gpt4 book ai didi

ios - 在运行时获取配置文件和证书的详细信息

转载 作者:塔克拉玛干 更新时间:2023-11-02 09:36:17 24 4
gpt4 key购买 nike

我想在我的应用程序中获取并显示我的配置文件和分发证书的详细信息(例如到期日期和注册公司)。我已经试过了 this但它在我的应用程序中无法正常工作。它最初为 profilePath 本身提供 nil。

我使用的是 swift 2.3 和 Xcode 8.2.1。我试图将该代码混合并匹配到我的应用程序中,因为我无法将其完全转换为 swift(卡在 sscanf 方法中)。任何帮助表示赞赏。

最佳答案

我无权访问 Xcode 8/Swift 3.2,但这是在 Swift 4 中执行所需操作所需的代码。我已经在我可用的几个配置文件/证书上对其进行了测试,并且它获取您请求的信息。

配置文件

func getProvisioningProfileExpirationDate() -> Date?
{
self.getCertificateExpirationDate()

let profilePath: String? = Bundle.main.path(forResource: "embedded", ofType: "mobileprovision")
if( profilePath != nil )
{
let plistData = NSData(contentsOfFile: profilePath!)
let plistDataString = String(format: "%@", plistData!)
var plistString: String = extractPlist(fromMobileProvisionDataString:plistDataString)

let pattern = "<key>ExpirationDate</key>.*<date>(.*)</date>"
let regex = try! NSRegularExpression(pattern: pattern, options: .caseInsensitive)
let textCheckingResult : NSTextCheckingResult = regex.firstMatch(in: plistString, options: NSRegularExpression.MatchingOptions(rawValue: UInt(0)), range: NSMakeRange(0, plistString.characters.count))!
let matchRange : NSRange = textCheckingResult.range(at: 1)
let expirationDateString : String = (plistString as NSString).substring(with: matchRange)


let dateFormatter = DateFormatter()
dateFormatter.locale = Locale.current
dateFormatter.dateFormat = "yyyy-MM-dd'T'HH:mm:ssZ"
print( "Profile expires: \(dateFormatter.date(from: expirationDateString)!)" )

return dateFormatter.date(from: expirationDateString)!

}

return nil
}

我们需要做一些操作,因为如果不将 embedded.mobileprovision 文件从十六进制转换为不可读,然后只取出 plist 标签之间的内容。

func extractPlist( fromMobileProvisionDataString:String ) -> String
{
// Remove brackets at beginning and end
var range = Range(NSMakeRange(0, 1), in: fromMobileProvisionDataString)
var plistDataString = fromMobileProvisionDataString.replacingCharacters(in:range!, with: "")
range = Range(NSMakeRange(plistDataString.count-1, 1), in: plistDataString)
plistDataString.replaceSubrange(range!, with: "")

// Remove spaces
plistDataString = plistDataString.replacingOccurrences(of: " ", with: "")

// convert hex to ascii
let profileText = hexStringtoAscii( plistDataString )

// I tried using regular expressions and normal NSString operations to get this, but it simply wouldn't work, so I went with this ugly method.
// return extractPlistText(fromProfileString:profileText)

// Remove whitespaces and new lines characters and splits into individual lines.
let profileWords = profileText.components(separatedBy: CharacterSet.newlines)

var plistString = "";
var inPlist = false;
for word in profileWords
{
if( word.contains("<plist") ) { inPlist = true }

if( inPlist ) { plistString.append(" "); plistString.append( word ) }

if (word.contains("</plist")) { inPlist = false }
}
return plistString;
}

func hexStringtoAscii(_ hexString : String) -> String {

let pattern = "(0x)?([0-9a-f]{2})"
let regex = try! NSRegularExpression(pattern: pattern, options: .caseInsensitive)
let nsString = hexString as NSString
let matches = regex.matches(in: hexString, options: [], range: NSMakeRange(0, nsString.length))
let characters = matches.map {
Character(UnicodeScalar(UInt32(nsString.substring(with: $0.range(at: 2)), radix: 16)!)!)
}
return String(characters)
}

我已验证此方法可以从物理设备上的 embedded.mobileprovision 文件中提取到期日期。从配置文件 plist 数据中提取其他元素是微不足道的。

证书:

