2 * Copyright (c) 2011-2013 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
26 #include "SecAssessment.h"
27 #include <security_utilities/globalizer.h>
28 #include <security_utilities/hashing.h>
29 #include <security_utilities/sqlite++.h>
30 #include <CoreFoundation/CoreFoundation.h>
33 namespace CodeSigning
{
36 namespace SQLite
= SQLite3
;
39 static const char defaultDatabase
[] = "/var/db/SystemPolicy";
40 static const char visibleSecurityFlagFile
[] = "/var/db/.sp_visible"; /* old duchess/emir style configration */
41 static const char prefsFile
[] = "/var/db/SystemPolicy-prefs.plist";
42 static const char lastRejectFile
[] = "/var/db/.LastGKReject";
43 static const char lastApprovedFile
[] = "/var/db/.LastGKApp";
44 static const char rearmTimerFile
[] = "/var/db/.GKRearmTimer";
46 static const char gkeAuthFile_old
[] = "/var/db/gke.auth";
47 static const char gkeSigsFile_old
[] = "/var/db/gke.sigs";
48 static const char gkeAuthFile
[] = "/var/db/gke.bundle/Contents/Resources/gke.auth";
49 static const char gkeSigsFile
[] = "/var/db/gke.bundle/Contents/Resources/gke.sigs";
51 static const unsigned int gkeCheckInterval
= 60; // seconds
55 // We use Julian dates in the database, because SQLite understands them well and they convert easily to/from CFAbsoluteTime
57 static const double never
= 5000000; // canonical "never" julian date (an arbitrary point in the year 8977)
58 static const double julianBase
= 2451910.5; // julian date of CFAbsoluteTime epoch
60 static inline double dateToJulian(CFDateRef time
)
61 { return CFDateGetAbsoluteTime(time
) / 86400.0 + julianBase
; }
63 static inline CFDateRef
julianToDate(double julian
)
64 { return CFDateCreate(NULL
, (julian
- julianBase
) * 86400); }
67 typedef SHA1::SDigest ObjectHash
;
70 typedef uint AuthorityType
;
72 kAuthorityInvalid
= 0, // not a valid authority type
73 kAuthorityExecute
= 1, // authorizes launch and execution
74 kAuthorityInstall
= 2, // authorizes installation
75 kAuthorityOpenDoc
= 3, // authorizes opening of documents
80 // Defined flags for authority flags column
83 kAuthorityFlagVirtual
= 0x0001, // virtual rule (anchoring object records)
84 kAuthorityFlagDefault
= 0x0002, // rule is part of the original default set
85 kAuthorityFlagInhibitCache
= 0x0004, // never cache outcome of this rule
86 kAuthorityFlagWhitelist
= 0x1000, // whitelist override
87 kAuthorityFlagWhitelistV2
= 0x2000, // apply "deep" signature to this record
88 kAuthorityFlagWhitelistSHA256
= 0x4000, // use SHA256 signature
93 // Mapping/translation to/from API space
95 AuthorityType
typeFor(CFDictionaryRef context
, AuthorityType type
= kAuthorityInvalid
);
96 CFStringRef
typeNameFor(AuthorityType type
)
101 // An open policy database.
102 // Usually read-only, but can be opened for write by privileged callers.
103 // This is a translucent wrapper around SQLite::Database; the caller
104 // is expected to work with statement rows.
106 class PolicyDatabase
: public SQLite::Database
{
108 PolicyDatabase(const char *path
= NULL
, int flags
= SQLITE_OPEN_READONLY
);
109 virtual ~PolicyDatabase();
112 bool checkCache(CFURLRef path
, AuthorityType type
, SecAssessmentFlags flags
, CFMutableDictionaryRef result
);
115 void purgeAuthority();
117 void purgeObjects(double priority
);//
119 void upgradeDatabase();
120 std::string
featureLevel(const char *feature
);
121 bool hasFeature(const char *feature
) { return !featureLevel(feature
).empty(); }
122 void addFeature(const char *feature
, const char *value
, const char *remarks
);
123 void simpleFeature(const char *feature
, const char *sql
);
124 void simpleFeature(const char *feature
, void (^perform
)());
125 void simpleFeatureNoTransaction(const char *feature
, void (^perform
)());
127 void installExplicitSet(const char *auth
, const char *sigs
);
130 time_t mLastExplicitCheck
;
135 // Check the system-wide overriding flag file
137 bool overrideAssessment(SecAssessmentFlags flags
= 0);
138 void setAssessment(bool masterSwitch
);
142 // Reset or query the automatic rearm timer
144 void resetRearmTimer(const char *event
);
145 bool queryRearmTimer(CFTimeInterval
&delta
);
147 } // end namespace CodeSigning
148 } // end namespace Security