2 * Copyright (c) 2011 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
23 #include "policyengine.h"
25 #include <security_utilities/cfmunge.h>
26 #include <Security/Security.h>
27 #include <Security/SecRequirementPriv.h>
28 #include <Security/SecPolicyPriv.h>
29 #include <Security/SecTrustPriv.h>
30 #include <Security/SecCodeSigner.h>
31 #include <Security/cssmapplePriv.h>
33 #include <security_utilities/unix++.h>
34 #include "quarantine++.h"
36 #include <CoreServices/CoreServicesPriv.h>
37 #undef check // Macro! Yech.
40 namespace CodeSigning
{
42 static const double NEGATIVE_HOLD
= 60.0/86400; // 60 seconds to cache negative outcomes
45 static void authorizeUpdate(SecCSFlags flags
, CFDictionaryRef context
);
46 static void normalizeTarget(CFRef
<CFTypeRef
> &target
, CFDictionary
&context
, bool signUnsigned
= false);
52 PolicyEngine::PolicyEngine()
53 : PolicyDatabase(NULL
, SQLITE_OPEN_READWRITE
| SQLITE_OPEN_CREATE
)
57 PolicyEngine::~PolicyEngine()
62 // Top-level evaluation driver
64 void PolicyEngine::evaluate(CFURLRef path
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
, CFMutableDictionaryRef result
)
67 case kAuthorityExecute
:
68 evaluateCode(path
, flags
, context
, result
);
70 case kAuthorityInstall
:
71 evaluateInstall(path
, flags
, context
, result
);
73 case kAuthorityOpenDoc
:
74 evaluateDocOpen(path
, flags
, context
, result
);
77 MacOSError::throwMe(errSecCSInvalidAttributeValues
);
85 // Read from disk, evaluate properly, cache as indicated. The whole thing, so far.
87 void PolicyEngine::evaluateCode(CFURLRef path
, SecAssessmentFlags flags
, CFDictionaryRef context
, CFMutableDictionaryRef result
)
89 const AuthorityType type
= kAuthorityExecute
;
91 CFRef
<SecStaticCodeRef
> code
;
92 MacOSError::check(SecStaticCodeCreateWithPath(path
, kSecCSDefaultFlags
, &code
.aref()));
94 const SecCSFlags validationFlags
= kSecCSEnforceRevocationChecks
;
96 SQLite::Statement
query(*this,
97 "SELECT allow, requirement, id, label, expires, flags, disabled FROM scan_authority"
99 " ORDER BY priority DESC;");
100 query
.bind(":type").integer(type
);
101 SQLite3::int64 latentID
= 0; // first (highest priority) disabled matching ID
102 std::string latentLabel
; // ... and associated label, if any
103 while (query
.nextRow()) {
104 bool allow
= int(query
[0]);
105 const char *reqString
= query
[1];
106 SQLite3::int64 id
= query
[2];
107 const char *label
= query
[3];
108 double expires
= query
[4];
109 sqlite3_int64 ruleFlags
= query
[5];
110 SQLite3::int64 disabled
= query
[6];
112 CFRef
<SecRequirementRef
> requirement
;
113 MacOSError::check(SecRequirementCreateWithString(CFTempString(reqString
), kSecCSDefaultFlags
, &requirement
.aref()));
115 OSStatus rc
= SecStaticCodeCheckValidity(code
, validationFlags
| kSecCSBasicValidateOnly
, requirement
);
116 // ok, so this rule matches lets do a full validation if not overriding assessments
117 if (rc
== noErr
&& !overrideAssessment())
118 rc
= SecStaticCodeCheckValidity(code
, validationFlags
, requirement
);
121 case noErr
: // success
123 case errSecCSUnsigned
:
124 cfadd(result
, "{%O=#F}", kSecAssessmentAssessmentVerdict
);
125 addAuthority(result
, "no usable signature");
127 case errSecCSReqFailed
: // requirement missed, but otherwise okay
