]>
git.saurik.com Git - apple/security.git/blob - OSX/macos_tapi_hacks.h
c5b257935da43f4436f7a8067c8bfb65ef150850
2 * Copyright (c) 2017 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
23 #ifndef macos_tapi_hack_h
24 #define macos_tapi_hack_h
26 // This file is to work around TAPI's insistence that every exported symbol is in a header file.
27 // The Security project just simply rejects such ideas, so this is the pressure valve:
29 // One-offs in header files that shouldn't be exported in the real-live macOS Security framework
30 // can be added here, and TAPI will accept them.
32 // Please don't add anything here.
34 #ifndef SECURITY_PROJECT_TAPI_HACKS
35 #error This header is not for inclusion; it's a nasty hack to get the macOS Security framework to build with TAPI.
41 CFDataRef SecDistinguishedNameCopyNormalizedContent(CFDataRef distinguished_name);
42 CFDataRef _SecItemCreatePersistentRef(CFTypeRef iclass, sqlite_int64 rowid, CFDictionaryRef attributes);
43 CFDictionaryRef SecTokenItemValueCopy(CFDataRef db_value, CFErrorRef *error);
44 CFArrayRef SecTrustCopyProperties_ios(SecTrustRef trust);
45 CFArrayRef SecItemCopyParentCertificates_ios(CFDataRef normalizedIssuer, CFArrayRef accessGroups, CFErrorRef *error);
46 bool SecItemCertificateExists(CFDataRef normalizedIssuer, CFDataRef serialNumber, CFArrayRef accessGroups, CFErrorRef *error);
47 bool _SecItemParsePersistentRef(CFDataRef persistent_ref, CFStringRef *return_class,
48 sqlite_int64 *return_rowid, CFDictionaryRef *return_token_attrs);
50 // iOS-only SecKey functions
51 size_t SecKeyGetSize(SecKeyRef key, int whichSize);
52 CFDataRef SecKeyCopyPublicKeyHash(SecKeyRef key);
55 extern const CFStringRef kSecUseSystemKeychain;
59 typedef struct SecurityClient {
62 extern struct securityd *gSecurityd;
63 extern struct trustd *gTrustd;
64 extern SecurityClient * SecSecurityClientGet(void);
65 bool securityd_send_sync_and_do(enum SecXPCOperation op, CFErrorRef *error,
66 bool (^add_to_message)(xpc_object_t message, CFErrorRef* error),
67 bool (^handle_response)(xpc_object_t response, CFErrorRef* error));
68 XPC_RETURNS_RETAINED xpc_object_t securityd_message_with_reply_sync(xpc_object_t message, CFErrorRef *error);
69 XPC_RETURNS_RETAINED xpc_object_t securityd_create_message(enum SecXPCOperation op, CFErrorRef *error);
70 bool securityd_message_no_error(xpc_object_t message, CFErrorRef *error);
72 @interface SecuritydXPCClient : NSObject
75 void SecAccessGroupsSetCurrent(CFArrayRef accessGroups);
76 CFArrayRef SecAccessGroupsGetCurrent(void);
79 int checkpw_internal( const struct passwd* pw, const char* password );
82 CFDataRef SecDigestCreate(CFAllocatorRef allocator,
83 const SecAsn1Oid *algorithm, const SecAsn1Item *params,
84 const UInt8 *data, CFIndex length);
85 CFDataRef SecSHA256DigestCreateFromData(CFAllocatorRef allocator, CFDataRef data);
86 CFStringRef SecFrameworkCopyLocalizedString(CFStringRef key,
87 CFStringRef tableName);
89 #endif /* macos_tapi_hack_h */