]> git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_keychain/lib/TrustSettingsUtils.cpp
Security-59754.41.1.tar.gz
[apple/security.git] / OSX / libsecurity_keychain / lib / TrustSettingsUtils.cpp
1 /*
2 * Copyright (c) 2005,2011-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 /*
25 * TrustSettingsUtils.cpp - Utility routines for TrustSettings module
26 *
27 */
28
29 #include "TrustSettingsUtils.h"
30 #include <Security/cssmtype.h>
31 #include <Security/cssmapple.h>
32 #include <Security/oidscert.h>
33 #include <sys/param.h>
34 #include <sys/stat.h>
35 #include <sys/fcntl.h>
36
37 /*
38 * Preferred location for user root store is ~/Library/Keychain/UserRootCerts.keychain.
39 * If we're creating a root store and there is a file there we iterate thru
40 * ~/Library/Keychains/UserRootCerts_N.keychain, 0 <= N <= 10.
41 */
42 #define kSecUserRootStoreBase "~/Library/Keychains/UserRootCerts"
43 #define kSecUserRootStoreExtension ".keychain"
44
45 namespace Security {
46
47 namespace KeychainCore {
48
49 /*
50 * Read entire file.
51 */
52 int tsReadFile(
53 const char *fileName,
54 Allocator &alloc,
55 CSSM_DATA &fileData) // mallocd via alloc and RETURNED
56 {
57 int rtn;
58 int fd;
59 struct stat sb;
60 unsigned size;
61
62 fileData.Data = NULL;
63 fileData.Length = 0;
64 fd = open(fileName, O_RDONLY, 0);
65 if(fd < 0) {
66 return errno;
67 }
68 rtn = fstat(fd, &sb);
69 if(rtn) {
70 goto errOut;
71 }
72 size = (unsigned)sb.st_size;
73 fileData.Data = (uint8 *)alloc.malloc(size);
74 if(fileData.Data == NULL) {
75 rtn = ENOMEM;
76 goto errOut;
77 }
78 rtn = (int)lseek(fd, 0, SEEK_SET);
79 if(rtn < 0) {
80 goto errOut;
81 }
82 rtn = (int)read(fd, fileData.Data, (size_t)size);
83 if(rtn != (int)size) {
84 rtn = EIO;
85 }
86 else {
87 rtn = 0;
88 fileData.Length = size;
89 }
90 errOut:
91 close(fd);
92 return rtn;
93 }
94
95 } /* end namespace KeychainCore */
96
97 } /* end namespace Security */