]> git.saurik.com Git - apple/security.git/blob - OSX/sec/Security/SecItemInternal.h
Security-57740.51.3.tar.gz
[apple/security.git] / OSX / sec / Security / SecItemInternal.h
1 /*
2 * Copyright (c) 2009,2012-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 /*!
25 @header SecItemInternal
26 SecItemInternal defines SPI functions dealing with persistent refs
27 */
28
29 #ifndef _SECURITY_SECITEMINTERNAL_H_
30 #define _SECURITY_SECITEMINTERNAL_H_
31
32 #include <CoreFoundation/CFData.h>
33 #include <sqlite3.h>
34 #include <ipc/securityd_client.h>
35 #include <ctkclient.h>
36
37 __BEGIN_DECLS
38
39 #define kSecServerKeychainChangedNotification "com.apple.security.keychainchanged"
40 #define kSecServerCertificateTrustNotification "com.apple.security.certificatetrust"
41
42 /* label when certificate data is joined with key data */
43 static const CFStringRef kSecAttrIdentityCertificateData = CFSTR("certdata");
44 static const CFStringRef kSecAttrIdentityCertificateTokenID = CFSTR("certtkid");
45
46 CF_RETURNS_RETAINED CFDataRef _SecItemMakePersistentRef(CFTypeRef iclass, sqlite_int64 rowid);
47
48 bool _SecItemParsePersistentRef(CFDataRef persistent_ref, CFStringRef *return_class,
49 sqlite_int64 *return_rowid);
50
51 OSStatus _SecRestoreKeychain(const char *path);
52
53 OSStatus SecOSStatusWith(bool (^perform)(CFErrorRef *error));
54
55 bool cftype_client_to_bool_cftype_error_request(enum SecXPCOperation op, CFTypeRef attributes, __unused SecurityClient *client, CFTypeRef *result, CFErrorRef *error);
56
57 /* Structure representing copy-on-write dictionary. Typical use is:
58 int bar(CFDictionaryRef input);
59 int foo(CFDictionaryRef input) {
60 SecCFDictionaryCOW in = { input };
61 if (condition) {
62 CFDictionarySetValue(SecCFDictionaryCOWGetMutable(&in), key, value);
63 }
64 bar(in.dictionary);
65 CFReleaseSafe(in.mutable_dictionary);
66 }
67 */
68 typedef struct {
69 // Real dictionary, not owned by this structure, should be accessed directly for read-only access.
70 CFDictionaryRef dictionary;
71
72 // On-demand created (and possibly modified), owned writable copy of dictionary.
73 CFMutableDictionaryRef mutable_dictionary;
74 } SecCFDictionaryCOW;
75
76 CFMutableDictionaryRef SecCFDictionaryCOWGetMutable(SecCFDictionaryCOW *cow_dictionary);
77
78 typedef enum {
79 kSecItemAuthResultOK,
80 kSecItemAuthResultError,
81 kSecItemAuthResultNeedAuth
82 } SecItemAuthResult;
83
84 bool SecItemAuthDo(SecCFDictionaryCOW *auth_params, CFErrorRef *error, SecItemAuthResult (^perform)(CFDictionaryRef auth_params, CFArrayRef *ac_pairs, CFErrorRef *error));
85
86 void SecItemAuthCopyParams(SecCFDictionaryCOW *auth_params, SecCFDictionaryCOW *query);
87
88 TKTokenRef SecTokenCreate(CFStringRef token_id, CFDictionaryRef auth_params, CFErrorRef *error);
89
90 CFDataRef _SecTokenItemCopyValueData(CFDataRef db_value, CFErrorRef *error);
91
92 CFDataRef SecItemAttributesCopyPreparedAuthContext(CFTypeRef la_context, CFErrorRef *error);
93
94 __END_DECLS
95
96 #endif /* !_SECURITY_SECITEMINTERNAL_H_ */