]> git.saurik.com Git - apple/security.git/blobdiff - Security/libsecurity_keychain/lib/SecTrustedApplication.cpp
Security-57031.1.35.tar.gz
[apple/security.git] / Security / libsecurity_keychain / lib / SecTrustedApplication.cpp
diff --git a/Security/libsecurity_keychain/lib/SecTrustedApplication.cpp b/Security/libsecurity_keychain/lib/SecTrustedApplication.cpp
new file mode 100644 (file)
index 0000000..9383937
--- /dev/null
@@ -0,0 +1,240 @@
+/*
+ * Copyright (c) 2002-2004,2011-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+#include <Security/SecTrustedApplicationPriv.h>
+#include <security_keychain/TrustedApplication.h>
+#include <security_keychain/Certificate.h>
+#include <securityd_client/ssclient.h>         // for code equivalence SPIs
+
+#include "SecBridge.h"
+
+
+
+#pragma clang diagnostic push
+#pragma clang diagnostic ignored "-Wunused-function"
+static inline CssmData cfData(CFDataRef data)
+{
+    return CssmData(const_cast<UInt8 *>(CFDataGetBytePtr(data)),
+        CFDataGetLength(data));
+}
+#pragma clang diagnostic pop
+
+
+CFTypeID
+SecTrustedApplicationGetTypeID(void)
+{
+       BEGIN_SECAPI
+
+       return gTypes().TrustedApplication.typeID;
+
+       END_SECAPI1(_kCFRuntimeNotATypeID)
+}
+
+
+OSStatus
+SecTrustedApplicationCreateFromPath(const char *path, SecTrustedApplicationRef *appRef)
+{
+       BEGIN_SECAPI
+       SecPointer<TrustedApplication> app =
+               path ? new TrustedApplication(path) : new TrustedApplication;
+       Required(appRef) = app->handle();
+       END_SECAPI
+}
+
+OSStatus SecTrustedApplicationCopyData(SecTrustedApplicationRef appRef,
+       CFDataRef *dataRef)
+{
+       BEGIN_SECAPI
+       const char *path = TrustedApplication::required(appRef)->path();
+       Required(dataRef) = CFDataCreate(NULL, (const UInt8 *)path, strlen(path) + 1);
+       END_SECAPI
+}
+
+OSStatus SecTrustedApplicationSetData(SecTrustedApplicationRef appRef,
+       CFDataRef dataRef)
+{
+       BEGIN_SECAPI
+       if (!dataRef)
+               return errSecParam;
+       TrustedApplication::required(appRef)->data(dataRef);
+       END_SECAPI
+}
+
+
+OSStatus
+SecTrustedApplicationValidateWithPath(SecTrustedApplicationRef appRef, const char *path)
+{
+       BEGIN_SECAPI
+       TrustedApplication &app = *TrustedApplication::required(appRef);
+       if (!app.verifyToDisk(path))
+               return CSSMERR_CSP_VERIFY_FAILED;
+       END_SECAPI
+}
+
+
+//
+// Convert from/to external data representation
+//
+OSStatus SecTrustedApplicationCopyExternalRepresentation(
+       SecTrustedApplicationRef appRef,
+       CFDataRef *externalRef)
+{
+       BEGIN_SECAPI
+       TrustedApplication &app = *TrustedApplication::required(appRef);
+       Required(externalRef) = app.externalForm();
+       END_SECAPI
+}
+
+OSStatus SecTrustedApplicationCreateWithExternalRepresentation(
+       CFDataRef externalRef,
+       SecTrustedApplicationRef *appRef)
+{
+       BEGIN_SECAPI
+       Required(appRef) = (new TrustedApplication(externalRef))->handle();
+       END_SECAPI
+}
+
+
+OSStatus
+SecTrustedApplicationMakeEquivalent(SecTrustedApplicationRef oldRef,
+       SecTrustedApplicationRef newRef, UInt32 flags)
+{
+       BEGIN_SECAPI
+       if (flags & ~kSecApplicationValidFlags)
+               return errSecParam;
+       SecurityServer::ClientSession ss(Allocator::standard(), Allocator::standard());
+       TrustedApplication *oldApp = TrustedApplication::required(oldRef);
+       TrustedApplication *newApp = TrustedApplication::required(newRef);
+       ss.addCodeEquivalence(oldApp->legacyHash(), newApp->legacyHash(), oldApp->path(),
+               flags & kSecApplicationFlagSystemwide);
+       END_SECAPI
+}
+
+OSStatus
