]> git.saurik.com Git - apple/security.git/blobdiff - OSX/libsecurity_codesigning/lib/SecTask.c
Security-57336.1.9.tar.gz
[apple/security.git] / OSX / libsecurity_codesigning / lib / SecTask.c
diff --git a/OSX/libsecurity_codesigning/lib/SecTask.c b/OSX/libsecurity_codesigning/lib/SecTask.c
new file mode 100644 (file)
index 0000000..c2b358e
--- /dev/null
@@ -0,0 +1,316 @@
+/*
+ * Copyright (c) 2009-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+#include <CoreFoundation/CoreFoundation.h>
+#include <CoreFoundation/CFRuntime.h>
+#include <IOKit/IOKitLib.h>
+#include <IOKit/IOCFUnserialize.h>
+#include <System/sys/codesign.h>
+#include <bsm/libbsm.h>
+#include <inttypes.h>
+#include <pthread.h>
+#include <syslog.h>
+#include <sys/sysctl.h>
+
+#include "SecCode.h"
+#include "SecCodePriv.h"
+#include "SecRequirement.h"
+
+#include "SecTask.h"
+#include "SecTaskPriv.h"
+
+
+struct __SecTask {
+       CFRuntimeBase base;
+
+       pid_t pid;
+
+       audit_token_t *token;
+       audit_token_t token_storage;
+
+       /* Track whether we've loaded entitlements independently since after the
+        * load, entitlements may legitimately be NULL */
+       Boolean entitlementsLoaded;
+       CFDictionaryRef entitlements;
+};
+
+enum {
+       kSecCodeMagicEntitlement = 0xfade7171,          /* entitlement blob */
+};
+
+
+CFTypeID _kSecTaskTypeID = _kCFRuntimeNotATypeID;
+
+static void SecTaskFinalize(CFTypeRef cfTask)
+{
+       SecTaskRef task = (SecTaskRef) cfTask;
+
+       if (task->entitlements != NULL) {
+               CFRelease(task->entitlements);
+               task->entitlements = NULL;
+       }
+}
+
+
+// Define PRIdPID (proper printf format string for pid_t)
+#define PRIdPID PRId32
+
+static CFStringRef SecTaskCopyDebugDescription(CFTypeRef cfTask)
+{
+    SecTaskRef task = (SecTaskRef) cfTask;
+    const char *task_name;
+    int mib[] = {CTL_KERN, KERN_PROC, KERN_PROC_PID, task->pid};
+    struct kinfo_proc kp;
+    size_t len = sizeof(kp);
+    if (sysctl(mib, 4, &kp, &len, NULL, 0) == -1 || len == 0)
+        task_name = strerror(errno);
+    else
+        task_name = kp.kp_proc.p_comm;
+
+    return CFStringCreateWithFormat(CFGetAllocator(task), NULL, CFSTR("%s[%" PRIdPID "]"), task_name, task->pid);
+}
+
+static void SecTaskRegisterClass(void)
+{
+       static const CFRuntimeClass SecTaskClass = {
+               .version = 0,
+               .className = "SecTask",
+               .init = NULL,
+               .copy = NULL,
+               .finalize = SecTaskFinalize,
+               .equal = NULL,
+               .hash = NULL,
+               .copyFormattingDesc = NULL,
+               .copyDebugDesc = SecTaskCopyDebugDescription,
+       };
+
+       _kSecTaskTypeID = _CFRuntimeRegisterClass(&SecTaskClass);
+}
+
+CFTypeID SecTaskGetTypeID(void)
+{
+       static pthread_once_t secTaskRegisterClassOnce = PTHREAD_ONCE_INIT;
+
+       /* Register the class with the CF runtime the first time through */
+       pthread_once(&secTaskRegisterClassOnce, SecTaskRegisterClass);
+
+       return _kSecTaskTypeID;
+}
+
+static SecTaskRef SecTaskCreateWithPID(CFAllocatorRef allocator, pid_t pid)
+{
+       CFIndex extra = sizeof(struct __SecTask) - sizeof(CFRuntimeBase);
+       SecTaskRef task = (SecTaskRef) _CFRuntimeCreateInstance(allocator, SecTaskGetTypeID(), extra, NULL);
+       if (task != NULL) {
+               task->pid = pid;
+               task->entitlementsLoaded = false;
+               task->entitlements = NULL;
+       }
+
+       return task;
+}
+
+SecTaskRef SecTaskCreateWithAuditToken(CFAllocatorRef allocator, audit_token_t token)
+{
+       SecTaskRef task;
+
+       task = SecTaskCreateWithPID(allocator, audit_token_to_pid(token));
+       if (task != NULL) {
+#if 0
+               task->token_storage = token;
+               task->token = &task->token_storage;
+#endif
+       }
+
+       return task;
+}
+
+SecTaskRef SecTaskCreateFromSelf(CFAllocatorRef allocator)
+{
+       return SecTaskCreateWithPID(allocator, getpid());
+}
+
+/*
+ * Determine if the given task meets a specified requirement.
