoundation/CoreFoundation.h> 9#include <Security/Security.h> 10#include <CoreServices/CoreServices.h> 11 12#include <stdlib.h> 13#include <string.h> 14#include <syslog.h> 15#include <unistd.h> 16#include <time.h> 17 18/* Following is a 3-element certificate chain 19 * (ROOT_CERT, INTERMEDIATE_CERT, LEAF_CERT) 20 */ 21unsigned char ROOT_CERT[985]={ 22 0x30,0x82,0x03,0xD5,0x30,0x82,0x02,0xBD,0xA0,0x03,0x02,0x01,0x02,0x02,0x01,0x01, 23 0x30,0x0B,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x30,0x81,0x9D, 24 0x31,0x1A,0x30,0x18,0x06,0x03,0x55,0x04,0x03,0x0C,0x11,0x54,0x65,0x73,0x74,0x2D, 25 0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D,0x52,0x4F,0x4F,0x54,0x31,0x0E,0x30,0x0C, 26 0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41,0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12, 27 0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43,0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70, 28 0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31, 29 0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10, 30 0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43,0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F, 31 0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16, 32 0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74,0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72, 33 0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x30,0x1E,0x17, 34 0x0D,0x30,0x39,0x31,0x32,0x31,0x38,0x31,0x37,0x32,0x39,0x32,0x33,0x5A,0x17,0x0D, 35 0x31,0x30,0x31,0x32,0x31,0x38,0x31,0x37,0x32,0x39,0x32,0x33,0x5A,0x30,0x81,0x9D, 36 0x31,0x1A,0x30,0x18,0x06,0x03,0x55,0x04,0x03,0x0C,0x11,0x54,0x65,0x73,0x74,0x2D, 37 0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D,0x52,0x4F,0x4F,0x54,0x31,0x0E,0x30,0x0C, 38 0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41,0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12, 39 0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43,0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70, 40 0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31, 41 0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10, 42 0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43,0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F, 43 0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16, 44 0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74,0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72, 45 0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x30,0x82,0x01, 46 0x22,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x01,0x05,0x00, 47 0x03,0x82,0x01,0x0F,0x00,0x30,0x82,0x01,0x0A,0x02,0x82,0x01,0x01,0x00,0xB0,0x4C, 48 0x94,0xF7,0x56,0x26,0x91,0xB8,0xD1,0x5B,0x7C,0xEE,0x74,0xCB,0x1F,0x43,0xFE,0x88, 49 0x24,0xAD,0xB0,0x1E,0x85,0x86,0xE9,0x3F,0xE7,0x74,0x40,0x6C,0x4A,0x8E,0x6B,0x50, 50 0x7A,0x1B,0x43,0x9A,0x9E,0xF4,0x81,0xB3,0xF1,0xDB,0x6E,0xD4,0xFA,0xAE,0x06,0xCB, 51 0x7F,0xE6,0xCA,0x06,0x06,0xC4,0x1E,0x2D,0xF3,0xFA,0x67,0xD6,0x95,0x0E,0xAC,0xCA, 52 0x2B,0x25,0x14,0x4C,0x20,0x04,0xB4,0x26,0xAC,0x15,0x62,0x15,0xA6,0x21,0x14,0x51, 53 0xCC,0x77,0x82,0x11,0xD0,0xF8,0xB0,0x06,0xC1,0x0F,0xFB,0x08,0x60,0x53,0x11,0x1F, 54 0x00,0xA8,0x27,0x0E,0x2C,0x2C,0x63,0x34,0x6A,0xC5,0x4B,0x2D,0xCC,0x07,0xF6,0x39, 55 0xDC,0x00,0xCF,0x6E,0x29,0x15,0x3E,0x3F,0x6C,0x89,0xB9,0x48,0x97,0x19,0xA2,0xB8, 56 0x44,0x8D,0x98,0x85,0xF4,0x0B,0x70,0x06,0xD6,0x9A,0x39,0x4F,0x44,0x92,0x73,0x74, 57 0xDF,0x46,0x10,0x9C,0xB5,0xBB,0x69,0xF4,0xE1,0xB5,0x61,0x2E,0xFF,0x92,0xDB,0x47, 58 0x93,0x48,0x45,0xEB,0x7E,0xFA,0xCC,0xDB,0xCE,0x50,0x0A,0xCA,0xAF,0xAB,0x7D,0x09, 