Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
//
// validatereceipt.m
//
// Created by Ruotger Skupin on 23.10.10.
// Copyright 2010-2011 Matthew Stevens, Ruotger Skupin, Apple, Dave Carlton, Fraser Hess, anlumo, David Keegan, Alessandro Segala. All rights reserved.
//
/*
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the distribution.
Neither the name of the copyright holders nor the names of its contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#import "validatereceipt.h"
// link with Foundation.framework, IOKit.framework, Security.framework and libCrypto (via -lcrypto in Other Linker Flags)
#import <IOKit/IOKitLib.h>
#import <Foundation/Foundation.h>
#import <Security/Security.h>
#include <openssl/pkcs7.h>
#include <openssl/objects.h>
#include <openssl/sha.h>
#include <openssl/x509.h>
#include <openssl/err.h>
//#define USE_SAMPLE_RECEIPT // also defined in the debug build settings
#ifdef USE_SAMPLE_RECEIPT
#warning ************************************
#warning ******* USES SAMPLE RECEIPT! *******
#warning ************************************
#endif
#ifndef YES_I_HAVE_READ_THE_WARNING_AND_I_ACCEPT_THE_RISK
#warning --- DON'T USE THIS CODE AS IS! IF EVERYONE USES THE SAME CODE
#warning --- IT IS PRETTY EASY TO BUILD AN AUTOMATIC CRACKING TOOL
#warning --- FOR APPS USING THIS CODE!
#warning --- BY USING THIS CODE YOU ACCEPT TAKING THE RESPONSIBILITY FOR
#warning --- ANY DAMAGE!
#warning ---
#warning --- YOU HAVE BEEN WARNED!
// if you want to take that risk, add "-DYES_I_HAVE_READ_THE_WARNING_AND_I_ACCEPT_THE_RISK" in the build settings at "Other C Flags"
#endif // YES_I_HAVE_READ_THE_WARNING_AND_I_ACCEPT_THE_RISK
#define VRCFRelease(object) if(object) CFRelease(object)
NSString *kReceiptBundleIdentifier = @"BundleIdentifier";
NSString *kReceiptBundleIdentifierData = @"BundleIdentifierData";
NSString *kReceiptVersion = @"Version";
NSString *kReceiptOpaqueValue = @"OpaqueValue";
NSString *kReceiptHash = @"Hash";
NSString *kReceiptInApp = @"InApp";
NSString *kReceiptInAppQuantity = @"Quantity";
NSString *kReceiptInAppProductIdentifier = @"ProductIdentifier";
NSString *kReceiptInAppTransactionIdentifier = @"TransactionIdentifier";
NSString *kReceiptInAppPurchaseDate = @"PurchaseDate";
NSString *kReceiptInAppOriginalTransactionIdentifier = @"OriginalTransactionIdentifier";
NSString *kReceiptInAppOriginalPurchaseDate = @"OriginalPurchaseDate";
NSData * appleRootCert(void)
{
OSStatus status;
SecKeychainRef keychain = nil;
status = SecKeychainOpen("/System/Library/Keychains/SystemRootCertificates.keychain", &keychain);
if(status){
VRCFRelease(keychain);
return nil;
}
CFArrayRef searchList = CFArrayCreate(kCFAllocatorDefault, (const void**)&keychain, 1, &kCFTypeArrayCallBacks);
// For some reason we get a malloc reference underflow warning message when garbage collection
// is on. Perhaps a bug in SecKeychainOpen where the keychain reference isn't actually retained
// in GC?
