--- /dev/null
+/*
+ * Copyright (c) 2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+#include <mach/mach.h>
+#include <mach/message.h>
+
+#include <stdlib.h>
+#include <sys/queue.h>
+#include <libproc.h>
+
+#include <Security/SecInternal.h>
+#include <Security/SecBasePriv.h>
+#include <Security/SecItemPriv.h> /* for SecErrorGetOSStatus */
+#include <CoreFoundation/CoreFoundation.h>
+#include <CoreFoundation/CFPriv.h>
+
+#include <Foundation/Foundation.h>
+
+#if TARGET_OS_IPHONE
+#include <CoreFoundation/CFUserNotification.h>
+#endif
+#if !TARGET_OS_IPHONE
+#include <CoreFoundation/CFUserNotificationPriv.h>
+#endif
+
+#if TARGET_OS_IPHONE
+#include <SpringBoardServices/SpringBoardServices.h>
+#endif
+
+#if TARGET_OS_IPHONE
+#include <WebUI/WBUAutoFillData.h>
+#endif
+
+#include <asl.h>
+#include <syslog.h>
+#include <bsm/libbsm.h>
+#include <utilities/SecIOFormat.h>
+#include <utilities/debugging.h>
+
+#include <ipc/securityd_client.h>
+#include "swcagent_client.h"
+
+#include <securityd/SecItemServer.h>
+#include <securityd/SecTrustServer.h>
+#include <securityd/SecTrustStoreServer.h>
+#include <securityd/spi.h>
+#include <Security/SecTask.h>
+
+#include <utilities/SecCFWrappers.h>
+#include <utilities/SecCFError.h>
+#include <utilities/SecXPCError.h>
+
+// TODO: Make this include work on both platforms.
+#if TARGET_OS_EMBEDDED
+#include <Security/SecEntitlements.h>
+#else
+/* defines from <Security/SecEntitlements.h> */
+#define kSecEntitlementAssociatedDomains CFSTR("com.apple.developer.associated-domains")
+#define kSecEntitlementPrivateAssociatedDomains CFSTR("com.apple.private.associated-domains")
+#endif
+
+#include <Security/SecuritydXPC.h>
+
+#include <xpc/xpc.h>
+#include <xpc/private.h>
+#include <xpc/connection_private.h>
+#include <AssertMacros.h>
+
+
+// Local function declarations
+CFStringRef SWCAGetOperationDescription(enum SWCAXPCOperation op);
+bool SWCAIsAutofillEnabled(void);
+
+bool swca_confirm_add(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error);
+bool swca_confirm_copy(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error);
+bool swca_confirm_update(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error);
+bool swca_confirm_delete(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error);
+bool swca_select_item(CFArrayRef items, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error);
+
+CFOptionFlags swca_handle_request(enum SWCAXPCOperation operation, CFStringRef client, CFArrayRef domains);
+bool swca_process_response(CFOptionFlags response, CFTypeRef *result);
+
+static CFArrayRef gActiveArray = NULL;
+static CFDictionaryRef gActiveItem = NULL;
+
+#if TARGET_IPHONE_SIMULATOR
+#define CHECK_ENTITLEMENTS 0
+#else
+#define CHECK_ENTITLEMENTS 0 /* %%% TODO: re-enable when entitlements are available */
+#endif
+
+#if CHECK_ENTITLEMENTS
+static bool SecTaskGetBooleanValueForEntitlement(SecTaskRef task, CFStringRef entitlement)
+{
+ CFStringRef canModify = (CFStringRef)SecTaskCopyValueForEntitlement(task, entitlement, NULL);
+ if (!canModify)
+ return false;
+ CFTypeID canModifyType = CFGetTypeID(canModify);
+ bool ok = (CFBooleanGetTypeID() == canModifyType) && CFBooleanGetValue((CFBooleanRef)canModify);
+ CFRelease(canModify);
+ return ok;
+}
+
