]>
git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_codesigning/lib/csutilities.h
2 * Copyright (c) 2006-2013 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // csutilities - miscellaneous utilities for the code signing implementation
27 // This is a collection of odds and ends that wouldn't fit anywhere else.
28 // The common theme is that the contents are otherwise naturally homeless.
30 #ifndef _H_CSUTILITIES
31 #define _H_CSUTILITIES
33 #include <Security/Security.h>
34 #include <security_utilities/dispatch.h>
35 #include <security_utilities/hashing.h>
36 #include <security_utilities/unix++.h>
37 #include <security_cdsa_utilities/cssmdata.h>
43 namespace CodeSigning
{
47 // Test for the canonical Apple CA certificate
49 bool isAppleCA(SecCertificateRef cert
);
53 // Calculate canonical hashes of certificate.
54 // This is simply defined as (always) the SHA1 hash of the DER.
56 void hashOfCertificate(const void *certData
, size_t certLength
, SHA1::Digest digest
);
57 void hashOfCertificate(SecCertificateRef cert
, SHA1::Digest digest
);
58 bool verifyHash(SecCertificateRef cert
, const Hashing::Byte
*digest
);
62 // Calculate hashes of (a section of) a file.
63 // Starts at the current file position.
64 // Extends to end of file, or (if limit > 0) at most limit bytes.
65 // Returns number of bytes digested.
67 template <class _Hash
>
68 size_t hashFileData(UnixPlusPlus::FileDesc fd
, _Hash
*hasher
, size_t limit
= 0)
70 unsigned char buffer
[4096];
73 size_t size
= sizeof(buffer
);
74 if (limit
&& limit
< size
)
76 size_t got
= fd
.read(buffer
, size
);
80 hasher
->update(buffer
, got
);
81 if (limit
&& (limit
-= got
) == 0)
87 template <class _Hash
>
88 size_t hashFileData(const char *path
, _Hash
*hasher
)
90 UnixPlusPlus::AutoFileDesc
fd(path
);
91 return hashFileData(fd
, hasher
);
96 // Check to see if a certificate contains a particular field, by OID. This works for extensions,
97 // even ones not recognized by the local CL. It does not return any value, only presence.
99 bool certificateHasField(SecCertificateRef cert
, const CSSM_OID
&oid
);
100 bool certificateHasPolicy(SecCertificateRef cert
, const CSSM_OID
&policyOid
);
104 // Encapsulation of the copyfile(3) API.
105 // This is slated to go into utilities once stable.
110 ~Copyfile() { copyfile_state_free(mState
); }
112 operator copyfile_state_t () const { return mState
; }
114 void set(uint32_t flag
, const void *value
);
115 void get(uint32_t flag
, void *value
);
117 void operator () (const char *src
, const char *dst
, copyfile_flags_t flags
);
123 copyfile_state_t mState
;
128 // MessageTracer support
132 MessageTrace(const char *domain
, const char *signature
);
133 ~MessageTrace() { ::asl_free(mAsl
); }
134 void add(const char *key
, const char *format
, ...);
135 void send(const char *format
, ...);
143 // A reliable uid set/reset bracket
147 UidGuard() : mPrevious(-1) { }
148 UidGuard(uid_t uid
) : mPrevious(-1) { seteuid(uid
); }
152 UnixError::check(::seteuid(mPrevious
));
155 bool seteuid(uid_t uid
)
157 if (uid
== geteuid())
158 return true; // no change, don't bother the kernel
160 mPrevious
= ::geteuid();
161 return ::seteuid(uid
) == 0;
164 bool active() const { return mPrevious
!= uid_t(-1); }
165 operator bool () const { return active(); }
166 uid_t
saved() const { assert(active()); return mPrevious
; }
173 // This class provides resource limited parallelization,
174 // used for work on nested bundles (e.g. signing or validating them).
176 // We only spins off async workers if they are available right now,
177 // otherwise we continue synchronously in the current thread.
178 // This is important because we must progress at all times, otherwise
179 // deeply nested bundles will deadlock on waiting for resource validation,
180 // with no available workers to actually do so.
181 // Their nested resources, however, may again spin off async workers if
187 LimitedAsync(bool async
);
188 LimitedAsync(LimitedAsync
& limitedAsync
);
189 virtual ~LimitedAsync();
191 bool perform(Dispatch::Group
&groupRef
, void (^block
)());
194 Dispatch::Semaphore
*mResourceSemaphore
;
199 } // end namespace CodeSigning
200 } // end namespace Security
202 #endif // !_H_CSUTILITIES