+SecTrustedApplicationRemoveEquivalence(SecTrustedApplicationRef appRef, UInt32 flags)
+{
+       BEGIN_SECAPI
+       if (flags & ~kSecApplicationValidFlags)
+               return errSecParam;
+       SecurityServer::ClientSession ss(Allocator::standard(), Allocator::standard());
+       TrustedApplication *app = TrustedApplication::required(appRef);
+       ss.removeCodeEquivalence(app->legacyHash(), app->path(),
+               flags & kSecApplicationFlagSystemwide);
+       END_SECAPI
+}
+
+
+/*
+ * Check to see if an application at a given path is a candidate for
+ * pre-emptive code equivalency establishment
+ */
+OSStatus
+SecTrustedApplicationIsUpdateCandidate(const char *installroot, const char *path)
+{
+    BEGIN_SECAPI
+
+       // strip installroot
+       if (installroot) {
+               size_t rootlen = strlen(installroot);
+               if (!strncmp(installroot, path, rootlen))
+                       path += rootlen - 1;    // keep the slash
+       }
+
+       // look up in database
+       static ModuleNexus<PathDatabase> paths;
+       static ModuleNexus<RecursiveMutex> mutex;
+       StLock<Mutex>_(mutex());
+
+       if (!paths()[path])
+               return CSSMERR_DL_RECORD_NOT_FOUND;     // whatever
+    END_SECAPI
+}
+
+
+/*
+ * Point the system at another system root for equivalence use.
+ * This is for system update installers (only)!
+ */
+OSStatus
+SecTrustedApplicationUseAlternateSystem(const char *systemRoot)
+{
+       BEGIN_SECAPI
+       Required(systemRoot);
+       SecurityServer::ClientSession ss(Allocator::standard(), Allocator::standard());
+       ss.setAlternateSystemRoot(systemRoot);
+       END_SECAPI
+}
+
+
+/*
+ * Gateway between traditional SecTrustedApplicationRefs and the Code Signing
+ * subsystem. Invisible to the naked eye, as of 10.5 (Leopard), these reference
+ * may contain Cod e Signing Requirement objects (SecRequirementRefs). For backward
+ * compatibility, these are handled implicitly at the SecAccess/SecACL layer.
+ * However, Those Who Know can bridge the gap for additional functionality.
+ */
+OSStatus SecTrustedApplicationCreateFromRequirement(const char *description,
+       SecRequirementRef requirement, SecTrustedApplicationRef *appRef)
+{
+       BEGIN_SECAPI
+       if (description == NULL)
+               description = "csreq://";       // default to "generic requirement"
+       SecPointer<TrustedApplication> app = new TrustedApplication(description, requirement);
+       Required(appRef) = app->handle();
+       END_SECAPI
+}
+
+OSStatus SecTrustedApplicationCopyRequirement(SecTrustedApplicationRef appRef,
+       SecRequirementRef *requirement)
+{
+       BEGIN_SECAPI
+       Required(requirement) = TrustedApplication::required(appRef)->requirement();
+       if (*requirement)
+               CFRetain(*requirement);
+       END_SECAPI
+}
+
+
+/*
+ * Create an application group reference.
+ */
+OSStatus SecTrustedApplicationCreateApplicationGroup(const char *groupName,
+       SecCertificateRef anchor, SecTrustedApplicationRef *appRef)
+{
+       BEGIN_SECAPI
+
+       CFRef<SecRequirementRef> req;
+       MacOSError::check(SecRequirementCreateGroup(CFTempString(groupName), anchor,
+               kSecCSDefaultFlags, &req.aref()));
+       string description = string("group://") + groupName;
+       if (anchor) {
+               Certificate *cert = Certificate::required(anchor);
+               const CssmData &hash = cert->publicKeyHash();
+               description = description + "?cert=" + cfString(cert->commonName())
+                       + "&hash=" + hash.toHex();
+       }
+       SecPointer<TrustedApplication> app = new TrustedApplication(description, req);
+       Required(appRef) = app->handle();
+
+       END_SECAPI
+}