+static CFArrayRef SecTaskCopyArrayOfStringsForEntitlement(SecTaskRef task, CFStringRef entitlement)
+{
+ CFArrayRef value = (CFArrayRef)SecTaskCopyValueForEntitlement(task,
+ entitlement, NULL);
+ if (value) {
+ if (CFGetTypeID(value) == CFArrayGetTypeID()) {
+ CFIndex ix, count = CFArrayGetCount(value);
+ for (ix = 0; ix < count; ++ix) {
+ CFStringRef string = (CFStringRef)CFArrayGetValueAtIndex(value, ix);
+ if (CFGetTypeID(string) != CFStringGetTypeID()) {
+ CFRelease(value);
+ value = NULL;
+ break;
+ }
+ }
+ } else {
+ CFRelease(value);
+ value = NULL;
+ }
+ }
+
+ return value;
+}
+
+#endif /* CHECK_ENTITLEMENTS */
+
+
+/* Identify a client */
+enum {
+ CLIENT_TYPE_BUNDLE_IDENTIFIER,
+ CLIENT_TYPE_EXECUTABLE_PATH,
+};
+
+@interface Client : NSObject
+@property int client_type;
+@property(retain) NSString *client;
+@property(retain) NSString *client_name;
+@property(retain) NSString *path;
+@property(retain) NSBundle *bundle;
+@end
+@implementation Client
+@end
+static Client *identify_client(pid_t pid)
+{
+ Client *client = [[Client alloc] init];
+ if (!client)
+ return nil;
+
+ char path_buf[PROC_PIDPATHINFO_SIZE] = "";
+ NSURL *path_url;
+
+#if TARGET_OS_IPHONE
+ if (proc_pidpath(pid, path_buf, sizeof(path_buf)) <= 0) {
+ asl_log(NULL, NULL, ASL_LEVEL_NOTICE, "Refusing client without path (pid %d)", pid);
+ [client release];
+ return nil;
+ }
+#else
+ size_t path_len = sizeof(path_buf);
+ if (responsibility_get_responsible_for_pid(pid, NULL, NULL, &path_len, path_buf) != 0) {
+ asl_log(NULL, NULL, ASL_LEVEL_NOTICE, "Refusing client without path (pid %d)", pid);
+ [client release];
+ return nil;
+ }
+#endif
+ path_buf[sizeof(path_buf) - 1] = '\0';
+
+ if (!(client.path = [NSString stringWithUTF8String:path_buf]) ||
+ !(path_url = [NSURL fileURLWithPath:client.path])) {
+ asl_log(NULL, NULL, ASL_LEVEL_NOTICE, "Refusing client without path (pid %d)", pid);
+ [client release];
+ return nil;
+ }
+
+ NSURL *bundle_url;
+ if ((bundle_url = (NSURL *)_CFBundleCopyBundleURLForExecutableURL((__bridge CFURLRef)path_url)) &&
+ (client.bundle = [NSBundle bundleWithURL:bundle_url]) &&
+ (client.client = [client.bundle bundleIdentifier])) {
+ client.client_type = CLIENT_TYPE_BUNDLE_IDENTIFIER;
+ CFStringRef client_name_cf = NULL;
+#if TARGET_OS_IPHONE
+ client_name_cf = SBSCopyLocalizedApplicationNameForDisplayIdentifier((__bridge CFStringRef)client.client);
+ client.client_name = (NSString *)client_name_cf;
+#else
+ if (!LSCopyDisplayNameForURL((__bridge CFURLRef)bundle_url, &client_name_cf))
+ client.client_name = (__bridge_transfer NSString *)client_name_cf;
+#endif
+ if (client_name_cf)
+ CFRelease(client_name_cf);
+ } else {
+#if TARGET_OS_IPHONE
+ asl_log(NULL, NULL, ASL_LEVEL_NOTICE, "Refusing client without bundle identifier (%s)", path_buf);
+ [client release];
+ [bundle_url release];
+ return nil;
+#else
+ client.client_type = CLIENT_TYPE_EXECUTABLE_PATH;
+ CFBooleanRef is_app = NULL;
+ CFStringRef client_name_cf;
+ if (bundle_url &&
+ CFURLCopyResourcePropertyForKey((__bridge CFURLRef)bundle_url, _kCFURLIsApplicationKey, &is_app, NULL) &&
+ is_app == kCFBooleanTrue) {
+ if ((client.client = [bundle_url path]) &&
+ !LSCopyDisplayNameForURL((__bridge CFURLRef)bundle_url, &client_name_cf))