129 default: // broken in some way; all tests will fail like this so bail out
130 MacOSError::throwMe(rc
);
138 continue; // the loop
141 CFRef
<CFDictionaryRef
> info
; // as needed
142 if (flags
& kSecAssessmentFlagRequestOrigin
) {
144 MacOSError::check(SecCodeCopySigningInformation(code
, kSecCSSigningInformation
, &info
.aref()));
145 if (CFArrayRef chain
= CFArrayRef(CFDictionaryGetValue(info
, kSecCodeInfoCertificates
)))
146 setOrigin(chain
, result
);
148 if (!(ruleFlags
& kAuthorityFlagInhibitCache
) && !(flags
& kSecAssessmentFlagNoCache
)) { // cache inhibit
150 MacOSError::check(SecCodeCopySigningInformation(code
, kSecCSSigningInformation
, &info
.aref()));
151 if (SecTrustRef trust
= SecTrustRef(CFDictionaryGetValue(info
, kSecCodeInfoTrust
))) {
152 CFRef
<CFDictionaryRef
> xinfo
;
153 MacOSError::check(SecTrustCopyExtendedResult(trust
, &xinfo
.aref()));
154 if (CFDateRef limit
= CFDateRef(CFDictionaryGetValue(xinfo
, kSecTrustExpirationDate
))) {
155 double julianLimit
= CFDateGetAbsoluteTime(limit
) / 86400.0 + 2451910.5;
156 this->recordOutcome(code
, allow
, type
, min(expires
, julianLimit
), id
);
160 cfadd(result
, "{%O=%B}", kSecAssessmentAssessmentVerdict
, allow
);
161 addAuthority(result
, label
, id
);
165 // no applicable authority. Deny by default
166 if (flags
& kSecAssessmentFlagRequestOrigin
) {
167 CFRef
<CFDictionaryRef
> info
; // as needed
168 MacOSError::check(SecCodeCopySigningInformation(code
, kSecCSSigningInformation
, &info
.aref()));
169 if (CFArrayRef chain
= CFArrayRef(CFDictionaryGetValue(info
, kSecCodeInfoCertificates
)))
170 setOrigin(chain
, result
);
172 if (!(flags
& kSecAssessmentFlagNoCache
))
173 this->recordOutcome(code
, false, type
, this->julianNow() + NEGATIVE_HOLD
, latentID
);
174 cfadd(result
, "{%O=%B}", kSecAssessmentAssessmentVerdict
, false);
175 addAuthority(result
, latentLabel
.c_str(), latentID
);
180 // Installer archive.
181 // Certs passed from caller (untrusted), no policy engine yet, no caching (since untrusted).
182 // The current "policy" is to trust any proper signature.
184 static CFTypeRef
installerPolicy();
186 void PolicyEngine::evaluateInstall(CFURLRef path
, SecAssessmentFlags flags
, CFDictionaryRef context
, CFMutableDictionaryRef result
)
188 const AuthorityType type
= kAuthorityInstall
;
190 SQLite3::int64 latentID
= 0; // first (highest priority) disabled matching ID
191 std::string latentLabel
; // ... and associated label, if any
192 Xar
xar(cfString(path
).c_str());
194 if (!xar
.isSigned()) {
196 cfadd(result
, "{%O=%B}", kSecAssessmentAssessmentVerdict
, false);
197 addAuthority(result
, "no usable signature");
200 if (CFRef
<CFArrayRef
> certs
= xar
.copyCertChain()) {
201 CFRef
<CFTypeRef
> policy
= installerPolicy();
202 CFRef
<SecTrustRef
> trust
;
203 MacOSError::check(SecTrustCreateWithCertificates(certs
, policy
, &trust
.aref()));
204 // MacOSError::check(SecTrustSetAnchorCertificates(trust, cfEmptyArray())); // no anchors
205 MacOSError::check(SecTrustSetOptions(trust
, kSecTrustOptionAllowExpired
| kSecTrustOptionImplicitAnchors
));
207 SecTrustResultType trustResult
;
208 MacOSError::check(SecTrustEvaluate(trust
, &trustResult
));
209 CFRef
<CFArrayRef
> chain
;
210 CSSM_TP_APPLE_EVIDENCE_INFO
*info
;
211 MacOSError::check(SecTrustGetResult(trust
, &trustResult
, &chain
.aref(), &info
