]> git.saurik.com Git - apple/security.git/blobdiff - Security/libsecurityd/lib/sstransit.cpp
Security-57336.1.9.tar.gz
[apple/security.git] / Security / libsecurityd / lib / sstransit.cpp
diff --git a/Security/libsecurityd/lib/sstransit.cpp b/Security/libsecurityd/lib/sstransit.cpp
deleted file mode 100644 (file)
index d84cc2e..0000000
+++ /dev/null
@@ -1,172 +0,0 @@
-/*
- * Copyright (c) 2000-2004,2006,2011,2013-2014 Apple Inc. All Rights Reserved.
- * 
- * @APPLE_LICENSE_HEADER_START@
- * 
- * This file contains Original Code and/or Modifications of Original Code
- * as defined in and that are subject to the Apple Public Source License
- * Version 2.0 (the 'License'). You may not use this file except in
- * compliance with the License. Please obtain a copy of the License at
- * http://www.opensource.apple.com/apsl/ and read it before using this
- * file.
- * 
- * The Original Code and all software distributed under the License are
- * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
- * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
- * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
- * Please see the License for the specific language governing rights and
- * limitations under the License.
- * 
- * @APPLE_LICENSE_HEADER_END@
- */
-
-
-//
-// sstransit - Securityd client side transition support.
-//
-#include "sstransit.h"
-#include <security_cdsa_client/cspclient.h>
-#include <security_utilities/mach++.h>
-
-namespace Security {
-namespace SecurityServer {
-
-using MachPlusPlus::check;
-using MachPlusPlus::VMGuard;
-
-//
-// DataOutput helper.
-// This happens "at the end" of a glue method, via the DataOutput destructor.
-//
-DataOutput::~DataOutput()
-{
-       // @@@ Why are we setting up a VMGuard if mData is NULL?
-       VMGuard _(mData, mLength);
-       if (mData)                              // was assigned to; IPC returned OK
-               if (mTarget) {          // output CssmData exists
-                       if (mTarget->data()) {  // caller provided buffer
-                               if (mTarget->length() < mLength)
-                                       CssmError::throwMe(CSSMERR_CSP_OUTPUT_LENGTH_ERROR);
-                               mTarget->length(mLength);       // no allocation; shorten buffer
-                       } else {        // allocate buffer
-                               *mTarget = CssmData(allocator.malloc(mLength), mLength);
-                       }
-                       memcpy(mTarget->data(), mData, mLength);
-               }
-}
-
-
-//
-// Copy an AccessCredentials for shipment.
-// In addition, scan the samples for "special" database locking samples
-// and translate certain items for safe shipment. Note that this overwrites
-// part of the CssmList value (CSPHandle -> SS/KeyHandle), but we do it on
-// the COPY, so that's okay.
-//
-DatabaseAccessCredentials::DatabaseAccessCredentials(const AccessCredentials *creds, Allocator &alloc)
-       : Copier<AccessCredentials>(creds, alloc)
-{
-       if (creds) {
-               for (uint32 n = 0; n < value()->samples().length(); n++) {
-                       TypedList sample = value()->samples()[n];
-                       sample.checkProper();
-                       switch (sample.type()) {
-                       case CSSM_SAMPLE_TYPE_KEYCHAIN_LOCK:
-                               sample.snip();                  // skip sample type (snip() advances to next)
-                               sample.checkProper();
-                               if (sample.type() == CSSM_SAMPLE_TYPE_SYMMETRIC_KEY || 
-                                       sample.type() == CSSM_SAMPLE_TYPE_ASYMMETRIC_KEY) {
-                                       secdebug("SSclient", "key sample encountered");
-                                       // proper form is sample[1] = DATA:CSPHandle, sample[2] = DATA:CSSM_KEY,
-                                       // sample[3] = auxiliary data (not changed)
-                                       if (sample.length() != 4
-                                               || sample[1].type() != CSSM_LIST_ELEMENT_DATUM
-                                               || sample[2].type() != CSSM_LIST_ELEMENT_DATUM
-                                               || sample[3].type() != CSSM_LIST_ELEMENT_DATUM)
