]> git.saurik.com Git - apple/security.git/blob - OSX/sec/securityd/SecItemServer.h
Security-57337.60.2.tar.gz
[apple/security.git] / OSX / sec / securityd / SecItemServer.h
1 /*
2 * Copyright (c) 2007-2009,2012-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 /*!
25 @header SecItemServer
26 The functions provided in SecItemServer.h provide an interface to
27 the backend for SecItem APIs in the server.
28 */
29
30 #ifndef _SECURITYD_SECITEMSERVER_H_
31 #define _SECURITYD_SECITEMSERVER_H_
32
33 #include <CoreFoundation/CoreFoundation.h>
34 #include <Security/SecureObjectSync/SOSCircle.h>
35 #include <securityd/SecDbQuery.h>
36 #include <utilities/SecDb.h>
37 #include <TargetConditionals.h>
38 #include "securityd_client.h"
39
40
41 __BEGIN_DECLS
42
43 bool _SecItemAdd(CFDictionaryRef attributes, SecurityClient *client, CFTypeRef *result, CFErrorRef *error);
44 bool _SecItemCopyMatching(CFDictionaryRef query, SecurityClient *client, CFTypeRef *result, CFErrorRef *error);
45 bool _SecItemUpdate(CFDictionaryRef query, CFDictionaryRef attributesToUpdate, SecurityClient *client, CFErrorRef *error);
46 bool _SecItemDelete(CFDictionaryRef query, SecurityClient *client, CFErrorRef *error);
47 bool _SecItemDeleteAll(CFErrorRef *error);
48 bool _SecServerRestoreKeychain(CFErrorRef *error);
49 bool _SecServerMigrateKeychain(int32_t handle_in, CFDataRef data_in, int32_t *handle_out, CFDataRef *data_out, CFErrorRef *error);
50 CFDataRef _SecServerKeychainCreateBackup(SecurityClient *client, CFDataRef keybag, CFDataRef passcode, CFErrorRef *error);
51 bool _SecServerKeychainRestore(CFDataRef backup, SecurityClient *client, CFDataRef keybag, CFDataRef passcode, CFErrorRef *error);
52
53 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
54 bool _SecServerKeychainSyncUpdateIDSMessage(CFDictionaryRef updates, CFErrorRef *error);
55 CF_RETURNS_RETAINED CFDictionaryRef _SecServerBackupSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error);
56
57 int SecServerKeychainTakeOverBackupFD(CFStringRef backupName, CFErrorRef *error);
58
59 bool _SecServerRestoreSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error);
60
61 #if TARGET_OS_IOS
62 bool _SecServerTransmogrifyToSystemKeychain(SecurityClient *client, CFErrorRef *error);
63 bool _SecServerTransmogrifyToSyncBubble(CFArrayRef services, uid_t uid, SecurityClient *client, CFErrorRef *error);
64 bool _SecServerDeleteMUSERViews(SecurityClient *client, uid_t uid, CFErrorRef *error);
65 #endif
66
67 bool _SecAddSharedWebCredential(CFDictionaryRef attributes, SecurityClient *client, const audit_token_t *clientAuditToken, CFStringRef appID, CFArrayRef domains, CFTypeRef *result, CFErrorRef *error);
68 bool _SecCopySharedWebCredential(CFDictionaryRef query, SecurityClient *client, const audit_token_t *clientAuditToken, CFStringRef appID, CFArrayRef domains, CFTypeRef *result, CFErrorRef *error);
69
70 // Hack to log objects from inside SOS code
71 void SecItemServerAppendItemDescription(CFMutableStringRef desc, CFDictionaryRef object);
72
73 SecDbRef SecKeychainDbCreate(CFStringRef path);
74
75
76 /* For whitebox testing only */
77 void SecKeychainDbReset(dispatch_block_t inbetween);
78
79
80 SOSDataSourceFactoryRef SecItemDataSourceFactoryGetDefault(void);
81
82 /* FIXME: there is a specific type for keybag handle (keybag_handle_t)
83 but it's not defined for simulator so we just use an int32_t */
84 void SecItemServerSetKeychainKeybag(int32_t keybag);
85 void SecItemServerResetKeychainKeybag(void);
86
87 void SecItemServerSetKeychainChangedNotification(const char *notification_name);
88
89 CFStringRef __SecKeychainCopyPath(void);
90
91 bool _SecServerRollKeys(bool force, SecurityClient *client, CFErrorRef *error);
92 bool _SecServerRollKeysGlue(bool force, CFErrorRef *error);
93
94 struct _SecServerKeyStats {
95 unsigned long items;
96 CFIndex maxDataSize;
97 CFIndex averageSize;
98 };
99
100 bool _SecServerGetKeyStats(const SecDbClass *qclass, struct _SecServerKeyStats *stats);
101
102
103
104
105 // Should all be blocks called from SecItemDb
106 bool match_item(SecDbConnectionRef dbt, Query *q, CFArrayRef accessGroups, CFDictionaryRef item);
107 bool itemInAccessGroup(CFDictionaryRef item, CFArrayRef accessGroups);
108 void SecKeychainChanged(bool syncWithPeers);
109
110 extern void (*SecTaskDiagnoseEntitlements)(CFArrayRef accessGroups);
111
112 __END_DECLS
113
114 #endif /* _SECURITYD_SECITEMSERVER_H_ */