));
213 if (flags
& kSecAssessmentFlagRequestOrigin
)
214 setOrigin(chain
, result
);
216 switch (trustResult
) {
217 case kSecTrustResultProceed
:
218 case kSecTrustResultConfirm
:
219 case kSecTrustResultUnspecified
:
224 MacOSError::check(SecTrustGetCssmResultCode(trust
, &rc
));
225 MacOSError::throwMe(rc
);
229 SQLite::Statement
query(*this,
230 "SELECT allow, requirement, id, label, flags, disabled FROM scan_authority"
231 " WHERE type = :type"
232 " ORDER BY priority DESC;");
233 query
.bind(":type").integer(type
);
234 while (query
.nextRow()) {
235 bool allow
= int(query
[0]);
236 const char *reqString
= query
[1];
237 SQLite3::int64 id
= query
[2];
238 const char *label
= query
[3];
239 //sqlite_uint64 ruleFlags = query[4];
240 SQLite3::int64 disabled
= query
[5];
242 CFRef
<SecRequirementRef
> requirement
;
243 MacOSError::check(SecRequirementCreateWithString(CFTempString(reqString
), kSecCSDefaultFlags
, &requirement
.aref()));
244 switch (OSStatus rc
= SecRequirementEvaluate(requirement
, chain
, NULL
, kSecCSDefaultFlags
)) {
245 case noErr
: // success
247 case errSecCSReqFailed
: // requirement missed, but otherwise okay
249 default: // broken in some way; all tests will fail like this so bail out
250 MacOSError::throwMe(rc
);
258 continue; // the loop
260 // not adding to the object cache - we could, but it's not likely to be worth it
261 cfadd(result
, "{%O=%B}", kSecAssessmentAssessmentVerdict
, allow
);
262 addAuthority(result
, label
, id
);
268 // no applicable authority. Deny by default
269 cfadd(result
, "{%O=#F}", kSecAssessmentAssessmentVerdict
);
270 addAuthority(result
, latentLabel
.c_str(), latentID
);
275 // Create a suitable policy array for verification of installer signatures.
277 static SecPolicyRef
makeCRLPolicy()
279 CFRef
<SecPolicyRef
> policy
;
280 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3
, &CSSMOID_APPLE_TP_REVOCATION_CRL
, &policy
.aref()));
281 CSSM_APPLE_TP_CRL_OPTIONS options
;
282 memset(&options
, 0, sizeof(options
));
283 options
.Version
= CSSM_APPLE_TP_CRL_OPTS_VERSION
;
284 options
.CrlFlags
= CSSM_TP_ACTION_FETCH_CRL_FROM_NET
| CSSM_TP_ACTION_CRL_SUFFICIENT
;
285 CSSM_DATA optData
= { sizeof(options
), (uint8
*)&options
};
286 MacOSError::check(SecPolicySetValue(policy
, &optData
));
287 return policy
.yield();
290 static SecPolicyRef
makeOCSPPolicy()
292 CFRef
<SecPolicyRef
> policy
;
293 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3
, &CSSMOID_APPLE_TP_REVOCATION_OCSP
, &policy
.aref()));
294 CSSM_APPLE_TP_OCSP_OPTIONS options
;
295 memset(&options
, 0, sizeof(options
));
296 options
.Version
= CSSM_APPLE_TP_OCSP_OPTS_VERSION
;
297 options
.Flags
= CSSM_TP_ACTION_OCSP_SUFFICIENT
;
298 CSSM_DATA optData
= { sizeof(options
), (uint8
*)&options
};
299 MacOSError::check(SecPolicySetValue(policy
, &optData
));
300 return policy
.yield();
303 static CFTypeRef
installerPolicy()
305 CFRef
<SecPolicyRef
> base
= SecPolicyCreateBasicX509();
306 CFRef
<SecPolicyRef
> crl
= makeCRLPolicy();
307 CFRef
<SecPolicyRef
> ocsp
= makeOCSPPolicy();
308 return makeCFArray(3, base
.get(), crl
.get(), ocsp
.get());
313 // LaunchServices-layer document open.
314 // We don't cache those at present. If we ever do, we need to authenticate CoreServicesUIAgent as the source of its risk assessment.