#ifndef __OBJC_GC__
VRCFRelease(keychain);
#endif
SecKeychainSearchRef searchRef = nil;
status = SecKeychainSearchCreateFromAttributes(searchList, kSecCertificateItemClass, NULL, &searchRef);
if(status){
VRCFRelease(searchRef);
VRCFRelease(searchList);
return nil;
}
SecKeychainItemRef itemRef = nil;
NSData * resultData = nil;
while(SecKeychainSearchCopyNext(searchRef, &itemRef) == noErr && resultData == nil) {
// Grab the name of the certificate
SecKeychainAttributeList list;
SecKeychainAttribute attributes[1];
attributes[0].tag = kSecLabelItemAttr;
list.count = 1;
list.attr = attributes;
SecKeychainItemCopyContent(itemRef, nil, &list, nil, nil);
NSData *nameData = [NSData dataWithBytesNoCopy:attributes[0].data length:attributes[0].length freeWhenDone:NO];
NSString *name = [[NSString alloc] initWithData:nameData encoding:NSUTF8StringEncoding];
if([name isEqualToString:@"Apple Root CA"]) {
CSSM_DATA certData;
SecCertificateGetData((SecCertificateRef)itemRef, &certData);
resultData = [NSData dataWithBytes:certData.Data length:certData.Length];
}
SecKeychainItemFreeContent(&list, NULL);
if (itemRef)
VRCFRelease(itemRef);
[name release];
}
VRCFRelease(searchList);
VRCFRelease(searchRef);
return resultData;
}
NSArray * parseInAppPurchasesData(NSData * inappData)
{
#define INAPP_ATTR_START 1700
#define INAPP_QUANTITY 1701
#define INAPP_PRODID 1702
#define INAPP_TRANSID 1703
#define INAPP_PURCHDATE 1704
#define INAPP_ORIGTRANSID 1705
#define INAPP_ORIGPURCHDATE 1706
#define INAPP_ATTR_END 1707
int type = 0;
int xclass = 0;
long length = 0;
NSUInteger dataLenght = [inappData length];
const uint8_t *p = [inappData bytes];
const uint8_t *end = p + dataLenght;
NSMutableArray *resultArray = [NSMutableArray array];
while (p < end)
{
ASN1_get_object(&p, &length, &type, &xclass, end - p);
const uint8_t *set_end = p + length;
if(type != V_ASN1_SET) {
break;
}
NSMutableDictionary *item = [[NSMutableDictionary alloc] initWithCapacity:6];
while (p < set_end) {
ASN1_get_object(&p, &length, &type, &xclass, set_end - p);
if (type != V_ASN1_SEQUENCE)
break;
const uint8_t *seq_end = p + length;
int attr_type = 0;
int attr_version = 0;
// Attribute type
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_INTEGER) {
if(length == 1) {
attr_type = p[0];
}
else if(length == 2) {
attr_type = p[0] * 0x100 + p[1]
;
}
}
p += length;
// Attribute version
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_INTEGER && length == 1) {
// clang analyser hit (wontfix at the moment, since the code might come in handy later)
// But if someone has a convincing case throwing that out, I might do so, Roddi
attr_version = p[0];
}
p += length;
// Only parse attributes we're interested in
if (attr_type > INAPP_ATTR_START && attr_type < INAPP_ATTR_END) {
NSString *key = nil;
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_OCTET_STRING) {
//NSData *data = [NSData dataWithBytes:p length:(NSUInteger)length];
// Integers
if(attr_type == INAPP_QUANTITY) {
int num_type = 0;
long num_length = 0;
const uint8_t *num_p = p;
ASN1_get_object(&num_p, &num_length, &num_type, &xclass, seq_end - num_p);
if(num_type == V_ASN1_INTEGER) {
NSUInteger quantity = 0;
if(num_length) {
quantity += num_p[0];
if(num_length > 1) {
quantity += num_p[1] * 0x100;
if(num_length > 2) {
quantity += num_p[2] * 0x10000;
if(num_length > 3) {
quantity += num_p[3] * 0x1000000;
}
}
}
}
NSNumber *num = [[NSNumber alloc] initWithUnsignedInteger:quantity];
[item setObject:num forKey:kReceiptInAppQuantity];
[num release];
}
}
// Strings
if (attr_type == INAPP_PRODID ||