+ */
+OSStatus
+SecTaskValidateForRequirement(SecTaskRef task, CFStringRef requirement)
+{
+    OSStatus status;
+    SecCodeRef code = NULL;
+    SecRequirementRef req = NULL;
+    pid_t pid = task->pid;
+    if (pid <= 0) {
+        return errSecParam;
+    }
+    status = SecCodeCreateWithPID(pid, kSecCSDefaultFlags, &code);
+    //syslog(LOG_NOTICE, "SecTaskValidateForRequirement: SecCodeCreateWithPID=%d", status);
+    if (!status) {
+        status = SecRequirementCreateWithString(requirement,
+                                                kSecCSDefaultFlags, &req);
+        //syslog(LOG_NOTICE, "SecTaskValidateForRequirement: SecRequirementCreateWithString=%d", status);
+    }
+    if (!status) {
+        status = SecCodeCheckValidity(code, kSecCSDefaultFlags, req);
+        //syslog(LOG_NOTICE, "SecTaskValidateForRequirement: SecCodeCheckValidity=%d", status);
+    }
+    if (req)
+        CFRelease(req);
+    if (code)
+        CFRelease(code);
+
+    return status;
+}
+
+static CFRange myMakeRange(CFIndex loc, CFIndex len) {
+       CFRange r = {.location = loc, .length = len };
+       return r;
+}
+struct csheader {
+       uint32_t magic;
+       uint32_t length;
+};
+
+static int
+csops_task(SecTaskRef task, int ops, void *blob, size_t size)
+{
+#if 0
+       if (task->token)
+               return csops_audittoken(task->pid, ops, blob, size, task->token);
+       else
+#endif
+               return csops(task->pid, ops, blob, size);
+}
+
+static int SecTaskLoadEntitlements(SecTaskRef task, CFErrorRef *error)
+{
+       CFMutableDataRef data = NULL;
+       struct csheader header;
+       uint32_t bufferlen;
+       int ret;
+
+       ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, &header, sizeof(header));
+       if (ret == 0) {
+               // we only gave a header's worth of buffer. If this succeeded, we have no entitlements
+               task->entitlementsLoaded = true;
+               return 0;
+       }
+       if (errno != ERANGE) {
+               // ERANGE means "your buffer is too small, it now tells you how much you need
+               // Everything else is a real error, so yell
+               syslog(LOG_NOTICE, "SecTaskLoadEntitlements failed error=%d", errno);   // to ease diagnostics
+               // EINVAL is what the kernel says for unsigned code, so we'll have to let that pass
+               if (errno == EINVAL) {
+                       task->entitlementsLoaded = true;
+                       return 0;
+               }
+               ret = errno;
+               goto out;
+       }
+       // kernel told us the needed buffer size in header.length; proceed
+
+       bufferlen = ntohl(header.length);
+       /* check for insane values */
+       if (bufferlen > 1024 * 1024 || bufferlen < 8) {
+               ret = EINVAL;
+               goto out;
+       }
+       data = CFDataCreateMutable(NULL, bufferlen);
+       if (data == NULL) {
+               ret = ENOMEM;
+               goto out;
+       }
+       CFDataSetLength(data, bufferlen);
+       ret = csops_task(task, CS_OPS_ENTITLEMENTS_BLOB, CFDataGetMutableBytePtr(data), bufferlen);
+       if (ret) {
+               ret = errno;
+               goto out;
+       }
+       CFDataDeleteBytes(data, myMakeRange(0, 8));
+       task->entitlements = CFPropertyListCreateWithData(NULL, data, 0, NULL, error);
+       task->entitlementsLoaded = true;
+ out:
+       if (data)
+               CFRelease(data);
+       if (ret && error)
+               *error = CFErrorCreate(NULL, kCFErrorDomainPOSIX, ret, NULL);
+
+       return ret;
+}
+
+CFTypeRef SecTaskCopyValueForEntitlement(SecTaskRef task, CFStringRef entitlement, CFErrorRef *error)
+{
+       /* Load entitlements if necessary */
+       if (task->entitlementsLoaded == false) {
+               SecTaskLoadEntitlements(task, error);
+       }
+
+       CFTypeRef value = NULL;
+       if (task->entitlements != NULL) {
+               value = CFDictionaryGetValue(task->entitlements, entitlement);
+
+               /* Return something the caller must release */
+               if (value != NULL) {
+                       CFRetain(value);
+               }
+       }
+
+       return value;
+}
+
+CFDictionaryRef SecTaskCopyValuesForEntitlements(SecTaskRef task, CFArrayRef entitlements, CFErrorRef *error)
+{
+       /* Load entitlements if necessary */
+       if (task->entitlementsLoaded == false) {
+               SecTaskLoadEntitlements(task, error);
+       }
+
+       /* Iterate over the passed in entitlements, populating the dictionary
+        * If entitlements were loaded but none were present, return an empty
+        * dictionary */
+       CFMutableDictionaryRef values = NULL;
+       if (task->entitlementsLoaded == true) {
+
+               CFIndex i, count = CFArrayGetCount(entitlements);
+               values = CFDictionaryCreateMutable(CFGetAllocator(task), count, &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
+               if (task->entitlements != NULL) {
+                       for (i = 0; i < count; i++) {
+                               CFStringRef entitlement = CFArrayGetValueAtIndex(entitlements, i);
+                               CFTypeRef value = CFDictionaryGetValue(task->entitlements, entitlement);
+                               if (value != NULL) {
+                                       CFDictionarySetValue(values, entitlement, value);
+                               }
+                       }
+               }
+       }
+
+       return values;
+}
+
+Boolean SecTaskEntitlementsValidated(SecTaskRef task) {
+    // TODO: Cache the result
+    uint32_t csflags = 0;
+    const uint32_t mask = CS_VALID | CS_KILL | CS_ENTITLEMENTS_VALIDATED;
+    int rc = csops_task(task, CS_OPS_STATUS, &csflags, sizeof(csflags));
+    return rc != -1 && ((csflags & mask) == mask);
+}