316 void PolicyEngine::evaluateDocOpen(CFURLRef path
, SecAssessmentFlags flags
, CFDictionaryRef context
, CFMutableDictionaryRef result
)
319 if (CFStringRef riskCategory
= CFStringRef(CFDictionaryGetValue(context
, kLSDownloadRiskCategoryKey
))) {
320 if (CFEqual(riskCategory
, kLSRiskCategorySafe
)
321 || CFEqual(riskCategory
, kLSRiskCategoryNeutral
)
322 || CFEqual(riskCategory
, kLSRiskCategoryUnknown
)
323 || CFEqual(riskCategory
, kLSRiskCategoryMayContainUnsafeExecutable
)) {
324 cfadd(result
, "{%O=#T}", kSecAssessmentAssessmentVerdict
);
325 addAuthority(result
, "_XProtect");
326 } else if (FileQuarantine(cfString(path
).c_str()).flag(QTN_FLAG_ASSESSMENT_OK
)) {
327 cfadd(result
, "{%O=#T}", kSecAssessmentAssessmentVerdict
);
328 addAuthority(result
, "Prior Assessment");
330 cfadd(result
, "{%O=#F}", kSecAssessmentAssessmentVerdict
);
331 addAuthority(result
, "_XProtect");
333 addToAuthority(result
, kLSDownloadRiskCategoryKey
, riskCategory
);
337 // insufficient information from LS - deny by default
338 cfadd(result
, "{%O=#F}", kSecAssessmentAssessmentVerdict
);
339 addAuthority(result
, "Insufficient Context");
344 // Result-creation helpers
346 void PolicyEngine::addAuthority(CFMutableDictionaryRef parent
, const char *label
, SQLite::int64 row
, CFTypeRef cacheInfo
)
348 CFRef
<CFMutableDictionaryRef
> auth
= makeCFMutableDictionary();
349 if (label
&& label
[0])
350 cfadd(auth
, "{%O=%s}", kSecAssessmentAssessmentSource
, label
);
352 CFDictionaryAddValue(auth
, kSecAssessmentAssessmentAuthorityRow
, CFTempNumber(row
));
354 CFDictionaryAddValue(auth
, kSecAssessmentAssessmentFromCache
, cacheInfo
);
355 CFDictionaryAddValue(parent
, kSecAssessmentAssessmentAuthority
, auth
);
358 void PolicyEngine::addToAuthority(CFMutableDictionaryRef parent
, CFStringRef key
, CFTypeRef value
)
360 CFMutableDictionaryRef authority
= CFMutableDictionaryRef(CFDictionaryGetValue(parent
, kSecAssessmentAssessmentAuthority
));
362 CFDictionaryAddValue(authority
, key
, value
);
367 // Add a rule to the policy database
369 bool PolicyEngine::add(CFTypeRef inTarget
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
)
371 // default type to execution
372 if (type
== kAuthorityInvalid
)
373 type
= kAuthorityExecute
;
375 authorizeUpdate(flags
, context
);
376 CFDictionary
ctx(context
, errSecCSInvalidAttributeValues
);
377 CFCopyRef
<CFTypeRef
> target
= inTarget
;
379 if (type
== kAuthorityOpenDoc
) {
380 // handle document-open differently: use quarantine flags for whitelisting
381 if (!target
|| CFGetTypeID(target
) != CFURLGetTypeID())
382 MacOSError::throwMe(errSecCSInvalidObjectRef
);
383 std::string spath
= cfString(target
.as
<CFURLRef
>()).c_str();
384 FileQuarantine
qtn(spath
.c_str());
385 qtn
.setFlag(QTN_FLAG_ASSESSMENT_OK
);
386 qtn
.applyTo(spath
.c_str());
390 if (type
== kAuthorityInstall
) {
391 return cfmake
<CFDictionaryRef
>("{%O=%O}", kSecAssessmentAssessmentAuthorityOverride
, CFSTR("virtual install"));
394 // resolve URLs to Requirements
395 normalizeTarget(target
, ctx
, true);
397 // if we now have anything else, we're busted
398 if (!target
|| CFGetTypeID(target
) != SecRequirementGetTypeID())
399 MacOSError::throwMe(errSecCSInvalidObjectRef
);
404 double expires
= never
;
407 if (CFNumberRef pri
= ctx
.get
<CFNumberRef
>(kSecAssessmentUpdateKeyPriority
))
408 CFNumberGetValue(pri
, kCFNumberDoubleType