+ client.client_name = (__bridge_transfer NSString *)client_name_cf;
+ } else {
+ client.client = client.path;
+ if (!LSCopyDisplayNameForURL((__bridge CFURLRef)path_url, &client_name_cf))
+ client.client_name = (__bridge_transfer NSString *)client_name_cf;
+ }
+ if (is_app)
+ CFRelease(is_app);
+#endif
+ }
+
+ [bundle_url release];
+ return client;
+}
+
+struct __SecTask {
+ CFRuntimeBase base;
+
+ pid_t pid_self;
+ audit_token_t token;
+
+ /* Track whether we've loaded entitlements independently since after the
+ * load, entitlements may legitimately be NULL */
+ Boolean entitlementsLoaded;
+ CFDictionaryRef entitlements;
+};
+
+static CFStringRef SecTaskCopyLocalizedDescription(SecTaskRef task)
+{
+ // SecTaskCopyDebugDescription is not sufficient to get the localized client name
+ pid_t pid;
+ if (task->pid_self==-1) {
+ audit_token_to_au32(task->token, NULL, NULL, NULL, NULL, NULL, &pid, NULL, NULL);
+ } else {
+ pid = task->pid_self;
+ }
+ Client *client = identify_client(pid);
+ CFStringRef clientTaskName = (__bridge CFStringRef)client.client_name;
+ CFRetainSafe(clientTaskName);
+ [client release];
+
+ return clientTaskName;
+}
+
+static CFArrayRef SecTaskCopyAccessGroups(SecTaskRef task) {
+#if CHECK_ENTITLEMENTS
+ CFArrayRef groups = SecTaskCopyArrayOfStringsForEntitlement(task, kSecEntitlementAssociatedDomains);
+#else
+ CFArrayRef groups = SecAccessGroupsGetCurrent();
+ CFRetainSafe(groups);
+#endif
+ return groups;
+}
+
+CFStringRef SWCAGetOperationDescription(enum SWCAXPCOperation op)
+{
+ switch (op) {
+ case swca_add_request_id:
+ return CFSTR("swc add");
+ case swca_update_request_id:
+ return CFSTR("swc update");
+ case swca_delete_request_id:
+ return CFSTR("swc delete");
+ case swca_copy_request_id:
+ return CFSTR("swc copy");
+ case swca_select_request_id:
+ return CFSTR("swc select");
+ case swca_copy_pairs_request_id:
+ return CFSTR("swc copy pairs");
+ case swca_set_selection_request_id:
+ return CFSTR("swc set selection");
+ case swca_enabled_request_id:
+ return CFSTR("swc enabled");
+ default:
+ return CFSTR("Unknown xpc operation");
+ }
+}
+
+bool SWCAIsAutofillEnabled(void)
+{
+#if TARGET_IPHONE_SIMULATOR
+ // Assume the setting's on in the simulator: <rdar://problem/17057358> WBUAutoFillGetEnabledDataClasses call failing in the Simulator
+ return true;
+#else
+ WBSAutoFillDataClasses autofill = WBUAutoFillGetEnabledDataClasses();
+ return ((autofill & WBSAutoFillDataClassUsernamesAndPasswords) != 0);
+#endif
+}
+
+CFOptionFlags swca_handle_request(enum SWCAXPCOperation operation, CFStringRef client, CFArrayRef domains)
+{
+ CFUserNotificationRef notification = NULL;
+ NSMutableDictionary *notification_dictionary = NULL;
+ NSString *security_path = @"/System/Library/Frameworks/Security.framework";
+ NSString *swc_table = @"SharedWebCredentials";
+ NSBundle *security_bundle;
+ NSString *request_key;
+ NSString *request_format;
+ NSString *default_button_key;
+ NSString *alternate_button_key;
+ NSString *other_button_key;
+ NSString *info_message_key;
+ NSString *domain;
+ char *op = NULL;
+ CFOptionFlags response = 0 | kCFUserNotificationCancelResponse;
+ BOOL alert_sem_held = NO;
+
+check_database:
+ /* If we have previously allowed this operation/domain for this client,
+ * check and don't prompt again.
