1 /*
2  * Copyright (c) 2021 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "bundle_verify_mgr.h"
17 
18 #include "app_log_wrapper.h"
19 #include "bms_extension_data_mgr.h"
20 
21 using namespace OHOS::Security::Verify;
22 
23 namespace OHOS {
24 namespace AppExecFwk {
25 
26 const std::unordered_map<Security::Verify::AppDistType, std::string> APP_DISTRIBUTION_TYPE_MAPS = {
27     { Security::Verify::AppDistType::NONE_TYPE, Constants::APP_DISTRIBUTION_TYPE_NONE },
28     { Security::Verify::AppDistType::APP_GALLERY, Constants::APP_DISTRIBUTION_TYPE_APP_GALLERY },
29     { Security::Verify::AppDistType::ENTERPRISE, Constants::APP_DISTRIBUTION_TYPE_ENTERPRISE },
30     { Security::Verify::AppDistType::ENTERPRISE_NORMAL, Constants::APP_DISTRIBUTION_TYPE_ENTERPRISE_NORMAL },
31     { Security::Verify::AppDistType::ENTERPRISE_MDM, Constants::APP_DISTRIBUTION_TYPE_ENTERPRISE_MDM },
32     { Security::Verify::AppDistType::INTERNALTESTING, Constants::APP_DISTRIBUTION_TYPE_INTERNALTESTING },
33     { Security::Verify::AppDistType::OS_INTEGRATION, Constants::APP_DISTRIBUTION_TYPE_OS_INTEGRATION },
34     { Security::Verify::AppDistType::CROWDTESTING, Constants::APP_DISTRIBUTION_TYPE_CROWDTESTING },
35 };
36 
37 namespace {
38 const int32_t HAP_VERIFY_ERR_MAP_KEY[] = {
39     HapVerifyResultCode::VERIFY_SUCCESS, HapVerifyResultCode::FILE_PATH_INVALID, HapVerifyResultCode::OPEN_FILE_ERROR,
40     HapVerifyResultCode::SIGNATURE_NOT_FOUND, HapVerifyResultCode::VERIFY_APP_PKCS7_FAIL,
41     HapVerifyResultCode::PROFILE_PARSE_FAIL, HapVerifyResultCode::APP_SOURCE_NOT_TRUSTED,
42     HapVerifyResultCode::GET_DIGEST_FAIL, HapVerifyResultCode::VERIFY_INTEGRITY_FAIL,
43     HapVerifyResultCode::FILE_SIZE_TOO_LARGE, HapVerifyResultCode::GET_PUBLICKEY_FAIL,
44     HapVerifyResultCode::GET_SIGNATURE_FAIL, HapVerifyResultCode::NO_PROFILE_BLOCK_FAIL,
45     HapVerifyResultCode::VERIFY_SIGNATURE_FAIL, HapVerifyResultCode::VERIFY_SOURCE_INIT_FAIL
46 };
47 const ErrCode HAP_VERIFY_ERR_MAP_VALUE[] = {
48     ERR_OK, ERR_APPEXECFWK_INSTALL_FAILED_INVALID_SIGNATURE_FILE_PATH,
49     ERR_APPEXECFWK_INSTALL_FAILED_BAD_BUNDLE_SIGNATURE_FILE, ERR_APPEXECFWK_INSTALL_FAILED_NO_BUNDLE_SIGNATURE,
50     ERR_APPEXECFWK_INSTALL_FAILED_VERIFY_APP_PKCS7_FAIL, ERR_APPEXECFWK_INSTALL_FAILED_PROFILE_PARSE_FAIL,
51     ERR_APPEXECFWK_INSTALL_FAILED_APP_SOURCE_NOT_TRUESTED, ERR_APPEXECFWK_INSTALL_FAILED_BAD_DIGEST,
52     ERR_APPEXECFWK_INSTALL_FAILED_BUNDLE_INTEGRITY_VERIFICATION_FAILURE,
53     ERR_APPEXECFWK_INSTALL_FAILED_FILE_SIZE_TOO_LARGE, ERR_APPEXECFWK_INSTALL_FAILED_BAD_PUBLICKEY,
54     ERR_APPEXECFWK_INSTALL_FAILED_BAD_BUNDLE_SIGNATURE, ERR_APPEXECFWK_INSTALL_FAILED_NO_PROFILE_BLOCK_FAIL,
55     ERR_APPEXECFWK_INSTALL_FAILED_BUNDLE_SIGNATURE_VERIFICATION_FAILURE,
56     ERR_APPEXECFWK_INSTALL_FAILED_VERIFY_SOURCE_INIT_FAIL
57 };
58 } // namespace
59 
HapVerify(const std::string &filePath, HapVerifyResult &hapVerifyResult)60 ErrCode BundleVerifyMgr::HapVerify(const std::string &filePath, HapVerifyResult &hapVerifyResult)
61 {
62     BmsExtensionDataMgr bmsExtensionDataMgr;
63     ErrCode res = bmsExtensionDataMgr.HapVerify(filePath, hapVerifyResult);
64     if (res == ERR_BUNDLEMANAGER_INSTALL_FAILED_SIGNATURE_EXTENSION_NOT_EXISTED) {
65         auto ret = Security::Verify::HapVerify(filePath, hapVerifyResult);
66         APP_LOGI("HapVerify result %{public}d", ret);
67         size_t len = sizeof(HAP_VERIFY_ERR_MAP_KEY) / sizeof(HAP_VERIFY_ERR_MAP_KEY[0]);
68         for (size_t i = 0; i < len; i++) {
69             if (ret == HAP_VERIFY_ERR_MAP_KEY[i]) {
70                 return HAP_VERIFY_ERR_MAP_VALUE[i];
71             }
72         }
73         return ERR_APPEXECFWK_INSTALL_INTERNAL_ERROR;
74     }
75     return res;
76 }
77 
78 bool BundleVerifyMgr::isDebug_ = false;
79 
EnableDebug()80 void BundleVerifyMgr::EnableDebug()
81 {
82     if (isDebug_) {
83         APP_LOGD("verify mode is already debug mode");
84         return;
85     }
86     if (!Security::Verify::EnableDebugMode()) {
87         APP_LOGE("start debug mode failed");
88         return;
89     }
90     isDebug_ = true;
91 }
92 
DisableDebug()93 void BundleVerifyMgr::DisableDebug()
94 {
95     if (!isDebug_) {
96         APP_LOGD("verify mode is already signature mode");
97         return;
98     }
99     Security::Verify::DisableDebugMode();
100     isDebug_ = false;
101 }
102 
ParseHapProfile(const std::string &filePath, HapVerifyResult &hapVerifyResult)103 ErrCode BundleVerifyMgr::ParseHapProfile(const std::string &filePath, HapVerifyResult &hapVerifyResult)
104 {
105     auto ret = Security::Verify::ParseHapProfile(filePath, hapVerifyResult);
106     APP_LOGI("ParseHapProfile result %{public}d", ret);
107     size_t len = sizeof(HAP_VERIFY_ERR_MAP_KEY) / sizeof(HAP_VERIFY_ERR_MAP_KEY[0]);
108     for (size_t i = 0; i < len; i++) {
109         if (ret == HAP_VERIFY_ERR_MAP_KEY[i]) {
110             return HAP_VERIFY_ERR_MAP_VALUE[i];
111         }
112     }
113     return ERR_APPEXECFWK_INSTALL_INTERNAL_ERROR;
114 }
115 }  // namespace AppExecFwk
116 }  // namespace OHOS