]> git.saurik.com Git - apple/security.git/blob - securityd/src/agentquery.h
Security-57336.1.9.tar.gz
[apple/security.git] / securityd / src / agentquery.h
1 /*
2 * Copyright (c) 2000-2005,2007-2010,2012-2013 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24
25 //
26 // passphrases - canonical code to obtain passphrases
27 //
28 #ifndef _H_AGENTQUERY
29 #define _H_AGENTQUERY
30
31 #include <security_cdsa_utilities/AuthorizationData.h>
32 #include <security_utilities/ccaudit.h> // some queries do their own authentication
33 #include <Security/AuthorizationPlugin.h>
34 #include "kcdatabase.h"
35 #include "AuthorizationEngine.h"
36 #include "authhost.h"
37 #include "server.h"
38 #include "session.h"
39 #include <xpc/xpc.h>
40
41 using Authorization::AuthItemSet;
42 using Authorization::AuthValueVector;
43 using Security::OSXCode;
44
45 const uint64_t kMaximumAuthorizationTries = 10000;
46
47 //
48 // base for classes talking to com.apple.security.agent and com.apple.security.authhost
49 //
50 class SecurityAgentXPCConnection : public SecurityAgentConnectionInterface
51 {
52 public:
53 SecurityAgentXPCConnection(const AuthHostType type = securityAgent, Session &session = Server::session());
54 virtual ~SecurityAgentXPCConnection();
55 virtual void activate(bool ignoreUid);
56 virtual void reconnect();
57 virtual void disconnect() { };
58 virtual void terminate();
59
60 AuthHostType hostType() { return mAuthHostType; }
61
62 protected:
63 AuthHostType mAuthHostType;
64 RefPointer<AuthHostInstance> mHostInstance;
65 Session &mSession;
66 xpc_connection_t mXPCConnection;
67 const RefPointer<Connection> mConnection;
68 audit_token_t *mAuditToken;
69 uid_t mNobodyUID;
70
71 bool inDarkWake();
72
73 };
74
75
76 //
77 // The main com.apple.security.agent/com.apple.security.authhost interaction base class
78 //
79 class SecurityAgentXPCQuery : public SecurityAgentXPCConnection
80 {
81 public:
82 static void killAllXPCClients();
83
84 typedef SecurityAgent::Reason Reason;
85
86 SecurityAgentXPCQuery(const AuthHostType type = securityAgent, Session &session = Server::session());
87
88
89 void inferHints(Process &thisProcess);
90 void addHint(const char *name, const void *value = NULL, UInt32 valueLen = 0, UInt32 flags = 0);
91
92 virtual ~SecurityAgentXPCQuery();
93
94 virtual void disconnect();
95 virtual void terminate();
96 void create(const char *pluginId, const char *mechanismId);
97 OSStatus invoke();
98 void setTerminateOnSleep(bool terminateOnSleep) {mTerminateOnSleep = terminateOnSleep;}
99 bool getTerminateOnSleep() {return mTerminateOnSleep;}
100 void setInput(const AuthItemSet& inHints, const AuthItemSet& inContext) { mInHints = inHints; mInContext = inContext; }
101 void checkResult();
102
103 void readChoice();
104
105 bool allow;
106 bool remember;
107
108 protected:
109 AuthItemSet mClientHints;
110 AuthItemSet mImmutableHints;
111 AuthItemSet mInHints;
112 AuthItemSet mInContext;
113 AuthItemSet mOutHints;
114 AuthItemSet mOutContext;
115 bool mAgentConnected;
116 uint64_t mLastResult;
117 bool mTerminateOnSleep;
118 };
119
120 //
121 // Specialized for "rogue app" alert queries
122 //
123 class QueryKeychainUse : public SecurityAgentXPCQuery {
124 public:
125 QueryKeychainUse(bool needPass, const Database *db);
126 Reason queryUser (const char* database, const char *description, AclAuthorization action);
127
128 private:
129 const KeychainDatabase *mPassphraseCheck; // NULL to not check passphrase
130 };
131
132
133 //
134 // Specialized for code signature adjustment queries
135 //
136 class QueryCodeCheck : public SecurityAgentXPCQuery {
137 public:
138 bool operator () (const char *aclPath);
139 };
140
141
142 //
143 // A query for an existing passphrase
144 //
145 class QueryOld : public SecurityAgentXPCQuery {
146 static const int maxTries = kMaximumAuthorizationTries;
147 public:
148 QueryOld(Database &db) : database(db) {setTerminateOnSleep(true);}
149
150 Database &database;
151
152 Reason operator () ();
153
154 protected:
155 Reason query();
156 virtual Reason accept(CssmManagedData &) = 0;
157 };
158
159
160 class QueryUnlock : public QueryOld {
161 public:
162 QueryUnlock(KeychainDatabase &db) : QueryOld(db) { }
163 Reason retrievePassword(CssmOwnedData &passphrase);
164
165 protected:
166 Reason accept(CssmManagedData &passphrase);
167 };
168
169
170 class QueryKeybagPassphrase : public SecurityAgentXPCQuery {
171 public:
172 QueryKeybagPassphrase(Session &session, int32_t retries = kMaximumAuthorizationTries);
173
174 Reason query();
175 Reason accept(CssmManagedData &passphrase);
176 protected:
177 Session &mSession;
178 service_context_t mContext;
179 int32_t mRetries;
180 };
181
182 class QueryKeybagNewPassphrase : public QueryKeybagPassphrase {
183 public:
184 QueryKeybagNewPassphrase(Session &session);
185
186 Reason query(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase);
187 };
188
189 //
190 // Repurpose QueryUnlock for PIN prompting
191 // Not very clean - but this stuff is an outdated hack as it is...
192 //
193 class QueryPIN : public QueryOld {
194 public:
195 QueryPIN(Database &db);
196
197 const CssmData &pin() const { return mPin; }
198
199 protected:
200 Reason accept(CssmManagedData &pin);
201
202 private:
203 CssmAutoData mPin; // PIN obtained
204 };
205
206
207 //
208 // A query for a new passphrase
209 //
210 class QueryNewPassphrase : public SecurityAgentXPCQuery {
211 static const int maxTries = kMaximumAuthorizationTries;
212 public:
213 QueryNewPassphrase(Database &db, Reason reason) :
214 database(db), initialReason(reason),
215 mPassphrase(Allocator::standard(Allocator::sensitive)),
216 mOldPassphrase(Allocator::standard(Allocator::sensitive)),
217 mPassphraseValid(false) { }
218
219 Database &database;
220
221 Reason operator () (CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase);
222
223 protected:
224 Reason query();
225 virtual Reason accept(CssmManagedData &passphrase, CssmData *oldPassphrase);
226
227 private:
228 Reason initialReason;
229 CssmAutoData mPassphrase;
230 CssmAutoData mOldPassphrase;
231 bool mPassphraseValid;
232 };
233
234
235 //
236 // Generic passphrase query (not associated with a database)
237 //
238 class QueryGenericPassphrase : public SecurityAgentXPCQuery {
239 public:
240 QueryGenericPassphrase() { }
241 Reason operator () (const CssmData *prompt, bool verify,
242 string &passphrase);
243
244 protected:
245 Reason query(const CssmData *prompt, bool verify, string &passphrase);
246 };
247
248
249 //
250 // Generic secret query (not associated with a database)
251 //
252 class QueryDBBlobSecret : public SecurityAgentXPCQuery {
253 static const int maxTries = kMaximumAuthorizationTries;
254 public:
255 QueryDBBlobSecret() { }
256 Reason operator () (DbHandle *dbHandleArray, uint8 dbHandleArrayCount, DbHandle *dbHandleAuthenticated);
257
258 protected:
259 Reason query(DbHandle *dbHandleArray, uint8 dbHandleArrayCount, DbHandle *dbHandleAuthenticated);
260 Reason accept(CssmManagedData &passphrase, DbHandle *dbHandlesToAuthenticate, uint8 dbHandleCount, DbHandle *dbHandleAuthenticated);
261 };
262
263 // hybrid of confirm-access and generic authentication queries, for
264 // securityd's use; keep the Frankenstein references to yourself
265 // (the alternative is to ask the user to unlock the system keychain,
266 // and you don't want that, do you?)
267 class QueryKeychainAuth : public SecurityAgentXPCQuery {
268 static const int maxTries = kMaximumAuthorizationTries;
269 public:
270 QueryKeychainAuth() { }
271 // "prompt" can be NULL
272 Reason operator () (const char *database, const char *description, AclAuthorization action, const char *prompt);
273 Reason accept(string &username, string &passphrase);
274 };
275
276 #endif //_H_AGENTQUERY