attr_type == INAPP_TRANSID ||
attr_type == INAPP_ORIGTRANSID ||
attr_type == INAPP_PURCHDATE ||
attr_type == INAPP_ORIGPURCHDATE) {
int str_type = 0;
long str_length = 0;
const uint8_t *str_p = p;
ASN1_get_object(&str_p, &str_length, &str_type, &xclass, seq_end - str_p);
if (str_type == V_ASN1_UTF8STRING) {
switch (attr_type) {
case INAPP_PRODID:
key = kReceiptInAppProductIdentifier;
break;
case INAPP_TRANSID:
key = kReceiptInAppTransactionIdentifier;
break;
case INAPP_ORIGTRANSID:
key = kReceiptInAppOriginalTransactionIdentifier;
break;
}
if (key) {
NSString *string = [[NSString alloc] initWithBytes:str_p
length:(NSUInteger)str_length
encoding:NSUTF8StringEncoding];
[item setObject:string forKey:key];
[string release];
}
}
if (str_type == V_ASN1_IA5STRING) {
switch (attr_type) {
case INAPP_PURCHDATE:
key = kReceiptInAppPurchaseDate;
break;
case INAPP_ORIGPURCHDATE:
key = kReceiptInAppOriginalPurchaseDate;
break;
}
if (key) {
NSString *string = [[NSString alloc] initWithBytes:str_p
length:(NSUInteger)str_length
encoding:NSASCIIStringEncoding];
[item setObject:string forKey:key];
[string release];
}
}
}
}
p += length;
}
// Skip any remaining fields in this SEQUENCE
while (p < seq_end) {
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
p += length;
}
}
// Skip any remaining fields in this SET
while (p < set_end) {
ASN1_get_object(&p, &length, &type, &xclass, set_end - p);
p += length;
}
[resultArray addObject:item];
[item release];
}
return resultArray;
}
NSDictionary * dictionaryWithAppStoreReceipt(NSString * path)
{
NSData * rootCertData = appleRootCert();
#define ATTR_START 1
#define BUNDLE_ID 2
#define VERSION 3
#define OPAQUE_VALUE 4
#define HASH 5
#define ATTR_END 6
#define INAPP_PURCHASE 17
ERR_load_PKCS7_strings();
ERR_load_X509_strings();
OpenSSL_add_all_digests();
// Expected input is a PKCS7 container with signed data containing
// an ASN.1 SET of SEQUENCE structures. Each SEQUENCE contains
// two INTEGERS and an OCTET STRING.
const char * receiptPath = [[path stringByStandardizingPath] fileSystemRepresentation];
FILE *fp = fopen(receiptPath, "rb");
if (fp == NULL)
return nil;
PKCS7 *p7 = d2i_PKCS7_fp(fp, NULL);
fclose(fp);
// Check if the receipt file was invalid (otherwise we go crashing and burning)
if (p7 == NULL) {
return nil;
}
if (!PKCS7_type_is_signed(p7)) {
PKCS7_free(p7);
return nil;
}
if (!PKCS7_type_is_data(p7->d.sign->contents)) {
PKCS7_free(p7);
return nil;
}
int verifyReturnValue = 0;
X509_STORE *store = X509_STORE_new();
if (store)
{
const uint8_t *data = (uint8_t *)(rootCertData.bytes);
X509 *appleCA = d2i_X509(NULL, &data, (long)rootCertData.length);
if (appleCA)
{
BIO *payload = BIO_new(BIO_s_mem());
X509_STORE_add_cert(store, appleCA);
if (payload)
{
verifyReturnValue = PKCS7_verify(p7,NULL,store,NULL,payload,0);
BIO_free(payload);
}
// this code will come handy when the first real receipts arrive
#if 0
unsigned long err = ERR_get_error();
if(err)
printf("%lu: %s\n",err,ERR_error_string(err,NULL));
else {
STACK_OF(X509) *stack = PKCS7_get0_signers(p7, NULL, 0);
for(NSUInteger i = 0; i < sk_num(stack); i++) {
const X509 *signer = (X509*)sk_value(stack, i);
NSLog(@"name = %s", signer->name);
}
}
#endif
X509_free(appleCA);
}
X509_STORE_free(store);
}
EVP_cleanup();
if (verifyReturnValue != 1)
{
PKCS7_free(p7);
return nil;
}
ASN1_OCTET_STRING *octets = p7->d.sign->contents->d.data;
const uint8_t *p = octets->data;
const uint8_t *end = p + octets->length;
int type = 0;
int xclass = 0;
long length = 0;
ASN1_get_object(&p, &length, &type, &xclass, end - p);