要获取证书信息,我可以使用以下方法使其正常工作:

func getCertificateExpirationDate() -> Date?
{

let profilePath: String? = Bundle.main.path(forResource: "embedded", ofType: "mobileprovision")
if( profilePath != nil )
{
let plistData = NSData(contentsOfFile: profilePath!)
let plistDataString = String(format: "%@", plistData!)
var plistString: String = extractPlist(fromMobileProvisionDataString:plistDataString)

// Trying to extract thecert information aswell, but haven't gotten it to work.

let certPattern = "<key>DeveloperCertificates</key>\\s*<array>\\s*<data>([^<]*)</data>"
let certRegex = try! NSRegularExpression(pattern: certPattern, options: .caseInsensitive)
let certCheckingResult : NSTextCheckingResult = certRegex.firstMatch(in: plistString, options: NSRegularExpression.MatchingOptions(rawValue: UInt(0)), range: NSMakeRange(0, plistString.characters.count))!
let certMatchRange : NSRange = certCheckingResult.range(at: 1)
let certDataString : String = (plistString as NSString).substring(with: certMatchRange)

let decodedData = Data(base64Encoded: certDataString, options: [])

let decodedString = String( data: decodedData!, encoding: .ascii )

let cfData = decodedData as! CFData
let certificate: SecCertificate = SecCertificateCreateWithData(nil, cfData)!
var description: CFString = SecCertificateCopySubjectSummary(certificate)!
print( "Certificate name: \(description)")

let certDate = self.extractCertExpirationDate(fromDecodedCertDataString: decodedString!)
print( "Certificate expires: \(certDate)")

let certOrg = self.extractCertOrg(fromDecodedCertDataString: decodedString!)
print( "Certificate organization: \(certOrg)")

return certDate
}
return nil
}

func extractCertExpirationDate( fromDecodedCertDataString: String ) -> Date
{
// Remove new lines characters and split into individual lines.
let certWords = fromDecodedCertDataString.components(separatedBy: CharacterSet.newlines)

var foundWWDRCA = false;
var certStartDate = ""
var certEndDate = ""
var certOrg = ""

for word in certWords
{
if( foundWWDRCA && (certStartDate.isEmpty || certEndDate.isEmpty))
{
var certData = word.prefix(13)
if( certStartDate.isEmpty && !certData.isEmpty )
{
certStartDate = String( certData );
}
else if( certEndDate.isEmpty && !certData.isEmpty )
{
certEndDate = String( certData );
}
}
if( word.contains("Apple Worldwide Developer Relations Certification Authority") ) { foundWWDRCA = true }
}

let dateFormatter = DateFormatter()
dateFormatter.locale = Locale.current
dateFormatter.dateFormat = "yyMMddHHmmssZ"
return dateFormatter.date(from: certEndDate)!
}

func extractCertOrg( fromDecodedCertDataString: String ) -> String
{
// Remove new lines characters and split into individual lines.
let certWords = fromDecodedCertDataString.components(separatedBy: CharacterSet.newlines)

var foundWWDRCA = false;
var certStartDate = ""
var certEndDate = ""
var certOrg = ""

for word in certWords
{
if( foundWWDRCA && (certStartDate.isEmpty || certEndDate.isEmpty))
{
var certData = word.prefix(13)
if( certStartDate.isEmpty && !certData.isEmpty )
{
certStartDate = String( certData );
}
else if( certEndDate.isEmpty && !certData.isEmpty )
{
certEndDate = String( certData );
}
}
else if( foundWWDRCA && word.contains("\u{17}") && certOrg.isEmpty)
{
var orgString = word.suffix(word.count-1)
certOrg = String( orgString.prefix(orgString.count - 1))
}

if( word.contains("Apple Worldwide Developer Relations Certification Authority") ) { foundWWDRCA = true }
}
return certOrg
}

请注意,这只会检查安装时与应用程序捆绑在一起的配置文件/证书。它不会检查设备上其他可能有效的配置文件。因此,即使嵌入式配置文件已过期,如果有其他机制可以在使用的设备上安装配置文件(设备管理、使用更新的通配符配置文件安装另一个应用程序等),应用程序仍有可能运行。但是,如果用于签署应用程序的证书已过期,即使设备上存在更新的配置文件,它也不会运行。

对于证书信息,我仍然认为最安全的方法是使用 openssl 库来解密 DER 编码的 x509 证书,但是在 base64 解码证书数据后我能够做的解析似乎提取了您需要的信息.

关于ios - 在运行时获取配置文件和证书的详细信息,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/49188337/

24 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com