0cd0abb180
On a Mac, all the useful functions are deprecated. R=golang-dev, adg CC=golang-dev https://golang.org/cl/5493054
96 lines
2.8 KiB
Go
96 lines
2.8 KiB
Go
// Copyright 2011 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package tls
|
|
|
|
/*
|
|
// Note: We disable -Werror here because the code in this file uses a deprecated API to stay
|
|
// compatible with both Mac OS X 10.6 and 10.7. Using a deprecated function on Darwin generates
|
|
// a warning.
|
|
#cgo CFLAGS: -Wno-error -Wno-deprecated-declarations
|
|
#cgo LDFLAGS: -framework CoreFoundation -framework Security
|
|
#include <CoreFoundation/CoreFoundation.h>
|
|
#include <Security/Security.h>
|
|
|
|
// FetchPEMRoots fetches the system's list of trusted X.509 root certificates.
|
|
//
|
|
// On success it returns 0 and fills pemRoots with a CFDataRef that contains the extracted root
|
|
// certificates of the system. On failure, the function returns -1.
|
|
//
|
|
// Note: The CFDataRef returned in pemRoots must be released (using CFRelease) after
|
|
// we've consumed its content.
|
|
int FetchPEMRoots(CFDataRef *pemRoots) {
|
|
if (pemRoots == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
CFArrayRef certs = NULL;
|
|
OSStatus err = SecTrustCopyAnchorCertificates(&certs);
|
|
if (err != noErr) {
|
|
return -1;
|
|
}
|
|
|
|
CFMutableDataRef combinedData = CFDataCreateMutable(kCFAllocatorDefault, 0);
|
|
int i, ncerts = CFArrayGetCount(certs);
|
|
for (i = 0; i < ncerts; i++) {
|
|
CFDataRef data = NULL;
|
|
SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i);
|
|
if (cert == NULL) {
|
|
continue;
|
|
}
|
|
|
|
// SecKeychainImportExport is deprecated in >= OS X 10.7, and has been replaced by
|
|
// SecItemExport. If we're built on a host with a Lion SDK, this code gets conditionally
|
|
// included in the output, also for binaries meant for 10.6.
|
|
//
|
|
// To make sure that we run on both Mac OS X 10.6 and 10.7 we use weak linking
|
|
// and check whether SecItemExport is available before we attempt to call it. On
|
|
// 10.6, this won't be the case, and we'll fall back to calling SecKeychainItemExport.
|
|
#if __MAC_OS_X_VERSION_MAX_ALLOWED >= 1070
|
|
if (SecItemExport) {
|
|
err = SecItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data);
|
|
if (err != noErr) {
|
|
continue;
|
|
}
|
|
} else
|
|
#endif
|
|
if (data == NULL) {
|
|
err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data);
|
|
if (err != noErr) {
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if (data != NULL) {
|
|
CFDataAppendBytes(combinedData, CFDataGetBytePtr(data), CFDataGetLength(data));
|
|
CFRelease(data);
|
|
}
|
|
}
|
|
|
|
CFRelease(certs);
|
|
|
|
*pemRoots = combinedData;
|
|
return 0;
|
|
}
|
|
*/
|
|
import "C"
|
|
import (
|
|
"crypto/x509"
|
|
"unsafe"
|
|
)
|
|
|
|
func initDefaultRoots() {
|
|
roots := x509.NewCertPool()
|
|
|
|
var data C.CFDataRef = nil
|
|
err := C.FetchPEMRoots(&data)
|
|
if err != -1 {
|
|
defer C.CFRelease(C.CFTypeRef(data))
|
|
buf := C.GoBytes(unsafe.Pointer(C.CFDataGetBytePtr(data)), C.int(C.CFDataGetLength(data)))
|
|
roots.AppendCertsFromPEM(buf)
|
|
}
|
|
|
|
varDefaultRoots = roots
|
|
}
|