OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [gnu-dev/] [or1k-gcc/] [libgo/] [go/] [crypto/] [tls/] [root_darwin.go] - Rev 761

Go to most recent revision | Compare with Previous | Blame | View Log

// Copyright 2011 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.

package tls

/*
// Note: We disable -Werror here because the code in this file uses a deprecated API to stay
// compatible with both Mac OS X 10.6 and 10.7. Using a deprecated function on Darwin generates
// a warning.
#cgo CFLAGS: -Wno-error -Wno-deprecated-declarations
#cgo LDFLAGS: -framework CoreFoundation -framework Security
#include <CoreFoundation/CoreFoundation.h>
#include <Security/Security.h>

// FetchPEMRoots fetches the system's list of trusted X.509 root certificates.
//
// On success it returns 0 and fills pemRoots with a CFDataRef that contains the extracted root
// certificates of the system. On failure, the function returns -1.
//
// Note: The CFDataRef returned in pemRoots must be released (using CFRelease) after
// we've consumed its content.
int FetchPEMRoots(CFDataRef *pemRoots) {
        if (pemRoots == NULL) {
                return -1;
        }

        CFArrayRef certs = NULL;
        OSStatus err = SecTrustCopyAnchorCertificates(&certs);
        if (err != noErr) {
                return -1;
        }

        CFMutableDataRef combinedData = CFDataCreateMutable(kCFAllocatorDefault, 0);
        int i, ncerts = CFArrayGetCount(certs);
        for (i = 0; i < ncerts; i++) {
                CFDataRef data = NULL;
                SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i);
                if (cert == NULL) {
                        continue;
                }

                // SecKeychainImportExport is deprecated in >= OS X 10.7, and has been replaced by
                // SecItemExport.  If we're built on a host with a Lion SDK, this code gets conditionally
                // included in the output, also for binaries meant for 10.6.
                //
                // To make sure that we run on both Mac OS X 10.6 and 10.7 we use weak linking
                // and check whether SecItemExport is available before we attempt to call it. On
                // 10.6, this won't be the case, and we'll fall back to calling SecKeychainItemExport.
#if __MAC_OS_X_VERSION_MAX_ALLOWED >= 1070
                if (SecItemExport) {
                        err = SecItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data);
                        if (err != noErr) {
                                continue;
                        }
                } else
#endif
                if (data == NULL) {
                        err = SecKeychainItemExport(cert, kSecFormatX509Cert, kSecItemPemArmour, NULL, &data);
                        if (err != noErr) {
                                continue;
                        }
                }

                if (data != NULL) {
                        CFDataAppendBytes(combinedData, CFDataGetBytePtr(data), CFDataGetLength(data));
                        CFRelease(data);
                }
        }

        CFRelease(certs);

        *pemRoots = combinedData;
        return 0;
}
*/
import "C"
import (
        "crypto/x509"
        "unsafe"
)

func initDefaultRoots() {
        roots := x509.NewCertPool()

        var data C.CFDataRef = nil
        err := C.FetchPEMRoots(&data)
        if err != -1 {
                defer C.CFRelease(C.CFTypeRef(data))
                buf := C.GoBytes(unsafe.Pointer(C.CFDataGetBytePtr(data)), C.int(C.CFDataGetLength(data)))
                roots.AppendCertsFromPEM(buf)
        }

        varDefaultRoots = roots
}

Go to most recent revision | Compare with Previous | Blame | View Log

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.