]> git.saurik.com Git - apple/security.git/blobdiff - Security/libsecurity_codesigning/lib/SecCodeHostLib.c
Security-57031.1.35.tar.gz
[apple/security.git] / Security / libsecurity_codesigning / lib / SecCodeHostLib.c
diff --git a/Security/libsecurity_codesigning/lib/SecCodeHostLib.c b/Security/libsecurity_codesigning/lib/SecCodeHostLib.c
new file mode 100644 (file)
index 0000000..4477452
--- /dev/null
@@ -0,0 +1,124 @@
+/*
+ * Copyright (c) 2007,2011 Apple Inc. All Rights Reserved.
+ * 
+ * @APPLE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_LICENSE_HEADER_END@
+ */
+#include "SecCodeHost.h"
+#include "SecCodeHostLib.h"
+#include <Security/Security.h>
+#include <Security/AuthSession.h>
+#include <securityd_client/ucsp.h>
+#include <servers/bootstrap.h>
+
+
+//
+// Global state
+//
+mach_port_t gServerPort;
+SecCSFlags gInitFlags;
+
+
+//
+// Framing macros and facilities
+//
+#define UCSP_ARGS      gServerPort, mig_get_reply_port(), &securitydCreds, &rcode
+#define ATTRDATA(attr) (void *)(attr), (attr) ? strlen((attr)) : 0
+
+#define CALL(func) \
+       security_token_t securitydCreds; \
+       CSSM_RETURN rcode; \
+       if (KERN_SUCCESS != func) \
+               return errSecCSInternalError; \
+       if (securitydCreds.val[0] != 0) \
+               return CSSM_ERRCODE_VERIFICATION_FAILURE; \
+       return rcode
+
+
+
+//
+// Mandatory initialization call
+//
+OSStatus SecHostLibInit(SecCSFlags flags)
+{
+       if (gServerPort != MACH_PORT_NULL)      // re-initialization attempt
+               return errSecCSInternalError;
+
+       mach_port_t bootstrapPort;
+       if (KERN_SUCCESS != task_get_bootstrap_port(mach_task_self(), &bootstrapPort))
+               return errSecCSInternalError;
+       static char serverName[BOOTSTRAP_MAX_NAME_LEN] = SECURITYSERVER_BOOTSTRAP_NAME;
+       if (KERN_SUCCESS != bootstrap_look_up(bootstrapPort, serverName, &gServerPort))
+               return errSecCSInternalError;
+
+       ClientSetupInfo info = { 0x1234, SSPROTOVERSION };
+       CALL(ucsp_client_setup(UCSP_ARGS, mach_task_self(), info, "?:unspecified"));
+}
+
+
+//
+// Guest creation.
+// At this time, this ONLY supports the creation of (one) dedicated guest.
+//
+OSStatus SecHostLibCreateGuest(SecGuestRef host,
+       uint32_t status, const char *path, const char *attributeXML,
+       SecCSFlags flags, SecGuestRef *newGuest)
+{
+       return SecHostLibCreateGuest2(host, status, path, "", 0, attributeXML, flags, newGuest);
+}
+
+OSStatus SecHostLibCreateGuest2(SecGuestRef host,
+       uint32_t status, const char *path, const void *cdhash, size_t cdhashLength, const char *attributeXML,
+       SecCSFlags flags, SecGuestRef *newGuest)
+{
+       if (flags != kSecCSDedicatedHost)
+               return errSecCSInvalidFlags;
+       
+       CALL(ucsp_client_createGuest(UCSP_ARGS, host, status, path,
+               (void *)cdhash, cdhashLength, ATTRDATA(attributeXML), flags, newGuest));
+}
+
+
+//
+// Update the status of a guest.
+//
+OSStatus SecHostLibSetGuestStatus(SecGuestRef guestRef,
+       uint32_t status, const char *attributeXML,
+       SecCSFlags flags)
+{
+       CALL(ucsp_client_setGuestStatus(UCSP_ARGS, guestRef, status, ATTRDATA(attributeXML)));
+}
+
+
+//
+// Enable dynamic hosting mode.
+//
+OSStatus SecHostSetHostingPort(mach_port_t hostingPort, SecCSFlags flags)
+{
+       CALL(ucsp_client_registerHosting(UCSP_ARGS, hostingPort, flags));
+}
+
+
+//
+// Helper for checked incorporation of code.
+//
+OSStatus SecHostLibCheckLoad(const char *path, SecRequirementType type)
+{
+       CALL(ucsp_client_helpCheckLoad(UCSP_ARGS, path, type));
+}