59 0x9A,0x1E,0xC4,0x08,0xA1,0xD4,0xB9,0x2A,0x42,0x49,0x10,0x75,0x63,0x4E,0x51,0x3B, 60 0xF7,0xF4,0xCA,0xCB,0x05,0xC9,0xE0,0xC9,0xD3,0x04,0x14,0x81,0xF6,0x9A,0xEE,0x0C, 61 0x2B,0x56,0x87,0x20,0x50,0x27,0x14,0x71,0x1C,0x30,0x18,0x8C,0xDD,0xF4,0xA9,0x41, 62 0x13,0x6D,0xE4,0x41,0xB1,0xE0,0x7E,0x09,0xD7,0x99,0xCE,0xE4,0x7A,0x91,0x65,0xBB, 63 0x3F,0xE1,0xD4,0x07,0x8D,0xA9,0x23,0x0A,0xA4,0x80,0x47,0x58,0xD5,0x25,0x02,0x03, 64 0x01,0x00,0x01,0xA3,0x20,0x30,0x1E,0x30,0x0F,0x06,0x03,0x55,0x1D,0x13,0x01,0x01, 65 0xFF,0x04,0x05,0x30,0x03,0x01,0x01,0xFF,0x30,0x0B,0x06,0x03,0x55,0x1D,0x0F,0x04, 66 0x04,0x03,0x02,0x02,0x84,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01, 67 0x01,0x05,0x05,0x00,0x03,0x82,0x01,0x01,0x00,0x38,0x44,0x10,0xF4,0x24,0x4A,0xAA, 68 0x9F,0x0D,0x37,0x5E,0x75,0xB7,0xF5,0xC5,0x27,0x19,0x57,0xE5,0x25,0x4A,0x44,0x03, 69 0x5F,0x2E,0xD4,0x70,0x69,0xDD,0x55,0xDB,0x47,0x07,0x06,0x3E,0x5D,0xA4,0xBB,0x64, 70 0xE2,0xA6,0x09,0x8B,0x6D,0x0B,0x50,0x33,0x5A,0x92,0x5A,0x5B,0xDF,0x6A,0x9F,0x81, 71 0x5F,0x17,0x95,0xB0,0xC6,0xC3,0xCD,0x6D,0x17,0xDD,0x83,0xC1,0xA5,0xB7,0xCD,0xFF, 72 0xE8,0x13,0x10,0x35,0x85,0x3E,0xCA,0xE4,0xF5,0x22,0x58,0x1E,0x68,0x14,0x62,0x35, 73 0xE4,0x65,0xB4,0xD3,0x42,0x5A,0x03,0x5C,0x2D,0x76,0xD5,0x9B,0xAA,0xCB,0x3A,0xAC, 74 0x55,0x58,0xAD,0x67,0x30,0xDC,0xC3,0xA7,0xA9,0x37,0xBB,0x61,0xA2,0xEA,0x6E,0x0C, 75 0xB0,0x4B,0x0D,0x64,0x3D,0x59,0x3C,0xA3,0xA1,0x73,0x4F,0x33,0xDB,0x6F,0xBF,0x2D, 76 0xB2,0x9D,0xCE,0x05,0x1C,0xF0,0xAB,0x4A,0xB0,0x70,0x5D,0x32,0x20,0x22,0xD7,0x12, 77 0xC0,0x1C,0x0B,0x0D,0xC0,0x72,0x6B,0x6F,0xA4,0xF8,0xAA,0xD2,0x34,0x36,0x63,0x84, 78 0x80,0xF0,0x70,0x5E,0x09,0xEA,0xFF,0x48,0x49,0x85,0x83,0x8E,0x8E,0x6E,0x4C,0x2E, 79 0x2F,0xBB,0xBF,0xDF,0x3B,0x73,0x65,0xA2,0x0D,0x09,0x84,0x8F,0x08,0x86,0x61,0x27, 80 0x58,0xB6,0x7E,0x2D,0xEC,0x08,0xBA,0x40,0x5D,0x20,0x54,0x37,0xDD,0xCC,0xE5,0xDB, 81 0x38,0x68,0xEE,0x56,0x9F,0x92,0xDD,0x03,0x04,0xD2,0x94,0x51,0xD3,0xA9,0x08,0x2E, 82 0x6E,0x25,0x8E,0xBF,0x8A,0xA9,0x2B,0xAD,0x50,0x00,0xA7,0x39,0x11,0x6A,0x9A,0x28, 83 0x99,0x9A,0xB9,0x3B,0xB9,0xB5,0x9C,0x19,0x3A, 84}; 85 86unsigned char INTERMEDIATE_CERT[1037]={ 87 0x30,0x82,0x04,0x09,0x30,0x82,0x02,0xF1,0xA0,0x03,0x02,0x01,0x02,0x02,0x01,0x02, 88 0x30,0x0B,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x30,0x81,0x9D, 89 0x31,0x1A,0x30,0x18,0x06,0x03,0x55,0x04,0x03,0x0C,0x11,0x54,0x65,0x73,0x74,0x2D, 90 0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D,0x52,0x4F,0x4F,0x54,0x31,0x0E,0x30,0x0C, 91 0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41,0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12, 92 0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43,0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70, 93 0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31, 94 0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06,0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10, 95 0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43,0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F, 96 0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16, 97 0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74,0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72, 98 0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x30,0x1E,0x17, 99 0x0D,0x30,0x39,0x31,0x32,0x31,0x38,0x31,0x37,0x33,0x30,0x35,0x34,0x5A,0x17,0x0D, 100 0x31,0x30,0x31,0x32,0x31,0x38,0x31,0x37,0x33,0x30,0x35,0x34,0x5A,0x30,0x81,0xA5, 101 0x31,0x22,0x30,0x20,0x06,0x03,0x55,0x04,0x03,0x0C,0x19,0x54,0x65,0x73,0x74,0x2D, 102 