]> git.saurik.com Git - apple/libsecurity_codesigning.git/blame - lib/SecCode.cpp
libsecurity_codesigning-55032.tar.gz
[apple/libsecurity_codesigning.git] / lib / SecCode.cpp
CommitLineData
7d31e928 1/*
f60086fc 2 * Copyright (c) 2006-2010 Apple Inc. All Rights Reserved.
7d31e928
A
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24//
25// SecCode - API frame for SecCode objects.
26//
27// Note that some SecCode* functions take SecStaticCodeRef arguments in order to
28// accept either static or dynamic code references, operating on the respective
29// StaticCode. Those functions are in SecStaticCode.cpp, not here, despite their name.
30//
31#include "cs.h"
32#include "Code.h"
33#include "cskernel.h"
d1c1ab47 34#include <security_utilities/cfmunge.h>
7d31e928
A
35
36using namespace CodeSigning;
37
38
39//
40// CFError user info keys
41//
f60086fc 42const CFStringRef kSecCFErrorArchitecture = CFSTR("SecCSArchitecture");
7d31e928
A
43const CFStringRef kSecCFErrorPattern = CFSTR("SecCSPattern");
44const CFStringRef kSecCFErrorResourceSeal = CFSTR("SecCSResourceSeal");
f60086fc 45const CFStringRef kSecCFErrorResourceAdded = CFSTR("SecCSResourceAdded");
7d31e928
A
46const CFStringRef kSecCFErrorResourceAltered = CFSTR("SecCSResourceAltered");
47const CFStringRef kSecCFErrorResourceMissing = CFSTR("SecCSResourceMissing");
f60086fc 48const CFStringRef kSecCFErrorInfoPlist = CFSTR("SecCSInfoPlist");
7d31e928
A
49const CFStringRef kSecCFErrorGuestAttributes = CFSTR("SecCSGuestAttributes");
50const CFStringRef kSecCFErrorRequirementSyntax = CFSTR("SecRequirementSyntax");
f60086fc
A
51const CFStringRef kSecCFErrorPath = CFSTR("SecComponentPath");
52
7d31e928
A
53
54//
55// CF-standard type code functions
56//
57CFTypeID SecCodeGetTypeID(void)
58{
59 BEGIN_CSAPI
60 return gCFObjects().Code.typeID;
61 END_CSAPI1(_kCFRuntimeNotATypeID)
62}
63
64
65//
d1c1ab47 66// Get a reference to the calling code.
7d31e928 67//
d1c1ab47 68OSStatus SecCodeCopySelf(SecCSFlags flags, SecCodeRef *selfRef)
7d31e928
A
69{
70 BEGIN_CSAPI
71
72 checkFlags(flags);
d1c1ab47
A
73 CFRef<CFMutableDictionaryRef> attributes = makeCFMutableDictionary(1,
74 kSecGuestAttributePid, CFTempNumber(getpid()).get());
f60086fc 75 CodeSigning::Required(selfRef) = SecCode::autoLocateGuest(attributes, flags)->handle(false);
5b2e6316 76
d1c1ab47 77 END_CSAPI
5b2e6316
A
78}
79
80
81//
d1c1ab47 82// Get the dynamic status of a code.