+ */
+ ; /* %%% TBD */
+
+ /* Only display one alert at a time. */
+ static dispatch_semaphore_t alert_sem;
+ static dispatch_once_t alert_once;
+ dispatch_once(&alert_once, ^{
+ if (!(alert_sem = dispatch_semaphore_create(1)))
+ abort();
+ });
+ if (!alert_sem_held) {
+ alert_sem_held = YES;
+ if (dispatch_semaphore_wait(alert_sem, DISPATCH_TIME_NOW)) {
+ /* Wait for the active alert, then recheck the database in case both alerts are for the same client. */
+ //asl_log(NULL, NULL, ASL_LEVEL_NOTICE, "Delaying prompt for pid %d", pid);
+ dispatch_semaphore_wait(alert_sem, DISPATCH_TIME_FOREVER);
+ goto check_database;
+ }
+ }
+
+#if TARGET_IPHONE_SIMULATOR
+ security_path = [NSString stringWithFormat:@"%s%@", getenv("IPHONE_SIMULATOR_ROOT"), security_path];
+#endif
+ security_bundle = [NSBundle bundleWithPath:security_path];
+ notification_dictionary = [NSMutableDictionary dictionary];
+ domain = nil;
+ if (1 == [(__bridge NSArray *)domains count]) {
+ domain = (NSString *)[(__bridge NSArray *)domains objectAtIndex:0];
+ }
+ switch (operation) {
+ case swca_add_request_id:
+ op = "ADD";
+ break;
+ case swca_update_request_id:
+ op = "UPDATE";
+ break;
+ case swca_delete_request_id:
+ op = "DELETE";
+ break;
+ case swca_copy_request_id:
+ op = (domain) ? "COPY" : "COPYALL";
+ break;
+ default:
+ op = "USE";
+ break;
+ }
+ if (!op) {
+ goto out;
+ }
+ request_key = [NSString stringWithFormat:@"SWC_REQUEST_%s", op];
+ request_format = NSLocalizedStringFromTableInBundle(request_key, swc_table, security_bundle, nil);
+ alternate_button_key = (op) ? [NSString stringWithFormat:@"SWC_ALLOW_%s", op] : nil;
+ default_button_key = @"SWC_NEVER";
+ other_button_key = @"SWC_DENY";
+ info_message_key = @"SWC_INFO_MESSAGE";
+
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlertHeaderKey] = [NSString stringWithFormat:request_format, client, domain];
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlertMessageKey] = NSLocalizedStringFromTableInBundle(info_message_key, swc_table, security_bundle, nil);
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationDefaultButtonTitleKey] = NSLocalizedStringFromTableInBundle(default_button_key, swc_table, security_bundle, nil);
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlternateButtonTitleKey] = NSLocalizedStringFromTableInBundle(alternate_button_key, swc_table, security_bundle, nil);
+
+ if (other_button_key) {
+ // notification_dictionary[(__bridge NSString *)kCFUserNotificationOtherButtonTitleKey] = NSLocalizedStringFromTableInBundle(other_button_key, swc_table, security_bundle, nil);
+ }
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationLocalizationURLKey] = [security_bundle bundleURL];
+
+ SInt32 error;
+ if (!(notification = CFUserNotificationCreate(NULL, 0, kCFUserNotificationStopAlertLevel | kCFUserNotificationNoDefaultButtonFlag, &error, (__bridge CFDictionaryRef)notification_dictionary)) ||
+ error)
+ goto out;
+ if (CFUserNotificationReceiveResponse(notification, 0, &response))
+ goto out;
+
+out:
+ if (alert_sem_held)
+ dispatch_semaphore_signal(alert_sem);
+ if (notification)
+ CFRelease(notification);
+ return response;
+}
+
+bool swca_process_response(CFOptionFlags response, CFTypeRef *result)
+{
+ int32_t value = (int32_t)(response & 0x3);
+ CFNumberRef number = CFNumberCreate(kCFAllocatorDefault, kCFNumberSInt32Type, &value);
+ *result = number;
+ return (NULL != number);
+}
+