0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D,0x49,0x4E,0x54,0x45,0x52,0x4D,0x45,0x44, 103 0x49,0x41,0x54,0x45,0x31,0x0E,0x30,0x0C,0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41, 104 0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12,0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43, 105 0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70,0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03, 106 0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06, 107 0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10,0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43, 108 0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F,0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86, 109 0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16,0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74, 110 0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72,0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C, 111 0x65,0x2E,0x63,0x6F,0x6D,0x30,0x82,0x01,0x22,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48, 112 0x86,0xF7,0x0D,0x01,0x01,0x01,0x05,0x00,0x03,0x82,0x01,0x0F,0x00,0x30,0x82,0x01, 113 0x0A,0x02,0x82,0x01,0x01,0x00,0xC4,0xBD,0x46,0x0E,0x0F,0x5C,0x1C,0xA2,0x23,0xD2, 114 0x3B,0x8C,0xC4,0x02,0x52,0x8C,0xD8,0xB1,0xC2,0x58,0x2E,0x84,0xAA,0x6C,0xCB,0x4B, 115 0xE4,0xF1,0xE7,0x48,0x98,0x46,0x6B,0xD0,0x50,0xB0,0xA3,0x1F,0x23,0xC6,0x3C,0x81, 116 0x73,0xE7,0xEA,0xAA,0x55,0xF7,0x37,0x58,0x85,0xF6,0x96,0x0D,0xC0,0x81,0x8D,0x3D, 117 0xD9,0xAD,0xFA,0x32,0x46,0x56,0x4A,0x53,0xF5,0x53,0x34,0x5B,0xFC,0xFC,0x51,0x2A, 118 0x45,0xD4,0xCB,0x53,0xF9,0x58,0xBF,0x7D,0x48,0xB3,0x23,0x41,0xD7,0x93,0x1C,0xC2, 119 0x32,0xE8,0x1C,0x82,0xDC,0xDC,0xCB,0xED,0x0B,0xDA,0x8A,0x1C,0xC0,0x0E,0x83,0x24, 120 0xE6,0x2E,0x68,0xA6,0xB6,0x60,0xEE,0xAF,0xB1,0x07,0xF1,0xC0,0xDB,0x29,0x83,0x9E, 121 0x0C,0xF4,0xCF,0x67,0x5B,0x49,0x3A,0x17,0x7E,0xC1,0xEB,0x75,0x3E,0xDD,0x0F,0x9A, 122 0xC7,0x06,0x60,0x2B,0x18,0xBD,0xAA,0x96,0xD1,0xE1,0x9C,0xF0,0x34,0xFF,0x3E,0x8C, 123 0x4A,0x96,0x5D,0x68,0x7C,0xCF,0xA1,0x14,0xED,0xB1,0x8E,0x10,0x8D,0x1F,0x15,0x22, 124 0x4E,0x8E,0x1A,0xC7,0xAD,0xB9,0x16,0xCB,0x3C,0xCB,0x5D,0xB9,0xAC,0xD9,0xFE,0xAE, 125 0xDE,0x06,0x3B,0xB6,0xA1,0xAA,0x7C,0x91,0x76,0xC6,0xA4,0x81,0xBD,0x29,0x86,0x33, 126 0xA6,0xB5,0x4D,0x28,0x94,0x51,0x81,0x3F,0x68,0x95,0xEB,0x41,0x7A,0xE9,0x87,0xD7, 127 0xDC,0xC8,0xA0,0x5F,0xAB,0x29,0xD9,0xC4,0x08,0xC8,0xA0,0x0B,0x77,0xAC,0x6C,0x21, 128 0x10,0xA4,0xED,0x86,0x78,0x99,0x1F,0xA7,0x23,0x33,0x34,0x89,0x80,0x02,0xBC,0xAF, 129 0xC6,0x3E,0x38,0xFB,0x7C,0x47,0x02,0x03,0x01,0x00,0x01,0xA3,0x4C,0x30,0x4A,0x30, 130 0x0F,0x06,0x03,0x55,0x1D,0x13,0x01,0x01,0xFF,0x04,0x05,0x30,0x03,0x01,0x01,0xFF, 131 0x30,0x0E,0x06,0x03,0x55,0x1D,0x0F,0x01,0x01,0xFF,0x04,0x04,0x03,0x02,0x02,0x84, 132 0x30,0x27,0x06,0x03,0x55,0x1D,0x11,0x04,0x20,0x30,0x1E,0x81,0x1C,0x73,0x65,0x63, 133 0x75,0x72,0x69,0x74,0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72,0x6F,0x75,0x70,0x2E, 134 0x61,0x70,0x70,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48, 135 0x86,0xF7,0x0D,0x01,0x01,0x05,0x05,0x00,0x03,0x82,0x01,0x01,0x00,0x3C,0x66,0x3B, 136 0x9D,0x6E,0xA9,0x0E,0xC9,0xC2,0x6C,0xF4,0x79,0xFB,0xD5,0x6E,0x1F,0x01,0x4E,0x0D, 137 0x2C,0x64,0x7B,0x6E,0xD7,0xC7,0xA7,0x64,0x8B,0xF0,0xCD,0x93,0xCD,0x12,0x29,0x71, 138 0x87,0x3E,0xA3,0x1E,0x7F,0x57,0xC7,0xD9,0xBF,0xD2,0xF2,0x03,0x27,0xD5,0x5E,0xEF, 139 0x59,0xBC,0x91,0x37,0xB4,0x4A,0xEE,0xD2,0x2F,0xEA,0x92,0x07,0xBC,0xEC,0xAC,0x6A, 140 0xF1,0x34,0xA4,0x40,0x61,0x8B,0xB9,0x3D,0xAF,0x5B,0x86,0x6E,0xEE,0x4C,0xCB,0x7F, 141 