5b2e6316 83//
d1c1ab47 84OSStatus SecCodeGetStatus(SecCodeRef codeRef, SecCSFlags flags, SecCodeStatus *status)
5b2e6316
A
85{
86 BEGIN_CSAPI
87
88 checkFlags(flags);
f60086fc 89 CodeSigning::Required(status) = SecCode::required(codeRef)->status();
d1c1ab47
A
90
91 END_CSAPI
92}
93
94
95//
96// Change the dynamic status of a code
97//
98OSStatus SecCodeSetStatus(SecCodeRef codeRef, SecCodeStatusOperation operation,
99 CFDictionaryRef arguments, SecCSFlags flags)
100{
101 BEGIN_CSAPI
102
103 checkFlags(flags);
104 SecCode::required(codeRef)->status(operation, arguments);
7d31e928
A
105
106 END_CSAPI
107}
108
109
110//
111// Get the StaticCode for an Code
112//
113OSStatus SecCodeCopyStaticCode(SecCodeRef codeRef, SecCSFlags flags, SecStaticCodeRef *staticCodeRef)
114{
115 BEGIN_CSAPI
116
117 checkFlags(flags);
118 SecPointer<SecStaticCode> staticCode = SecCode::required(codeRef)->staticCode();
f60086fc 119 CodeSigning::Required(staticCodeRef) = staticCode ? staticCode->handle() : NULL;
7d31e928
A
120
121 END_CSAPI
122}
123
124
125//
126// Get the host for an Code
127//
128OSStatus SecCodeCopyHost(SecCodeRef guestRef, SecCSFlags flags, SecCodeRef *hostRef)
129{
130 BEGIN_CSAPI
131
132 checkFlags(flags);
133 SecPointer<SecCode> host = SecCode::required(guestRef)->host();
f60086fc 134 CodeSigning::Required(hostRef) = host ? host->handle() : NULL;
7d31e928
A
135
136 END_CSAPI
137}
138
139
140//
141// Find a guest by attribute(s)
142//
7d31e928 143const CFStringRef kSecGuestAttributeCanonical = CFSTR("canonical");
d1c1ab47 144const CFStringRef kSecGuestAttributeHash = CFSTR("codedirectory-hash");
7d31e928 145const CFStringRef kSecGuestAttributeMachPort = CFSTR("mach-port");
d1c1ab47
A
146const CFStringRef kSecGuestAttributePid = CFSTR("pid");
147const CFStringRef kSecGuestAttributeArchitecture = CFSTR("architecture");
148const CFStringRef kSecGuestAttributeSubarchitecture = CFSTR("subarchitecture");
7d31e928
A
149
150OSStatus SecCodeCopyGuestWithAttributes(SecCodeRef hostRef,
151 CFDictionaryRef attributes, SecCSFlags flags, SecCodeRef *guestRef)
152{
153 BEGIN_CSAPI
154
155 checkFlags(flags);
156 if (hostRef) {
157 if (SecCode *guest = SecCode::required(hostRef)->locateGuest(attributes))
f60086fc 158 CodeSigning::Required(guestRef) = guest->handle(false);
7d31e928
A
159 else
160 return errSecCSNoSuchCode;
161 } else
f60086fc 162 CodeSigning::Required(guestRef) = SecCode::autoLocateGuest(attributes, flags)->handle(false);
7d31e928
A
163
164 END_CSAPI
165}
166
167
168//
169// Shorthand for getting the SecCodeRef for a UNIX process
170//
171OSStatus SecCodeCreateWithPID(pid_t pid, SecCSFlags flags, SecCodeRef *processRef)
172{
173 BEGIN_CSAPI
174
175 checkFlags(flags);
176 if (SecCode *guest = KernelCode::active()->locateGuest(CFTemp<CFDictionaryRef>("{%O=%d}", kSecGuestAttributePid, pid)))
f60086fc 177 CodeSigning::Required(processRef) = guest->handle(false);
7d31e928
A
178 else
179 return errSecCSNoSuchCode;
180
181 END_CSAPI
182}
183
184
185//
186// Check validity of an Code
187//
188OSStatus SecCodeCheckValidity(SecCodeRef codeRef, SecCSFlags flags,
189 SecRequirementRef requirementRef)
190{
191 return SecCodeCheckValidityWithErrors(codeRef, flags, requirementRef, NULL);
192}
193
194OSStatus SecCodeCheckValidityWithErrors(SecCodeRef codeRef, SecCSFlags flags,
195 SecRequirementRef requirementRef, CFErrorRef *errors)
196{
197 BEGIN_CSAPI
198
199 checkFlags(flags,
200 kSecCSConsiderExpiration);
201 SecPointer<SecCode> code = SecCode::required(codeRef);
202 code->checkValidity(flags);
203 if (const SecRequirement *req = SecRequirement::optional(requirementRef))
f60086fc 204 code->staticCode()->validateRequirement(req->requirement(), errSecCSReqFailed);
7d31e928
A
205
206 END_CSAPI_ERRORS
207}
208
209
210//
211// Collect suitably laundered information about the code signature of a SecStaticCode
212// and return it as a CFDictionary.