if (type != V_ASN1_SET) {
PKCS7_free(p7);
return nil;
}
NSMutableDictionary *info = [NSMutableDictionary dictionary];
while (p < end) {
ASN1_get_object(&p, &length, &type, &xclass, end - p);
if (type != V_ASN1_SEQUENCE)
break;
const uint8_t *seq_end = p + length;
int attr_type = 0;
int attr_version = 0;
// Attribute type
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_INTEGER && length == 1) {
attr_type = p[0];
}
p += length;
// Attribute version
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_INTEGER && length == 1) {
attr_version = p[0];
attr_version = attr_version;
}
p += length;
// Only parse attributes we're interested in
if ((attr_type > ATTR_START && attr_type < ATTR_END) || attr_type == INAPP_PURCHASE) {
NSString *key = nil;
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
if (type == V_ASN1_OCTET_STRING) {
NSData *data = [NSData dataWithBytes:p length:(NSUInteger)length];
// Bytes
if (attr_type == BUNDLE_ID || attr_type == OPAQUE_VALUE || attr_type == HASH) {
switch (attr_type) {
case BUNDLE_ID:
// This is included for hash generation
key = kReceiptBundleIdentifierData;
break;
case OPAQUE_VALUE:
key = kReceiptOpaqueValue;
break;
case HASH:
key = kReceiptHash;
break;
}
if (key) {
[info setObject:data forKey:key];
}
}
// Strings
if (attr_type == BUNDLE_ID || attr_type == VERSION) {
int str_type = 0;
long str_length = 0;
const uint8_t *str_p = p;
ASN1_get_object(&str_p, &str_length, &str_type, &xclass, seq_end - str_p);
if (str_type == V_ASN1_UTF8STRING) {
switch (attr_type) {
case BUNDLE_ID:
key = kReceiptBundleIdentifier;
break;
case VERSION:
key = kReceiptVersion;
break;
}
if (key) {
NSString *string = [[NSString alloc] initWithBytes:str_p
length:(NSUInteger)str_length
encoding:NSUTF8StringEncoding];
[info setObject:string forKey:key];
[string release];
}
}
}
// In-App purchases
if (attr_type == INAPP_PURCHASE)
{
NSArray *inApp = parseInAppPurchasesData(data);
[info setObject:inApp forKey:kReceiptInApp];
}
}
p += length;
}
// Skip any remaining fields in this SEQUENCE
while (p < seq_end) {
ASN1_get_object(&p, &length, &type, &xclass, seq_end - p);
p += length;
}
}
PKCS7_free(p7);
return info;
}
// Returns a CFData object, containing the machine's GUID.
CFDataRef copy_mac_address(void)
{
kern_return_t kernResult;
mach_port_t master_port;
CFMutableDictionaryRef matchingDict;
io_iterator_t iterator;
io_object_t service;
CFDataRef macAddress = nil;
kernResult = IOMasterPort(MACH_PORT_NULL, &master_port);
if (kernResult != KERN_SUCCESS) {
printf("IOMasterPort returned %d\n", kernResult);
return nil;
}
matchingDict = IOBSDNameMatching(master_port, 0, "en0");
if(!matchingDict) {
printf("IOBSDNameMatching returned empty dictionary\n");
return nil;
}
kernResult = IOServiceGetMatchingServices(master_port, matchingDict, &iterator);
if (kernResult != KERN_SUCCESS) {
printf("IOServiceGetMatchingServices returned %d\n", kernResult);
return nil;
}
while((service = IOIteratorNext(iterator)) != 0)
{
io_object_t parentService;
kernResult = IORegistryEntryGetParentEntry(service, kIOServicePlane, &parentService);
if(kernResult == KERN_SUCCESS)
{
VRCFRelease(macAddress);
macAddress = IORegistryEntryCreateCFProperty(parentService, CFSTR("IOMACAddress"), kCFAllocatorDefault, 0);
IOObjectRelease(parentService);
}
else {
printf("IORegistryEntryGetParentEntry returned %d\n", kernResult);
}
IOObjectRelease(service);
}
return macAddress;
}
NSArray* obtainInAppPurchases(NSString *receiptPath)
{
// According to the documentation, we need to validate the receipt first.