0x1F,0xD0,0x0F,0x9E,0x5A,0xF0,0x39,0xFD,0x89,0xF3,0x03,0x61,0x5A,0xDF,0x6B,0x5F, 142 0xE3,0x33,0x51,0x80,0x1B,0x61,0xFE,0x7A,0xC7,0x27,0xBF,0x12,0xB5,0x69,0x79,0x1E, 143 0xAD,0x75,0xA8,0xFA,0x94,0xCC,0x22,0x4C,0xF9,0xB4,0xD3,0xD0,0xDC,0x57,0xD3,0x66, 144 0x96,0xDD,0x8A,0xC0,0xE4,0x11,0x5A,0xD9,0xB3,0x76,0x17,0x04,0xDA,0x62,0x71,0x58, 145 0xEA,0x99,0xC3,0x06,0xA7,0xE8,0xDB,0xA9,0x05,0xEC,0xA3,0xCA,0xDA,0x2E,0x77,0x66, 146 0xF4,0xC4,0xD2,0xC6,0xF0,0x5F,0xE6,0x88,0xDF,0x7F,0x23,0xDE,0x7B,0x04,0xA4,0x22, 147 0x45,0xEF,0x0A,0x13,0x79,0x8E,0xE1,0x14,0x22,0x79,0x22,0x86,0x1A,0x4C,0xA7,0xBA, 148 0x06,0x55,0xD9,0x5E,0xF3,0x9C,0xE0,0x1F,0xE3,0xA4,0x1C,0x8E,0x01,0x9F,0x7E,0xEF, 149 0xD2,0xA7,0x8D,0xD6,0x4D,0x1A,0x3D,0xA7,0xB2,0xDB,0x44,0x25,0xB5,0xA6,0x8A,0xD5, 150 0x49,0x87,0x04,0x6C,0x41,0x13,0x88,0x7A,0xFB,0x5E,0x16,0xA2,0x8F,0x37,0x81,0x47, 151 0xD8,0x27,0x3D,0xBD,0xB1,0x3E,0xCE,0x2A,0x07,0x75,0x45,0x5F,0x44, 152}; 153 154unsigned char LEAF_CERT[1037]={ 155 0x30,0x82,0x04,0x09,0x30,0x82,0x02,0xF1,0xA0,0x03,0x02,0x01,0x02,0x02,0x01,0x03, 156 0x30,0x0B,0x06,0x09,0x2A,0x86,0x48,0x86,0xF7,0x0D,0x01,0x01,0x05,0x30,0x81,0xA5, 157 0x31,0x22,0x30,0x20,0x06,0x03,0x55,0x04,0x03,0x0C,0x19,0x54,0x65,0x73,0x74,0x2D, 158 0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D,0x49,0x4E,0x54,0x45,0x52,0x4D,0x45,0x44, 159 0x49,0x41,0x54,0x45,0x31,0x0E,0x30,0x0C,0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41, 160 0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12,0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43, 161 0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70,0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03, 162 0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06, 163 0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10,0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43, 164 0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F,0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86, 165 0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16,0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74, 166 0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72,0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C, 167 0x65,0x2E,0x63,0x6F,0x6D,0x30,0x1E,0x17,0x0D,0x30,0x39,0x31,0x32,0x31,0x38,0x31, 168 0x37,0x33,0x32,0x31,0x36,0x5A,0x17,0x0D,0x31,0x30,0x31,0x32,0x31,0x38,0x31,0x37, 169 0x33,0x32,0x31,0x36,0x5A,0x30,0x81,0x9D,0x31,0x1A,0x30,0x18,0x06,0x03,0x55,0x04, 170 0x03,0x0C,0x11,0x54,0x65,0x73,0x74,0x2D,0x35,0x36,0x38,0x35,0x33,0x31,0x36,0x2D, 171 0x4C,0x45,0x41,0x46,0x31,0x0E,0x30,0x0C,0x06,0x03,0x55,0x04,0x0A,0x0C,0x05,0x41, 172 0x70,0x70,0x6C,0x65,0x31,0x14,0x30,0x12,0x06,0x03,0x55,0x04,0x0B,0x0C,0x0B,0x43, 173 0x6F,0x72,0x65,0x20,0x43,0x72,0x79,0x70,0x74,0x6F,0x31,0x0B,0x30,0x09,0x06,0x03, 174 0x55,0x04,0x08,0x0C,0x02,0x43,0x41,0x31,0x0B,0x30,0x09,0x06,0x03,0x55,0x04,0x06, 175 0x13,0x02,0x55,0x53,0x31,0x12,0x30,0x10,0x06,0x03,0x55,0x04,0x07,0x0C,0x09,0x43, 176 0x75,0x70,0x65,0x72,0x74,0x69,0x6E,0x6F,0x31,0x2B,0x30,0x29,0x06,0x09,0x2A,0x86, 177 0x48,0x86,0xF7,0x0D,0x01,0x09,0x01,0x16,0x1C,0x73,0x65,0x63,0x75,0x72,0x69,0x74, 178 0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72,0x6F,0x75,0x70,0x2E,0x61,0x70,0x70,0x6C, 179 0x65,0x2E,0x63,0x6F,0x6D,0x30,0x82,0x01,0x22,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48, 180 0x86,0xF7,0x0D,0x01,0x01,0x01,0x05,0x00,0x03,0x82,0x01,0x0F,0x00,0x30,0x82,0x01, 181 0x0A,0x02,0x82,0x01,0x01,0x00,0xBF,0x1B,0x87,0x6B,0x10,0xF8,0xF6,0x24,0x07,0x40, 182 0xC3,0xE3,0x81,0x26,0xD6,0xF4,0xFF,0xAA,0x6C,0x26,0xD4,0xBF,0xF7,0x9A,0xF5,0xB8, 