213//
214// This API contracts to return a few pieces of information even for unsigned
215// code. This means that a SecStaticCodeRef is usable as a basic indentifier
216// (i.e. handle) for any code out there.
217//
218const CFStringRef kSecCodeInfoCertificates = CFSTR("certificates");
219const CFStringRef kSecCodeInfoChangedFiles = CFSTR("changed-files");
220const CFStringRef kSecCodeInfoCMS = CFSTR("cms");
221const CFStringRef kSecCodeInfoDesignatedRequirement = CFSTR("designated-requirement");
516ae477 222const CFStringRef kSecCodeInfoEntitlements = CFSTR("entitlements");
7d31e928 223const CFStringRef kSecCodeInfoFormat = CFSTR("format");
f60086fc 224const CFStringRef kSecCodeInfoDigestAlgorithm = CFSTR("digest-algorithm");
7d31e928
A
225const CFStringRef kSecCodeInfoIdentifier = CFSTR("identifier");
226const CFStringRef kSecCodeInfoImplicitDesignatedRequirement = CFSTR("implicit-requirement");
227const CFStringRef kSecCodeInfoMainExecutable = CFSTR("main-executable");
228const CFStringRef kSecCodeInfoPList = CFSTR("info-plist");
229const CFStringRef kSecCodeInfoRequirements = CFSTR("requirements");
516ae477 230const CFStringRef kSecCodeInfoRequirementData = CFSTR("requirement-data");
d1c1ab47 231const CFStringRef kSecCodeInfoSource = CFSTR("source");
7d31e928 232const CFStringRef kSecCodeInfoStatus = CFSTR("status");
d1c1ab47 233const CFStringRef kSecCodeInfoTime = CFSTR("signing-time");
7d31e928 234const CFStringRef kSecCodeInfoTrust = CFSTR("trust");
d1c1ab47
A
235const CFStringRef kSecCodeInfoUnique = CFSTR("unique");
236
237const CFStringRef kSecCodeInfoCodeDirectory = CFSTR("CodeDirectory");
238const CFStringRef kSecCodeInfoCodeOffset = CFSTR("CodeOffset");
239const CFStringRef kSecCodeInfoResourceDirectory = CFSTR("ResourceDirectory");
240
7d31e928
A
241
242OSStatus SecCodeCopySigningInformation(SecStaticCodeRef codeRef, SecCSFlags flags,
243 CFDictionaryRef *infoRef)
244{
245 BEGIN_CSAPI
246
247 checkFlags(flags,
248 kSecCSInternalInformation
249 | kSecCSSigningInformation
250 | kSecCSRequirementInformation
251 | kSecCSDynamicInformation
252 | kSecCSContentInformation);
253
254 SecPointer<SecStaticCode> code = SecStaticCode::requiredStatic(codeRef);
255 CFRef<CFDictionaryRef> info = code->signingInformation(flags);
256
257 if (flags & kSecCSDynamicInformation)
d1c1ab47 258 if (SecPointer<SecCode> dcode = SecStaticCode::optionalDynamic(codeRef))
7d31e928 259 info = cfmake<CFDictionaryRef>("{+%O,%O=%u}", info.get(),
d1c1ab47 260 kSecCodeInfoStatus, dcode->status());
7d31e928 261
f60086fc 262 CodeSigning::Required(infoRef) = info.yield();
7d31e928
A
263
264 END_CSAPI
265}
266