// If the receipt is not valid, no In-App purchase is valid.
// This performs a "quick" validation. Please use validateReceiptAtPath to perform a full validation.
NSDictionary * receipt = dictionaryWithAppStoreReceipt(receiptPath);
if (!receipt)
return nil;
NSArray *purchases = [receipt objectForKey:kReceiptInApp];
if(!purchases || ![purchases isKindOfClass:[NSArray class]])
return nil;
return purchases;
}
extern const NSString * global_bundleVersion;
extern const NSString * global_bundleIdentifier;
// in your project define those two somewhere as such:
// const NSString * global_bundleVersion = @"1.0.2";
// const NSString * global_bundleIdentifier = @"com.example.SampleApp";
BOOL validateReceiptAtPath(NSString * path)
{
// it turns out, it's a bad idea, to use these two NSBundle methods in your app:
//
// bundleVersion = [[NSBundle mainBundle] objectForInfoDictionaryKey:@"CFBundleShortVersionString"];
// bundleIdentifier = [[NSBundle mainBundle] bundleIdentifier];
//
// http://www.craftymind.com/2011/01/06/mac-app-store-hacked-how-developers-can-better-protect-themselves/
//
// so use hard coded values instead (probably even somehow obfuscated)
// analyser warning when USE_SAMPLE_RECEIPT is defined (wontfix)
NSString *bundleVersion = (NSString*)global_bundleVersion;
NSString *bundleIdentifier = (NSString*)global_bundleIdentifier;
#ifndef USE_SAMPLE_RECEIPT
// avoid making stupid mistakes --> check again
NSCAssert([bundleVersion isEqualToString:[[NSBundle mainBundle] objectForInfoDictionaryKey:@"CFBundleShortVersionString"]],
@"whoops! check the hard-coded CFBundleShortVersionString!");
NSCAssert([bundleIdentifier isEqualToString:[[NSBundle mainBundle] bundleIdentifier]],
@"whoops! check the hard-coded bundle identifier!");
#else
bundleVersion = @"1.0.2";
bundleIdentifier = @"com.example.SampleApp";
#endif
NSDictionary * receipt = dictionaryWithAppStoreReceipt(path);
if (!receipt)
return NO;
NSData * guidData = nil;
#ifndef USE_SAMPLE_RECEIPT
guidData = (NSData*)copy_mac_address();
if ([NSGarbageCollector defaultCollector])
[[NSGarbageCollector defaultCollector] enableCollectorForPointer:guidData];
else
[guidData autorelease];
if (!guidData)
return NO;
#else
// Overwrite with example GUID for use with example receipt
unsigned char guid[] = { 0x00, 0x17, 0xf2, 0xc4, 0xbc, 0xc0 };
guidData = [NSData dataWithBytes:guid length:sizeof(guid)];
#endif
NSMutableData *input = [NSMutableData data];
[input appendData:guidData];
[input appendData:[receipt objectForKey:kReceiptOpaqueValue]];
[input appendData:[receipt objectForKey:kReceiptBundleIdentifierData]];
NSMutableData *hash = [NSMutableData dataWithLength:SHA_DIGEST_LENGTH];
SHA1([input bytes], [input length], [hash mutableBytes]);
if ([bundleIdentifier isEqualToString:[receipt objectForKey:kReceiptBundleIdentifier]] &&
[bundleVersion isEqualToString:[receipt objectForKey:kReceiptVersion]] &&
[hash isEqualToData:[receipt objectForKey:kReceiptHash]])
{
return YES;
}
return NO;
}