183 0x63,0xBD,0x8B,0xFD,0x4B,0xFE,0xFF,0x4B,0xA2,0x15,0x13,0x52,0x84,0x87,0x9E,0x2B, 184 0x32,0x5B,0xF8,0x01,0x28,0x5E,0xF1,0x9C,0xE7,0x52,0xB0,0x89,0xB8,0x4A,0xD0,0x87, 185 0x40,0x0C,0xCD,0xAC,0x11,0x22,0x89,0x44,0x26,0x3B,0x40,0xF3,0x34,0x61,0x14,0x3A, 186 0x94,0xF3,0x1F,0x27,0x62,0xF8,0x8C,0xB4,0xF5,0x1E,0xA6,0x37,0x53,0xB2,0xB3,0x1E, 187 0x35,0xF6,0x00,0x34,0x4B,0x28,0x72,0x5B,0x9D,0xD8,0xEA,0x06,0x91,0x77,0x57,0x38, 188 0x9C,0xA5,0x66,0x5F,0x1A,0x9A,0x0B,0xCC,0x2F,0x2E,0x58,0xA2,0x70,0x66,0xA6,0xEF, 189 0x1B,0x3A,0x0E,0xF0,0x4B,0xA6,0x9D,0x6D,0x63,0xE0,0x1C,0x9C,0x8E,0xFF,0x6F,0x50, 190 0x5F,0x03,0x1A,0x80,0x12,0x4A,0xB6,0x89,0x83,0x5C,0x51,0x9F,0x2F,0xEA,0xE4,0x7F, 191 0x12,0xFB,0xE4,0x92,0xF0,0x8B,0x17,0x35,0x02,0x73,0xA0,0x7D,0xA2,0xB9,0x89,0xE2, 192 0x78,0x52,0xA1,0x08,0x42,0x78,0xD5,0xD3,0x8C,0x3C,0xF2,0x88,0x5E,0x7A,0xCC,0x94, 193 0x80,0x42,0xEA,0xED,0x6E,0x64,0x19,0x5E,0x53,0x05,0xB6,0x60,0xDB,0x81,0x92,0x2C, 194 0x3D,0xD4,0xAF,0xF8,0xED,0xD9,0x28,0xCE,0x0B,0xD9,0xDC,0x20,0x0C,0xA9,0x8D,0xA4, 195 0x54,0xD1,0xDA,0xDE,0x30,0x4A,0x67,0xC6,0xAC,0x4E,0xE3,0xB4,0xD7,0x16,0xF5,0xDC, 196 0xE3,0x52,0xAC,0x01,0x1C,0xB6,0xC1,0x5B,0xB4,0xEA,0x67,0x25,0xFE,0xF6,0x58,0x5C, 197 0xFE,0x88,0x4E,0xCF,0xF1,0x11,0x02,0x03,0x01,0x00,0x01,0xA3,0x4C,0x30,0x4A,0x30, 198 0x0E,0x06,0x03,0x55,0x1D,0x0F,0x01,0x01,0xFF,0x04,0x04,0x03,0x02,0x07,0x80,0x30, 199 0x0F,0x06,0x03,0x55,0x1D,0x25,0x04,0x08,0x30,0x06,0x06,0x04,0x55,0x1D,0x25,0x00, 200 0x30,0x27,0x06,0x03,0x55,0x1D,0x11,0x04,0x20,0x30,0x1E,0x81,0x1C,0x73,0x65,0x63, 201 0x75,0x72,0x69,0x74,0x79,0x2D,0x64,0x65,0x76,0x40,0x67,0x72,0x6F,0x75,0x70,0x2E, 202 0x61,0x70,0x70,0x6C,0x65,0x2E,0x63,0x6F,0x6D,0x30,0x0D,0x06,0x09,0x2A,0x86,0x48, 203 0x86,0xF7,0x0D,0x01,0x01,0x05,0x05,0x00,0x03,0x82,0x01,0x01,0x00,0x1A,0xE5,0xD1, 204 0x13,0x66,0x83,0xC7,0x1A,0xB0,0x50,0xF0,0x1B,0x6E,0x70,0x6E,0x36,0x1A,0x0F,0x12, 205 0x9E,0x0B,0xFD,0x4B,0x79,0xEC,0xAA,0x5E,0x2A,0x37,0x79,0x50,0x97,0x13,0x9E,0xB6, 206 0x43,0xF0,0xD2,0xC6,0xF3,0x43,0x73,0x33,0x6C,0xCB,0x73,0xE5,0xBE,0x4C,0x42,0x6F, 207 0x33,0x76,0x96,0xA2,0x6B,0xA0,0x8D,0xAD,0x46,0xA5,0xD4,0xAC,0x0E,0x55,0x80,0x1A, 208 0x6E,0xAF,0xC2,0x2E,0xB3,0xD4,0x64,0xC3,0x65,0xFA,0x1C,0x42,0x47,0x12,0x9F,0x44, 209 0xD2,0x1F,0xCF,0xA1,0x53,0x49,0x66,0x66,0x14,0x21,0xD4,0x17,0xD1,0x26,0x75,0xAD, 210 0x08,0x93,0x9C,0x3B,0xB7,0x7C,0x03,0x2F,0x76,0x5D,0xB7,0x25,0x83,0x68,0xE3,0x01, 211 0x5C,0xCD,0x87,0x7A,0x71,0x8B,0x8D,0x5D,0x27,0x27,0xF2,0x24,0x56,0x7C,0x7E,0x33, 212 0x8F,0xE6,0x02,0x46,0xAD,0x63,0x28,0x85,0xA2,0x9E,0xEA,0x5A,0xC4,0x92,0xCE,0x76, 213 0xE8,0xD4,0xD4,0x7D,0x48,0x44,0xA4,0x21,0x8C,0xB7,0xC2,0x15,0x80,0x87,0x19,0xB1, 214 0x10,0x6A,0xC7,0x51,0xB7,0x25,0x40,0x26,0x8A,0xCC,0xB6,0x0C,0xE2,0x0D,0xA1,0x40, 215 0x20,0x85,0x0F,0xE5,0xB9,0xB5,0x32,0x10,0xA9,0x5F,0x25,0xCA,0xD2,0x95,0x11,0x54, 216 0x41,0xEA,0xC3,0xBA,0x0C,0x24,0x10,0x28,0xC9,0x09,0xAF,0x7E,0xDF,0x6A,0x2F,0x30, 217 0x49,0x7C,0xB0,0x23,0x46,0xA8,0xDC,0xE3,0x6A,0x17,0x87,0xF7,0xCC,0x3A,0xBD,0x11, 218 0x95,0xC3,0x0A,0x37,0xD1,0x1F,0x20,0xB6,0x1B,0xB2,0xA2,0x45,0xFF,0xC1,0x0D,0x9A, 219 0x56,0xCD,0x5A,0xF6,0x08,0xAA,0xBD,0xAB,0x13,0xC6,0xFD,0xAA,0xEC, 220}; 221 222int quiet = 0; 223 224int SetTestVerifyDate(SecTrustRef trust) 225{ 226 /* The certs for this test are valid on 12/21/09 */ 227 CFGregorianDate gDate = { 2009, 12, 21, 12, 12, 12 }; 228 CFAbsoluteTime aTime = CFGregorianDateGetAbsoluteTime(gDate, NULL); 229 CFDateRef vDateRef = CFDateCreate(NULL, aTime); 230 OSStatus result = 0; 231 if (vDateRef) { 232 result = SecTrustSetVerifyDate(trust, vDateRef); 233 CFRelease(vDateRef); 234 } 235 return (int)result; 236} 237 238int TestWithoutAnchor() 239{ 240 /* Given a full certificate chain ending in an untrusted self-signed root, 241 * and not set as an anchor, verify that it does NOT evaluate as trusted. 