, &priority
);
409 if (CFStringRef lab
= ctx
.get
<CFStringRef
>(kSecAssessmentUpdateKeyLabel
))
410 label
= cfString(lab
);
411 if (CFDateRef time
= ctx
.get
<CFDateRef
>(kSecAssessmentUpdateKeyExpires
))
412 // we're using Julian dates here; convert from CFDate
413 expires
= CFDateGetAbsoluteTime(time
) / 86400.0 + 2451910.5;
414 if (CFBooleanRef allowing
= ctx
.get
<CFBooleanRef
>(kSecAssessmentUpdateKeyAllow
))
415 allow
= allowing
== kCFBooleanTrue
;
416 if (CFStringRef rem
= ctx
.get
<CFStringRef
>(kSecAssessmentUpdateKeyRemarks
))
417 remarks
= cfString(rem
);
419 CFRef
<CFStringRef
> requirementText
;
420 MacOSError::check(SecRequirementCopyString(target
.as
<SecRequirementRef
>(), kSecCSDefaultFlags
, &requirementText
.aref()));
421 SQLite::Transaction
xact(*this, SQLite3::Transaction::deferred
, "add_rule");
422 SQLite::Statement
insert(*this,
423 "INSERT INTO authority (type, allow, requirement, priority, label, expires, remarks)"
424 " VALUES (:type, :allow, :requirement, :priority, :label, :expires, :remarks);");
425 insert
.bind(":type").integer(type
);
426 insert
.bind(":allow").integer(allow
);
427 insert
.bind(":requirement") = requirementText
.get();
428 insert
.bind(":priority") = priority
;
430 insert
.bind(":label") = label
.c_str();
431 insert
.bind(":expires") = expires
;
432 if (!remarks
.empty())
433 insert
.bind(":remarks") = remarks
.c_str();
435 this->purgeObjects(priority
);
437 notify_post(kNotifySecAssessmentUpdate
);
443 // Perform an action on existing authority rule(s)
445 bool PolicyEngine::manipulateRules(const std::string
&stanza
,
446 CFTypeRef inTarget
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
)
448 authorizeUpdate(flags
, context
);
449 CFDictionary
ctx(context
, errSecCSInvalidAttributeValues
);
450 CFCopyRef
<CFTypeRef
> target
= inTarget
;
451 normalizeTarget(target
, ctx
);
455 if (CFStringRef lab
= ctx
.get
<CFStringRef
>(kSecAssessmentUpdateKeyLabel
))
456 label
= cfString(CFStringRef(lab
));
458 SQLite::Transaction
xact(*this, SQLite3::Transaction::deferred
, "rule_change");
459 SQLite::Statement
action(*this);
461 if (label
.empty()) // underspecified
462 MacOSError::throwMe(errSecCSInvalidObjectRef
);
463 if (type
== kAuthorityInvalid
) {
464 action
.query(stanza
+ " WHERE label = :label");
466 action
.query(stanza
+ " WHERE type = :type AND label = :label");
467 action
.bind(":type").integer(type
);
469 action
.bind(":label") = label
.c_str();
470 } else if (CFGetTypeID(target
) == CFNumberGetTypeID()) {
471 action
.query(stanza
+ " WHERE id = :id");
472 action
.bind(":id").integer(cfNumber
<uint64_t>(target
.as
<CFNumberRef
>()));
473 } else if (CFGetTypeID(target
) == SecRequirementGetTypeID()) {
474 if (type
== kAuthorityInvalid
)
475 type
= kAuthorityExecute
;
476 CFRef
<CFStringRef
> requirementText
;
477 MacOSError::check(SecRequirementCopyString(target
.as
<SecRequirementRef
>(), kSecCSDefaultFlags
, &requirementText
.aref()));
478 action
.query(stanza
+ " WHERE type = :type AND requirement = :requirement");
479 action
.bind(":type").integer(type
);
480 action
.bind(":requirement") = requirementText
.get();
482 MacOSError::throwMe(errSecCSInvalidObjectRef
);
485 unsigned int changes
= this->changes(); // latch change count
486 // We MUST purge objects with priority <= MAX(priority of any changed rules);
487 // but for now we just get lazy and purge them ALL.
