]>
git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_codesigning/lib/csutilities.h
bd4408cdb5dfb676adc4209db3458287766ccd6c
   2  * Copyright (c) 2006-2013 Apple Inc. All Rights Reserved. 
   4  * @APPLE_LICENSE_HEADER_START@ 
   6  * This file contains Original Code and/or Modifications of Original Code 
   7  * as defined in and that are subject to the Apple Public Source License 
   8  * Version 2.0 (the 'License'). You may not use this file except in 
   9  * compliance with the License. Please obtain a copy of the License at 
  10  * http://www.opensource.apple.com/apsl/ and read it before using this 
  13  * The Original Code and all software distributed under the License are 
  14  * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER 
  15  * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, 
  16  * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, 
  17  * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. 
  18  * Please see the License for the specific language governing rights and 
  19  * limitations under the License. 
  21  * @APPLE_LICENSE_HEADER_END@ 
  25 // csutilities - miscellaneous utilities for the code signing implementation 
  27 // This is a collection of odds and ends that wouldn't fit anywhere else. 
  28 // The common theme is that the contents are otherwise naturally homeless. 
  30 #ifndef _H_CSUTILITIES 
  31 #define _H_CSUTILITIES 
  33 #include <Security/Security.h> 
  34 #include <security_utilities/dispatch.h> 
  35 #include <security_utilities/hashing.h> 
  36 #include <security_utilities/unix++.h> 
  38 #include <security_cdsa_utilities/cssmdata.h> 
  45 namespace CodeSigning 
{ 
  49 // Test for the canonical Apple CA certificate 
  51 bool isAppleCA(SecCertificateRef cert
); 
  55 // Calculate canonical hashes of certificate. 
  56 // This is simply defined as (always) the SHA1 hash of the DER. 
  58 void hashOfCertificate(const void *certData
, size_t certLength
, SHA1::Digest digest
); 
  59 void hashOfCertificate(SecCertificateRef cert
, SHA1::Digest digest
); 
  60 bool verifyHash(SecCertificateRef cert
, const Hashing::Byte 
*digest
); 
  63 inline size_t scanFileData(UnixPlusPlus::FileDesc fd
, size_t limit
, void (^handle
)(const void *buffer
, size_t size
)) 
  65         UnixPlusPlus::FileDesc::UnixStat st
; 
  67         unsigned char *buffer 
= NULL
; 
  71                 size_t bufSize 
= MAX(64 * 1024, st
.st_blksize
); 
  72                 buffer 
= (unsigned char *)valloc(bufSize
); 
  77                         size_t size 
= bufSize
; 
  78                         if (limit 
&& limit 
< size
) 
  80                         size_t got 
= fd
.read(buffer
, size
); 
  85                         if (limit 
&& (limit 
-= got
) == 0) 
  90                 /* don't leak this on error */ 
 102 // Calculate hashes of (a section of) a file. 
 103 // Starts at the current file position. 
 104 // Extends to end of file, or (if limit > 0) at most limit bytes. 
 105 // Returns number of bytes digested. 
 107 template <class _Hash
> 
 108 size_t hashFileData(UnixPlusPlus::FileDesc fd
, _Hash 
*hasher
, size_t limit 
= 0) 
 110         return scanFileData(fd
, limit
, ^(const void *buffer
, size_t size
) { 
 111                 hasher
->update(buffer
, size
); 
 115 template <class _Hash
> 
 116 size_t hashFileData(const char *path
, _Hash 
*hasher
) 
 118         UnixPlusPlus::AutoFileDesc 
fd(path
); 
 119         return hashFileData(fd
, hasher
); 
 124 // Check to see if a certificate contains a particular field, by OID. This works for extensions, 
 125 // even ones not recognized by the local CL. It does not return any value, only presence. 
 129 bool certificateHasField(SecCertificateRef cert
, const CSSM_OID 
&oid
); 
 130 bool certificateHasPolicy(SecCertificateRef cert
, const CSSM_OID 
&policyOid
); 
 131 CFDateRef 
certificateCopyFieldDate(SecCertificateRef cert
, const CSSM_OID 
&policyOid
); 
 135 // Encapsulation of the copyfile(3) API. 
 136 // This is slated to go into utilities once stable. 
 141         ~Copyfile()     { copyfile_state_free(mState
); } 
 143         operator copyfile_state_t () const { return mState
; } 
 145         void set(uint32_t flag
, const void *value
); 
 146         void get(uint32_t flag
, void *value
); 
 148         void operator () (const char *src
, const char *dst
, copyfile_flags_t flags
); 
 154         copyfile_state_t mState
; 
 159 // MessageTracer support 
 163         MessageTrace(const char *domain
, const char *signature
); 
 164         ~MessageTrace() { ::asl_free(mAsl
); } 
 165         void add(const char *key
, const char *format
, ...) __attribute__((format(printf
,3,4))); 
 166         void send(const char *format
, ...) __attribute__((format(printf
,2,3))); 
 174 // A reliable uid set/reset bracket 
 178         UidGuard() : mPrevious(-1) { } 
 179         UidGuard(uid_t uid
) : mPrevious(-1) { (void)seteuid(uid
); } 
 183                         UnixError::check(::seteuid(mPrevious
)); 
 186         bool seteuid(uid_t uid
) 
 188                 if (uid 
== geteuid()) 
 189                         return true;    // no change, don't bother the kernel 
 191                         mPrevious 
= ::geteuid(); 
 192                 return ::seteuid(uid
) == 0; 
 195         bool active() const { return mPrevious 
!= uid_t(-1); } 
 196         operator bool () const { return active(); } 
 197         uid_t 
saved() const { assert(active()); return mPrevious
; } 
 204 // This class provides resource limited parallelization, 
 205 // used for work on nested bundles (e.g. signing or validating them). 
 207 // We only spins off async workers if they are available right now, 
 208 // otherwise we continue synchronously in the current thread. 
 209 // This is important because we must progress at all times, otherwise 
 210 // deeply nested bundles will deadlock on waiting for resource validation, 
 211 // with no available workers to actually do so. 
 212 // Their nested resources, however, may again spin off async workers if 
 218         LimitedAsync(bool async
); 
 219         LimitedAsync(LimitedAsync
& limitedAsync
); 
 220         virtual ~LimitedAsync(); 
 222         bool perform(Dispatch::Group 
&groupRef
, void (^block
)()); 
 225         Dispatch::Semaphore 
*mResourceSemaphore
; 
 230 } // end namespace CodeSigning 
 231 } // end namespace Security 
 233 #endif // !_H_CSUTILITIES