242 */ 243 unsigned int i, r, numCerts = 3; 244 245 CFArrayRef resultArray=NULL, certArray=NULL, anchorArray=NULL; 246 SecTrustResultType trustResult; 247 SecTrustRef trust=NULL; 248 SecPolicyRef policy=NULL; 249 SecCertificateRef certs[numCerts]; 250 CSSM_TP_APPLE_EVIDENCE_INFO *evInfo; 251 CSSM_DATA cert; 252 OSStatus status; 253 254 /* leaf */ 255 cert.Data = LEAF_CERT; 256 cert.Length = sizeof(LEAF_CERT); 257 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[0]); 258 259 /* intermediate */ 260 cert.Data = INTERMEDIATE_CERT; 261 cert.Length = sizeof(INTERMEDIATE_CERT); 262 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[1]); 263 264 /* root */ 265 cert.Data = ROOT_CERT; 266 cert.Length = sizeof(ROOT_CERT); 267 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[2]); 268 269 certArray = CFArrayCreate(NULL, (const void **)&certs[0], numCerts, &kCFTypeArrayCallBacks); 270 policy = SecPolicyCreateBasicX509(); 271 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 272 status = SetTestVerifyDate(trust); 273 274 /* evaluate: expected result is "recoverable trust failure" */ 275 status = SecTrustEvaluate(trust, &trustResult); 276 r = (trustResult==kSecTrustResultRecoverableTrustFailure) ? 0 : 1; 277 SecTrustGetCssmResultCode(trust, &status); 278 SecTrustGetResult(trust, &trustResult, &resultArray, &evInfo); 279 i = (resultArray) ? (int)CFArrayGetCount(resultArray) : 0; 280 281 if (!quiet || r) { 282 fprintf(stdout, "Test with no trusted anchor set: %s (certs=%d, result=%d, status=%d, expected=%d)\n", 283 (r==0) ? "SUCCESS" : "FAILED", 284 i, (int)trustResult, (int)status, (int)CSSMERR_TP_INVALID_ANCHOR_CERT); 285 } 286 287 /* clean up */ 288 if (resultArray) CFRelease(resultArray); 289 if (certArray) CFRelease(certArray); 290 if (anchorArray) CFRelease(anchorArray); 291 if (trust) CFRelease(trust); 292 if (policy) CFRelease(policy); 293 for (i=0; i<numCerts; i++) { if (certs[i]) CFRelease(certs[i]); } 294 295 return r; 296} 297 298 299int TestRootAsAnchor(bool includeInGroup) 300{ 301 /* Given a full certificate chain ending in a self-signed root, 302 * verify that it evaluates as trusted when that root is set as an anchor. 303 */ 304 unsigned int i, r, numCerts = 3; 305 306 CFArrayRef resultArray=NULL, certArray=NULL, anchorArray=NULL; 307 SecTrustResultType trustResult; 308 SecTrustRef trust=NULL; 309 SecPolicyRef policy=NULL; 310 SecCertificateRef certs[numCerts]; 311 CSSM_TP_APPLE_EVIDENCE_INFO *evInfo; 312 CSSM_DATA cert; 313 OSStatus status; 314 315 /* leaf */ 316 cert.Data = LEAF_CERT; 317 cert.Length = sizeof(LEAF_CERT); 318 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[0]); 319 320 /* intermediate */ 321 cert.Data = INTERMEDIATE_CERT; 322 cert.Length = sizeof(INTERMEDIATE_CERT); 323 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[1]); 324 325 /* root */ 326 cert.Data = ROOT_CERT; 327 cert.Length = sizeof(ROOT_CERT); 328 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[2]); 329 330 /* if the includeInGroup param is set, add the root to the initial group */ 331 certArray = CFArrayCreate(NULL, (const void **)&certs[0], (includeInGroup) ? numCerts : numCerts-1, &kCFTypeArrayCallBacks); 332 policy = SecPolicyCreateBasicX509(); 333 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 334 status = SetTestVerifyDate(trust); 335 336 /* set the root as a trusted anchor for this evaluation */ 337 anchorArray = CFArrayCreate(NULL, (const void **)&certs[2], 1, &kCFTypeArrayCallBacks); 338 status = SecTrustSetAnchorCertificates(trust, anchorArray); 339 340 /* evaluate: expected result is "unspecified" since root is set in anchors */ 341 status = SecTrustEvaluate(trust, &trustResult); 342 r = (trustResult==kSecTrustResultUnspecified) ? 