]>
git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_keychain/lib/SecBridge.h
2 * Copyright (c) 2000-2004,2011,2013-2016 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
24 #ifndef _SECURITY_SECBRIDGE_H_
25 #define _SECURITY_SECBRIDGE_H_
27 #include <security_keychain/Globals.h>
28 #include <security_keychain/SecCFTypes.h>
29 #include <Security/SecBasePriv.h>
30 #include <Security/SecKeychainPriv.h>
31 #include <security_keychain/KCUtilities.h>
32 #include <security_cdsa_utilities/cssmbridge.h>
34 using namespace KeychainCore
;
37 // API boilerplate macros. These provide a frame for C++ code that is impermeable to exceptions.
40 // ... your C++ code here ...
41 // END_API // returns CSSM_RETURN on exception
42 // END_API0 // returns nothing (void) on exception
43 // END_API1(bad) // return (bad) on exception
44 // END_API2(name) // like END_API, with API name as debug scope for printing function result
45 // END_API3(name, bad) // like END_API1, with API name as debug scope for printing function result
47 #define BEGIN_SECAPI \
48 OSStatus __secapiresult = errSecSuccess; \
51 catch (const MacOSError &err) { __secapiresult=err.osStatus(); } \
52 catch (const CommonError &err) { __secapiresult=SecKeychainErrFromOSStatus(err.osStatus()); } \
53 catch (const std::bad_alloc &) { __secapiresult=errSecAllocate; } \
54 catch (...) { __secapiresult=errSecInternalComponent; } \
55 return __secapiresult;
56 #define END_SECAPI1(BAD_RETURN_VAL) \
60 __secapiresult=BAD_RETURN_VAL; \
62 return __secapiresult;
63 #define END_SECAPI1(BAD_RETURN_VAL) }\
64 catch (...) { __secapiresult=BAD_RETURN_VAL; } \
65 return __secapiresult;
66 #define END_SECAPI0 }\
67 catch (...) { return; }
72 // Note: this macro assumes an input parameter named "itemRef"
74 #define BEGIN_SECKCITEMAPI \
75 OSStatus __secapiresult=errSecSuccess; \
76 SecKeychainItemRef __itemImplRef=NULL; \
77 bool __is_certificate=(itemRef && (CFGetTypeID(itemRef) == SecCertificateGetTypeID())); \
78 if (__is_certificate) { \
79 if (SecCertificateIsItemImplInstance((SecCertificateRef)itemRef)) { \
80 __itemImplRef=(SecKeychainItemRef)CFRetain(itemRef); \
82 __itemImplRef=(SecKeychainItemRef)SecCertificateCopyKeychainItem((SecCertificateRef)itemRef); \
83 if (!__itemImplRef) { \
84 __itemImplRef=(SecKeychainItemRef)SecCertificateCreateItemImplInstance((SecCertificateRef)itemRef); \
85 (void)SecCertificateSetKeychainItem((SecCertificateRef)itemRef,__itemImplRef); \
89 __itemImplRef=(SecKeychainItemRef)((itemRef) ? CFRetain(itemRef) : NULL); \
96 #define END_SECKCITEMAPI } \
97 catch (const MacOSError &err) { __secapiresult=err.osStatus(); } \
98 catch (const CommonError &err) { __secapiresult=SecKeychainErrFromOSStatus(err.osStatus()); } \
99 catch (const std::bad_alloc &) { __secapiresult=errSecAllocate; } \
100 catch (...) { __secapiresult=errSecInternalComponent; } \
101 if (__itemImplRef) { CFRelease(__itemImplRef); } \
102 return __secapiresult;
107 // Note: this macro assumes an input parameter named "certificate"
109 #define BEGIN_SECCERTAPI \
110 OSStatus __secapiresult=errSecSuccess; \
111 SecCertificateRef __itemImplRef=NULL; \
112 if (SecCertificateIsItemImplInstance(certificate)) { __itemImplRef=(SecCertificateRef)CFRetain(certificate); } \
113 if (!__itemImplRef && certificate) { __itemImplRef=(SecCertificateRef)SecCertificateCopyKeychainItem(certificate); } \
114 if (!__itemImplRef && certificate) { __itemImplRef=SecCertificateCreateItemImplInstance(certificate); \
115 (void)SecCertificateSetKeychainItem(certificate,__itemImplRef); } \
121 #define END_SECCERTAPI } \
122 catch (const MacOSError &err) { __secapiresult=err.osStatus(); } \
123 catch (const CommonError &err) { __secapiresult=SecKeychainErrFromOSStatus(err.osStatus()); } \
124 catch (const std::bad_alloc &) { __secapiresult=errSecAllocate; } \
125 catch (...) { __secapiresult=errSecInternalComponent; } \
126 if (__itemImplRef) { CFRelease(__itemImplRef); } \
127 return __secapiresult;
133 #define BEGIN_SECKEYAPI(resultType, resultInit) \
134 resultType result = resultInit; try {
136 extern "C" bool SecError(OSStatus status
, CFErrorRef
*error
, CFStringRef format
, ...);
138 #define END_SECKEYAPI }\
139 catch (const MacOSError &err) { SecError(err.osStatus(), error, CFSTR("%s"), err.what()); result = NULL; } \
140 catch (const CommonError &err) { \
141 if (err.osStatus() != CSSMERR_CSP_INVALID_DIGEST_ALGORITHM) { \
142 OSStatus status = SecKeychainErrFromOSStatus(err.osStatus()); if (status == errSecInputLengthError) status = errSecParam; \
143 SecError(status, error, CFSTR("%s"), err.what()); result = NULL; } \
145 catch (const std::bad_alloc &) { SecError(errSecAllocate, error, CFSTR("allocation failed")); result = NULL; } \
146 catch (...) { SecError(errSecInternalComponent, error, CFSTR("internal error")); result = NULL; } \
149 #endif /* !_SECURITY_SECBRIDGE_H_ */