-                                               CssmError::throwMe(CSSM_ERRCODE_INVALID_SAMPLE_VALUE);
-                                       mapKeySample(
-                                                                sample[1].data(),
-                                                                *sample[2].data().interpretedAs<CssmKey>(CSSM_ERRCODE_INVALID_SAMPLE_VALUE));
-                               }
-                               break;
-                       case CSSM_SAMPLE_TYPE_KEYCHAIN_CHANGE_LOCK:
-                               sample.snip();  // skip sample type
-                               sample.checkProper();
-                               if (sample.type() == CSSM_SAMPLE_TYPE_SYMMETRIC_KEY || 
-                                       sample.type() == CSSM_SAMPLE_TYPE_ASYMMETRIC_KEY) {
-                                       secdebug("SSclient", "key sample encountered");
-                                       // proper form is sample[1] = DATA:CSPHandle, sample[2] = DATA:CSSM_KEY
-                                       if (sample.length() != 3
-                                               || sample[1].type() != CSSM_LIST_ELEMENT_DATUM
-                                               || sample[2].type() != CSSM_LIST_ELEMENT_DATUM)
-                                                       CssmError::throwMe(CSSM_ERRCODE_INVALID_SAMPLE_VALUE);
-                                       mapKeySample(
-                                               sample[1].data(),
-                                               *sample[2].data().interpretedAs<CssmKey>(CSSM_ERRCODE_INVALID_SAMPLE_VALUE));
-                               }
-                               break;
-                       default:
-                               break;
-                       }
-               }
-       }
-}
-
-void DatabaseAccessCredentials::mapKeySample(CssmData &cspHandleData, CssmKey &key)
-{
-       // We use a CSP passthrough to get the securityd key handle for a (reference) key.
-       // We try the passthrough on everyone, since there's multiple CSP/DL modules
-       // that play games with securityd, and we want to give everyone a chance to play.
-
-       // @@@ can't use CssmClient (it makes its own attachments)
-       CSSM_CC_HANDLE ctx;
-    CSSM_CSP_HANDLE &cspHandle = *cspHandleData.interpretedAs<CSSM_CSP_HANDLE>(CSSM_ERRCODE_INVALID_SAMPLE_VALUE);
-       CssmError::check(CSSM_CSP_CreatePassThroughContext(cspHandle, &key, &ctx));
-       KeyHandle ssKey;
-       CSSM_RETURN passthroughError =
-               CSSM_CSP_PassThrough(ctx, CSSM_APPLESCPDL_CSP_GET_KEYHANDLE, NULL, (void **)&ssKey);
-       CSSM_DeleteContext(ctx);        // ignore error
-       switch (passthroughError) {
-       case CSSM_OK:                           // got the passthrough; rewrite the sample
-               assert(sizeof(CSSM_CSP_HANDLE) >= sizeof(KeyHandle));   // future insurance
-               cspHandle = ssKey;
-        cspHandleData.length(sizeof(KeyHandle));
-               secdebug("SSclient", "key sample mapped to key 0x%x", ssKey);
-               return;
-       case CSSMERR_CSP_INVALID_PASSTHROUGH_ID:
-               return;         // CSP didn't understand the callback; leave the sample alone
-       default:
-               CssmError::throwMe(passthroughError);   // error
-       }
-}
-
-
-//
-// Inbound/outbound transit for the elaborate data-access attribute vectors
-//
-DataRetrieval::DataRetrieval(CssmDbRecordAttributeData *&attributes, Allocator &alloc)
-       : Copier<CssmDbRecordAttributeData>(attributes),
-         mAllocator(alloc), mAttributes(attributes), mAddr(NULL), mBase(NULL), mLength(0)
-{
-}
-
-DataRetrieval::~DataRetrieval()
-{
-       if (mAddr) {
-               relocate(mAddr, mBase);
-               assert(mAttributes->size() == mAddr->size());
-               
-               // global (per-record) fields
-               mAttributes->recordType(mAddr->recordType());
-               mAttributes->semanticInformation(mAddr->semanticInformation());
-               
-               // transfer data values (but not infos, which we keep in the original vector)
-               for (uint32 n = 0; n < mAttributes->size(); n++)
-                       mAttributes->at(n).copyValues(mAddr->at(n), mAllocator);
-       }
-}
-
-
-} // namespace SecurityServer
-} // end namespace Security