0 : 1; 343 SecTrustGetCssmResultCode(trust, &status); 344 SecTrustGetResult(trust, &trustResult, &resultArray, &evInfo); 345 i = (resultArray) ? (int)CFArrayGetCount(resultArray) : 0; 346 347 if (!quiet || r) { 348 fprintf(stdout, "Test root CA cert as anchor %s: %s (certs=%d, result=%d, status=%d, expected=%d)\n", 349 (includeInGroup) ? "[+]" : "[-]", 350 (r==0) ? "SUCCESS" : "FAILED", 351 i, (int)trustResult, (int)status, (int)CSSM_OK); 352 } 353 354 /* clean up */ 355 if (resultArray) CFRelease(resultArray); 356 if (certArray) CFRelease(certArray); 357 if (anchorArray) CFRelease(anchorArray); 358 if (trust) CFRelease(trust); 359 if (policy) CFRelease(policy); 360 for (i=0; i<numCerts; i++) { if (certs[i]) CFRelease(certs[i]); } 361 362 return r; 363} 364 365int TestIntermediateAsAnchor(bool includeInGroup) 366{ 367 /* Given a partial certificate chain ending in an intermediate CA, 368 * verify that it evaluates as trusted when that cert is set as an anchor. 369 */ 370 unsigned int i, r, numCerts = 2; 371 372 CFArrayRef resultArray=NULL, certArray=NULL, anchorArray=NULL; 373 SecTrustResultType trustResult; 374 SecTrustRef trust=NULL; 375 SecPolicyRef policy=NULL; 376 SecCertificateRef certs[numCerts]; 377 CSSM_TP_APPLE_EVIDENCE_INFO *evInfo; 378 CSSM_DATA cert; 379 OSStatus status; 380 381 /* leaf */ 382 cert.Data = LEAF_CERT; 383 cert.Length = sizeof(LEAF_CERT); 384 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[0]); 385 386 /* intermediate */ 387 cert.Data = INTERMEDIATE_CERT; 388 cert.Length = sizeof(INTERMEDIATE_CERT); 389 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[1]); 390 391 /* if the includeInGroup param is set, add the intermediate to the initial group */ 392 certArray = CFArrayCreate(NULL, (const void **)&certs[0], (includeInGroup) ? numCerts : numCerts-1, &kCFTypeArrayCallBacks); 393 policy = SecPolicyCreateBasicX509(); 394 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 395 status = SetTestVerifyDate(trust); 396 397 /* set the intermediate CA cert as a trusted anchor for this evaluation */ 398 anchorArray = CFArrayCreate(NULL, (const void **)&certs[1], 1, &kCFTypeArrayCallBacks); 399 status = SecTrustSetAnchorCertificates(trust, anchorArray); 400 401 /* evaluate: expected result is "unspecified" since intermediate CA is set in anchors */ 402 status = SecTrustEvaluate(trust, &trustResult); 403 r = (trustResult==kSecTrustResultUnspecified) ? 0 : 1; 404 SecTrustGetCssmResultCode(trust, &status); 405 SecTrustGetResult(trust, &trustResult, &resultArray, &evInfo); 406 i = (resultArray) ? (int)CFArrayGetCount(resultArray) : 0; 407 408 if (!quiet || r) { 409 fprintf(stdout, "Test intermediate as anchor %s: %s (certs=%d, result=%d, status=%d, expected=%d)\n", 410 (includeInGroup) ? "[+]" : "[-]", 411 (r==0) ? "SUCCESS" : "FAILED", 412 i, (int)trustResult, (int)status, (int)CSSM_OK); 413 } 414 415 /* clean up */ 416 if (resultArray) CFRelease(resultArray); 417 if (certArray) CFRelease(certArray); 418 if (anchorArray) CFRelease(anchorArray); 419 if (trust) CFRelease(trust); 420 if (policy) CFRelease(policy); 421 for (i=0; i<numCerts; i++) { if (certs[i]) CFRelease(certs[i]); } 422 423 return r; 424} 425 426int TestLeafAsAnchor() 427{ 428 /* Given a partial certificate chain consisting only of the leaf certificate, 429 * verify that it evaluates as trusted when that cert is set as an anchor. 