2 * Copyright (c) 2011 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
23 #include "xpcengine.h"
24 #include <xpc/connection.h>
26 #include <CoreFoundation/CoreFoundation.h>
27 #include <security_utilities/cfutilities.h>
28 #include <Security/CodeSigning.h>
32 namespace CodeSigning
{
34 static const char serviceName
[] = "com.apple.security.syspolicy";
37 static dispatch_once_t dispatchInit
; // one-time init marker
38 static xpc_connection_t service
; // connection to spd
39 static dispatch_queue_t queue
; // dispatch queue for service
43 dispatch_once(&dispatchInit
, ^void(void) {
44 const char *name
= serviceName
;
45 if (const char *env
= getenv("SYSPOLICYNAME"))
47 queue
= dispatch_queue_create("spd-client", 0);
48 service
= xpc_connection_create_mach_service(name
, queue
, XPC_CONNECTION_MACH_SERVICE_PRIVILEGED
);
49 xpc_connection_set_event_handler(service
, ^(xpc_object_t ev
) {
51 xpc_connection_resume(service
);
57 // Your standard XPC client-side machinery
63 Message(const char *function
)
66 obj
= xpc_dictionary_create(NULL
, NULL
, 0);
67 xpc_dictionary_set_string(obj
, "function", function
);
74 operator xpc_object_t () { return obj
; }
78 xpc_object_t reply
= xpc_connection_send_message_with_reply_sync(service
, obj
);
81 xpc_type_t type
= xpc_get_type(reply
);
82 if (type
== XPC_TYPE_DICTIONARY
) {
84 if (int64_t error
= xpc_dictionary_get_int64(obj
, "error"))
85 MacOSError::throwMe(error
);
86 } else if (type
== XPC_TYPE_ERROR
) {
87 const char *s
= xpc_copy_description(reply
);
88 printf("Error returned: %s\n", s
);
90 MacOSError::throwMe(errSecCSInternalError
);
92 const char *s
= xpc_copy_description(reply
);
93 printf("Unexpected type of return object: %s\n", s
);
101 static void copyCFDictionary(const void *key
, const void *value
, void *ctx
)
103 CFMutableDictionaryRef target
= CFMutableDictionaryRef(ctx
);
104 if (CFEqual(key
, kSecAssessmentContextKeyCertificates
)) // obsolete
106 if (CFGetTypeID(value
) == CFURLGetTypeID()) {
107 CFRef
<CFStringRef
> path
= CFURLCopyFileSystemPath(CFURLRef(value
), kCFURLPOSIXPathStyle
);
108 CFDictionaryAddValue(target
, key
, path
);
110 CFDictionaryAddValue(target
, key
, value
);
114 void xpcEngineAssess(CFURLRef path
, uint flags
, CFDictionaryRef context
, CFMutableDictionaryRef result
)
116 Message
msg("assess");
117 xpc_dictionary_set_string(msg
, "path", cfString(path
).c_str());
118 xpc_dictionary_set_int64(msg
, "flags", flags
);
119 CFRef
<CFMutableDictionaryRef
> ctx
= makeCFMutableDictionary();
121 CFDictionaryApplyFunction(context
, copyCFDictionary
, ctx
);
122 CFRef
<CFDataRef
> contextData
= makeCFData(CFDictionaryRef(ctx
));
123 xpc_dictionary_set_data(msg
, "context", CFDataGetBytePtr(contextData
), CFDataGetLength(contextData
));
127 if (int64_t error
= xpc_dictionary_get_int64(msg
, "error"))
128 MacOSError::throwMe(error
);
131 const void *resultData
= xpc_dictionary_get_data(msg
, "result", &resultLength
);
132 CFRef
<CFDictionaryRef
> resultDict
= makeCFDictionaryFrom(resultData
, resultLength
);
133 CFDictionaryApplyFunction(resultDict
, copyCFDictionary
, result
);
134 CFDictionaryAddValue(result
, CFSTR("assessment:remote"), kCFBooleanTrue
);
138 bool xpcEngineUpdate(CFTypeRef target
, uint flags
, CFDictionaryRef context
)
140 Message
msg("update");
141 // target can be NULL, a CFURLRef, a SecRequirementRef, or a CFNumberRef
143 if (CFGetTypeID(target
) == CFNumberGetTypeID())
144 xpc_dictionary_set_uint64(msg
, "rule", cfNumber
<int64_t>(CFNumberRef(target
)));
145 else if (CFGetTypeID(target
) == CFURLGetTypeID())
146 xpc_dictionary_set_string(msg
, "url", cfString(CFURLRef(target
)).c_str());
147 else if (CFGetTypeID(target
) == SecRequirementGetTypeID()) {
148 CFRef
<CFDataRef
> data
;
149 MacOSError::check(SecRequirementCopyData(SecRequirementRef(target
), kSecCSDefaultFlags
, &data
.aref()));
150 xpc_dictionary_set_data(msg
, "requirement", CFDataGetBytePtr(data
), CFDataGetLength(data
));
152 MacOSError::throwMe(errSecCSInvalidObjectRef
);
154 xpc_dictionary_set_int64(msg
, "flags", flags
);
155 CFRef
<CFMutableDictionaryRef
> ctx
= makeCFMutableDictionary();
157 CFDictionaryApplyFunction(context
, copyCFDictionary
, ctx
);
158 AuthorizationRef localAuthorization
= NULL
;
159 if (CFDictionaryGetValue(ctx
, kSecAssessmentUpdateKeyAuthorization
) == NULL
) { // no caller-provided authorization
160 MacOSError::check(AuthorizationCreate(NULL
, NULL
, kAuthorizationFlagDefaults
, &localAuthorization
));
161 AuthorizationExternalForm extForm
;
162 MacOSError::check(AuthorizationMakeExternalForm(localAuthorization
, &extForm
));
163 CFDictionaryAddValue(ctx
, kSecAssessmentUpdateKeyAuthorization
, CFTempData(&extForm
, sizeof(extForm
)));
165 CFRef
<CFDataRef
> contextData
= makeCFData(CFDictionaryRef(ctx
));
166 xpc_dictionary_set_data(msg
, "context", CFDataGetBytePtr(contextData
), CFDataGetLength(contextData
));
170 if (localAuthorization
)
171 AuthorizationFree(localAuthorization
, kAuthorizationFlagDefaults
);
173 if (int64_t error
= xpc_dictionary_get_int64(msg
, "error"))
174 MacOSError::throwMe(error
);
180 bool xpcEngineControl(const char *control
)
182 Message
msg("control");
183 xpc_dictionary_set_string(msg
, "control", control
);
189 } // end namespace CodeSigning
190 } // end namespace Security