]>
Commit | Line | Data |
---|---|---|
29654253 A |
1 | /* |
2 | * Copyright (c) 2002 Apple Computer, Inc. All Rights Reserved. | |
3 | * | |
4 | * The contents of this file constitute Original Code as defined in and are | |
5 | * subject to the Apple Public Source License Version 1.2 (the 'License'). | |
6 | * You may not use this file except in compliance with the License. Please obtain | |
7 | * a copy of the License at http://www.apple.com/publicsource and read it before | |
8 | * using this file. | |
9 | * | |
10 | * This Original Code and all software distributed under the License are | |
11 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS | |
12 | * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT | |
13 | * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR | |
14 | * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the | |
15 | * specific language governing rights and limitations under the License. | |
16 | */ | |
17 | ||
18 | // | |
19 | // TrustedApplication.cpp | |
20 | // | |
21 | #include <Security/TrustedApplication.h> | |
22 | #include <Security/ACL.h> | |
23 | #include <Security/osxsigning.h> | |
24 | #include <Security/osxsigner.h> | |
25 | #include <Security/trackingallocator.h> | |
df0e469f | 26 | #include <sys/syslimits.h> |
29654253 A |
27 | #include <memory> |
28 | ||
29 | using namespace KeychainCore; | |
30 | using namespace CodeSigning; | |
31 | ||
32 | ||
33 | // | |
34 | // Create a TrustedApplication from a code-signing ACL subject. | |
35 | // Throws ACL::ParseError if the subject is unexpected. | |
36 | // | |
37 | TrustedApplication::TrustedApplication(const TypedList &subject) | |
38 | : mSignature(CssmAllocator::standard()), | |
39 | mData(CssmAllocator::standard()) | |
40 | { | |
41 | if (subject.type() != CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE) | |
42 | throw ACL::ParseError(); | |
43 | if (subject[1] != CSSM_ACL_CODE_SIGNATURE_OSX) | |
44 | throw ACL::ParseError(); | |
45 | mSignature = subject[2].data(); | |
46 | mData = subject[3].data(); | |
47 | } | |
48 | ||
49 | ||
50 | TrustedApplication::TrustedApplication(const CssmData &signature, const CssmData &data) : | |
51 | mSignature(CssmAllocator::standard(), signature), | |
52 | mData(CssmAllocator::standard(), data) | |
53 | { | |
54 | } | |
55 | ||
56 | TrustedApplication::TrustedApplication(const char *path) | |
57 | : mSignature(CssmAllocator::standard()), | |
58 | mData(CssmAllocator::standard()) | |
59 | { | |
60 | OSXSigner signer; | |
61 | RefPointer<OSXCode> object(OSXCode::at(path)); | |
62 | auto_ptr<OSXSigner::OSXSignature> signature(signer.sign(*object)); | |
63 | mSignature = *signature; | |
df0e469f A |
64 | string basePath = object->canonicalPath(); |
65 | mData = CssmData(const_cast<char *>(basePath.c_str()), basePath.length() + 1); | |
29654253 A |
66 | } |
67 | ||
68 | TrustedApplication::TrustedApplication() | |
69 | : mSignature(CssmAllocator::standard()), | |
70 | mData(CssmAllocator::standard()) | |
71 | { | |
72 | OSXSigner signer; | |
73 | RefPointer<OSXCode> object(OSXCode::main()); | |
74 | auto_ptr<OSXSigner::OSXSignature> signature(signer.sign(*object)); | |
75 | mSignature = *signature; | |
76 | string path = object->canonicalPath(); | |
77 | mData.copy(path.c_str(), path.length() + 1); // including trailing null | |
78 | } | |
79 | ||
df0e469f | 80 | TrustedApplication::~TrustedApplication() throw() |
29654253 A |
81 | { |
82 | } | |
83 | ||
84 | const CssmData & | |
85 | TrustedApplication::signature() const | |
86 | { | |
87 | return mSignature; | |
88 | } | |
89 | ||
df0e469f A |
90 | const char * |
91 | TrustedApplication::path() const | |
92 | { | |
93 | if (mData) | |
94 | return mData.get().interpretedAs<const char>(); | |
95 | else | |
96 | return NULL; | |
97 | } | |
98 | ||
29654253 A |
99 | bool |
100 | TrustedApplication::sameSignature(const char *path) | |
101 | { | |
102 | // return true if object at given path has same signature | |
103 | CssmAutoData otherSignature(CssmAllocator::standard()); | |
104 | calcSignature(path, otherSignature); | |
105 | return (mSignature.get() == otherSignature); | |
106 | } | |
107 | ||
108 | void | |
109 | TrustedApplication::calcSignature(const char *path, CssmOwnedData &signature) | |
110 | { | |
111 | // generate a signature for the given object | |
112 | RefPointer<CodeSigning::OSXCode> objToVerify(CodeSigning::OSXCode::at(path)); | |
113 | CodeSigning::OSXSigner signer; | |
114 | auto_ptr<CodeSigning::OSXSigner::OSXSignature> osxSignature(signer.sign(*objToVerify)); | |
115 | signature.copy(osxSignature->data(), osxSignature->length()); | |
116 | } | |
117 | ||
118 | ||
119 | // | |
120 | // Produce a TypedList representing a code-signing ACL subject | |
121 | // for this application. | |
122 | // Memory is allocated from the allocator given, and belongs to | |
123 | // the caller. | |
124 | // | |
125 | TypedList TrustedApplication::makeSubject(CssmAllocator &allocator) | |
126 | { | |
127 | return TypedList(allocator, | |
128 | CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE, | |
129 | new(allocator) ListElement(CSSM_ACL_CODE_SIGNATURE_OSX), | |
df0e469f A |
130 | new(allocator) ListElement(allocator, mSignature.get()), |
131 | new(allocator) ListElement(allocator, mData.get())); | |
132 | } | |
133 | ||
134 | ||
135 | // | |
136 | // On a completely different note... | |
137 | // Read a simple text file from disk and cache the lines in a set. | |
138 | // This is used during re-prebinding to cut down on the number of | |
139 | // equivalency records being generated. | |
140 | // This feature is otherwise completely unconnected to anything else here. | |
141 | // | |
142 | PathDatabase::PathDatabase(const char *path) | |
143 | { | |
144 | if (FILE *f = fopen(path, "r")) { | |
145 | mQualifyAll = false; | |
146 | char path[PATH_MAX+1]; | |
147 | while (fgets(path, sizeof(path), f)) { | |
148 | path[strlen(path)-1] = '\0'; // strip NL | |
149 | mPaths.insert(path); | |
150 | } | |
151 | fclose(f); | |
152 | secdebug("equivdb", "read %ld paths from %s", mPaths.size(), path); | |
153 | } else { | |
154 | mQualifyAll = true; | |
155 | secdebug("equivdb", "cannot open %s, will qualify all application paths", path); | |
156 | } | |
157 | } | |
158 | ||
159 | ||
160 | bool PathDatabase::lookup(const string &path) | |
161 | { | |
162 | string::size_type lastSlash = path.rfind('/'); | |
163 | string::size_type bundleCore = path.find("/Contents/MacOS/"); | |
164 | if (lastSlash != string::npos && bundleCore != string::npos) | |
165 | if (bundleCore + 15 == lastSlash) | |
166 | path = path.substr(0, bundleCore); | |
167 | return mPaths.find(path) != mPaths.end(); | |
29654253 | 168 | } |