430 */ 431 unsigned int i, r, numCerts = 1; 432 433 CFArrayRef resultArray=NULL, certArray=NULL, anchorArray=NULL; 434 SecTrustResultType trustResult; 435 SecTrustRef trust=NULL; 436 SecPolicyRef policy=NULL; 437 SecCertificateRef certs[numCerts]; 438 CSSM_TP_APPLE_EVIDENCE_INFO *evInfo; 439 CSSM_DATA cert; 440 OSStatus status; 441 442 /* leaf */ 443 cert.Data = LEAF_CERT; 444 cert.Length = sizeof(LEAF_CERT); 445 status = SecCertificateCreateFromData(&cert, CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_BER, &certs[0]); 446 447 certArray = CFArrayCreate(NULL, (const void **)&certs[0], numCerts, &kCFTypeArrayCallBacks); 448 policy = SecPolicyCreateBasicX509(); 449 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 450 status = SetTestVerifyDate(trust); 451 452 /* set the leaf cert as a trusted anchor for this evaluation */ 453 anchorArray = CFArrayCreate(NULL, (const void **)&certs[0], 1, &kCFTypeArrayCallBacks); 454 status = SecTrustSetAnchorCertificates(trust, anchorArray); 455 456 /* evaluate: expected result is "unspecified" since leaf is set in anchors */ 457 status = SecTrustEvaluate(trust, &trustResult); 458 r = (trustResult==kSecTrustResultUnspecified) ? 0 : 1; 459 SecTrustGetCssmResultCode(trust, &status); 460 SecTrustGetResult(trust, &trustResult, &resultArray, &evInfo); 461 i = (resultArray) ? (int)CFArrayGetCount(resultArray) : 0; 462 463 if (!quiet|| r) { 464 fprintf(stdout, "Test leaf certificate as anchor: %s (certs=%d, result=%d, status=%d, expected=%d)\n", 465 (r==0) ? "SUCCESS" : "FAILED", 466 i, (int)trustResult, (int)status, (int)CSSM_OK); 467 } 468 469 /* clean up */ 470 if (resultArray) CFRelease(resultArray); 471 if (certArray) CFRelease(certArray); 472 if (anchorArray) CFRelease(anchorArray); 473 if (trust) CFRelease(trust); 474 if (policy) CFRelease(policy); 475 for (i=0; i<numCerts; i++) { if (certs[i]) CFRelease(certs[i]); } 476 477 return r; 478} 479 480 481void usage(const char *arg0) 482{ 483 fprintf(stdout, "Usage: %s [-q]\n", arg0); 484} 485 486int main (int argc, const char * argv[]) 487{ 488 unsigned int i, c, e; 489 490 if (argc > 2) 491 { 492 usage(argv[0]); 493 exit(1); 494 } 495 496 for (i=1; i<(unsigned)argc; i++) 497 { 498 if (!strcmp(argv[i], "-q") || !strcmp(argv[i], "q")) 499 quiet = 1; 500 else { 501 usage(argv[0]); 502 exit(1); 503 } 504 } 505 506 fprintf(stdout, "Starting trustAnchors; args: "); 507 for (i=1; i<(unsigned)argc; i++) { 508 fprintf(stdout, "%s ", argv[i]); 509 } 510 fprintf(stdout, "\n"); 511 512 513 c = 6; /* count */ 514 e = 0; /* errors */ 515 516 if (TestWithoutAnchor()) ++e; /* standard baseline case; we expect this not to be trusted */ 517 if (TestRootAsAnchor(0)) ++e; /* don't include root in cert group, but do include in anchors */ 518 if (TestRootAsAnchor(1)) ++e; /* include root anchor in cert group AND in anchors */ 519 if (TestIntermediateAsAnchor(0)) ++e; /* don't include intermediate in cert group, but do include in anchors */ 520 if (TestIntermediateAsAnchor(1)) ++e; /* include intermediate in cert group AND in anchors */ 521 if (TestLeafAsAnchor()) ++e; /* include leaf in cert group AND in anchors */ 522 523 if (!quiet) { 524 fprintf(stdout, "%d of %d tests succeeded\n", c-e, c); 525 fflush(stdout); 526 } 527 528 return (e) ? 1 : 0; 529} 530