489 this->purgeObjects(1.0E100
);
491 notify_post(kNotifySecAssessmentUpdate
);
494 // no change; return an error
495 MacOSError::throwMe(errSecCSNoMatches
);
499 bool PolicyEngine::remove(CFTypeRef target
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
)
501 if (type
== kAuthorityOpenDoc
) {
502 // handle document-open differently: use quarantine flags for whitelisting
503 authorizeUpdate(flags
, context
);
504 if (!target
|| CFGetTypeID(target
) != CFURLGetTypeID())
505 MacOSError::throwMe(errSecCSInvalidObjectRef
);
506 std::string spath
= cfString(CFURLRef(target
)).c_str();
507 FileQuarantine
qtn(spath
.c_str());
508 qtn
.clearFlag(QTN_FLAG_ASSESSMENT_OK
);
509 qtn
.applyTo(spath
.c_str());
512 return manipulateRules("DELETE FROM authority", target
, type
, flags
, context
);
515 bool PolicyEngine::enable(CFTypeRef target
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
)
517 return manipulateRules("UPDATE authority SET disabled = 0", target
, type
, flags
, context
);
520 bool PolicyEngine::disable(CFTypeRef target
, AuthorityType type
, SecAssessmentFlags flags
, CFDictionaryRef context
)
522 return manipulateRules("UPDATE authority SET disabled = 1", target
, type
, flags
, context
);
526 bool PolicyEngine::update(CFTypeRef target
, SecAssessmentFlags flags
, CFDictionaryRef context
)
528 AuthorityType type
= typeFor(context
, kAuthorityInvalid
);
529 CFStringRef edit
= CFStringRef(CFDictionaryGetValue(context
, kSecAssessmentContextKeyUpdate
));
530 if (CFEqual(edit
, kSecAssessmentUpdateOperationAdd
))
531 return this->add(target
, type
, flags
, context
);
532 else if (CFEqual(edit
, kSecAssessmentUpdateOperationRemove
))
533 return this->remove(target
, type
, flags
, context
);
534 else if (CFEqual(edit
, kSecAssessmentUpdateOperationEnable
))
535 return this->enable(target
, type
, flags
, context
);
536 else if (CFEqual(edit
, kSecAssessmentUpdateOperationDisable
))
537 return this->disable(target
, type
, flags
, context
);
539 MacOSError::throwMe(errSecCSInvalidAttributeValues
);
544 // Fill in extra information about the originator of cryptographic credentials found - if any
546 void PolicyEngine::setOrigin(CFArrayRef chain
, CFMutableDictionaryRef result
)
549 if (CFArrayGetCount(chain
) > 0)
550 if (SecCertificateRef leaf
= SecCertificateRef(CFArrayGetValueAtIndex(chain
, 0)))
551 if (CFStringRef summary
= SecCertificateCopyLongDescription(NULL
, leaf
, NULL
))
552 CFDictionarySetValue(result
, kSecAssessmentAssessmentOriginator
, summary
);
557 // Take an assessment outcome and record it in the object cache
559 void PolicyEngine::recordOutcome(SecStaticCodeRef code
, bool allow
, AuthorityType type
, double expires
, int authority
)
561 CFRef
<CFDictionaryRef
> info
;
562 MacOSError::check(SecCodeCopySigningInformation(code
, kSecCSDefaultFlags
, &info
.aref()));
563 CFDataRef cdHash
= CFDataRef(CFDictionaryGetValue(info
, kSecCodeInfoUnique
));
564 assert(cdHash
); // was signed
565 CFRef
<CFURLRef
> path
;
566 MacOSError::check(SecCodeCopyPath(code
, kSecCSDefaultFlags
, &path
.aref()));
568 SQLite::Transaction
xact(*this, SQLite3::Transaction::deferred
, "caching");
569 SQLite::Statement
insert(*this,
570 "INSERT OR REPLACE INTO object (type, allow, hash, expires, path, authority)"
571 " VALUES (:type, :allow, :hash, :expires, :path,"
572 " CASE :authority WHEN 0 THEN (SELECT id FROM authority WHERE label = 'No Matching Rule') ELSE :authority END"
574 insert
.bind(":type").integer(type
);
575 insert
.bind(":allow").integer(allow
);
576 insert
.bind(":hash") = cdHash
;
577 insert
.bind(":expires") = expires
;
578 insert
.bind(":path") = cfString(path
).c_str();
579 insert
.bind(":authority").integer(authority
);
586 // Perform update authorization processing.
587 // Throws an exception if authorization is denied.
589 static void authorizeUpdate(SecCSFlags flags
, CFDictionaryRef context
)
591 AuthorizationRef authorization
= NULL
;
594 if (CFTypeRef authkey
= CFDictionaryGetValue(context
, kSecAssessmentUpdateKeyAuthorization
))
595 if (CFGetTypeID(authkey
) == CFDataGetTypeID()) {
596 CFDataRef authdata
= CFDataRef(authkey
);
597 MacOSError::check(AuthorizationCreateFromExternalForm((AuthorizationExternalForm
*)CFDataGetBytePtr(authdata
), &authorization
));
599 if (authorization
== NULL
)
600 MacOSError::check(AuthorizationCreate(NULL
, NULL
, kAuthorizationFlagDefaults
, &authorization
));
602 AuthorizationItem right
[] = {
603 { "com.apple.security.assessment.update", 0, NULL
, 0 }
605 AuthorizationRights rights
= { sizeof(right
) / sizeof(right
[0]), right
};
606 MacOSError::check(AuthorizationCopyRights(authorization
, &rights
, NULL
,
607 kAuthorizationFlagExtendRights
| kAuthorizationFlagInteractionAllowed
, NULL
));
609 MacOSError::check(AuthorizationFree(authorization
, kAuthorizationFlagDefaults
));
614 // Perform common argument normalizations for update operations
616 static void normalizeTarget(CFRef
<CFTypeRef
> &target
, CFDictionary
&context
, bool signUnsigned
)
618 // turn CFURLs into (designated) SecRequirements
619 if (target
&& CFGetTypeID(target
) == CFURLGetTypeID()) {
620 CFRef
<SecStaticCodeRef
> code
;
621 MacOSError::check(SecStaticCodeCreateWithPath(target
.as
<CFURLRef
>(), kSecCSDefaultFlags
, &code
.aref()));
622 CFRef
<SecRequirementRef
> requirement
;
623 switch (OSStatus rc
= SecCodeCopyDesignatedRequirement(code
, kSecCSDefaultFlags
, (SecRequirementRef
*)&target
.aref())) {
626 case errSecCSUnsigned
:
628 // Ad-hoc sign the code in the system database. This requires root privileges.
629 CFRef
<SecCodeSignerRef
> signer
;
630 CFTemp
<CFDictionaryRef
> arguments("{%O=#N, %O=#N}", kSecCodeSignerDetached
, kSecCodeSignerIdentity
);
631 MacOSError::check(SecCodeSignerCreate(arguments
, kSecCSDefaultFlags
, &signer
.aref()));
632 MacOSError::check(SecCodeSignerAddSignature(signer
, code
, kSecCSDefaultFlags
));
633 MacOSError::check(SecCodeCopyDesignatedRequirement(code
, kSecCSDefaultFlags
, (SecRequirementRef
*)&target
.aref()));
638 MacOSError::check(rc
);
640 if (context
.get(kSecAssessmentUpdateKeyRemarks
) == NULL
) {
641 // no explicit remarks; add one with the path
642 CFRef
<CFURLRef
> path
;
643 MacOSError::check(SecCodeCopyPath(code
, kSecCSDefaultFlags
, &path
.aref()));
644 CFMutableDictionaryRef dict
= makeCFMutableDictionary(context
.get());
645 CFDictionaryAddValue(dict
, kSecAssessmentUpdateKeyRemarks
, CFTempString(cfString(path
)));
652 } // end namespace CodeSigning
653 } // end namespace Security