+bool swca_confirm_add(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error)
+{
+ CFStringRef domain = (CFStringRef) CFDictionaryGetValue(attributes, kSecAttrServer);
+ CFArrayRef domains = CFArrayCreate(kCFAllocatorDefault, (const void **)&domain, 1, &kCFTypeArrayCallBacks);
+ CFOptionFlags response = swca_handle_request(swca_add_request_id, clientTaskName, domains);
+ return swca_process_response(response, result);
+}
+
+bool swca_confirm_copy(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error)
+{
+ CFStringRef domain = (CFStringRef) CFDictionaryGetValue(attributes, kSecAttrServer);
+ CFArrayRef domains = CFArrayCreate(kCFAllocatorDefault, (const void **)&domain, 1, &kCFTypeArrayCallBacks);
+ CFOptionFlags response = swca_handle_request(swca_copy_request_id, clientTaskName, domains);
+ return swca_process_response(response, result);
+}
+
+bool swca_confirm_update(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error)
+{
+ CFStringRef domain = (CFStringRef) CFDictionaryGetValue(attributes, kSecAttrServer);
+ CFArrayRef domains = CFArrayCreate(kCFAllocatorDefault, (const void **)&domain, 1, &kCFTypeArrayCallBacks);
+ CFOptionFlags response = swca_handle_request(swca_update_request_id, clientTaskName, domains);
+ return swca_process_response(response, result);
+}
+
+bool swca_confirm_delete(CFDictionaryRef attributes, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error)
+{
+ CFStringRef domain = (CFStringRef) CFDictionaryGetValue(attributes, kSecAttrServer);
+ CFArrayRef domains = CFArrayCreate(kCFAllocatorDefault, (const void **)&domain, 1, &kCFTypeArrayCallBacks);
+ CFOptionFlags response = swca_handle_request(swca_delete_request_id, clientTaskName, domains);
+ return swca_process_response(response, result);
+}
+
+bool swca_select_item(CFArrayRef items, CFStringRef clientTaskName, CFArrayRef accessGroups, CFTypeRef *result, CFErrorRef *error)
+{
+ CFUserNotificationRef notification = NULL;
+ NSMutableDictionary *notification_dictionary = NULL;
+ NSString *security_path = @"/System/Library/Frameworks/Security.framework";
+ NSString *swc_table = @"SharedWebCredentials";
+ NSBundle *security_bundle;
+ NSString *request_title_format;
+ NSString *info_message_key;
+ NSString *default_button_key;
+ NSString *alternate_button_key;
+ CFOptionFlags response = 0 | kCFUserNotificationCancelResponse;
+ CFIndex item_count = (items) ? CFArrayGetCount(items) : (CFIndex) 0;
+ BOOL alert_sem_held = NO;
+
+ if (item_count < 1) {
+ return false;
+ }
+
+entry:
+ ;
+ /* Only display one alert at a time. */
+ static dispatch_semaphore_t select_alert_sem;
+ static dispatch_once_t select_alert_once;
+ dispatch_once(&select_alert_once, ^{
+ if (!(select_alert_sem = dispatch_semaphore_create(1)))
+ abort();
+ });
+ if (!alert_sem_held) {
+ alert_sem_held = YES;
+ if (dispatch_semaphore_wait(select_alert_sem, DISPATCH_TIME_NOW)) {
+ /* Wait for the active alert */
+ dispatch_semaphore_wait(select_alert_sem, DISPATCH_TIME_FOREVER);
+ goto entry;
+ }
+ }
+
+ CFRetainSafe(items);
+ CFReleaseSafe(gActiveArray);
+ gActiveArray = items;
+ CFReleaseSafe(gActiveItem);
+ gActiveItem = NULL; // selection will be set by remote view controller
+ //gActiveItem = CFArrayGetValueAtIndex(items, 0);
+ //CFRetainSafe(gActiveItem);
+
+#if TARGET_IPHONE_SIMULATOR
+ security_path = [NSString stringWithFormat:@"%s%@", getenv("IPHONE_SIMULATOR_ROOT"), security_path];
+#endif
+ security_bundle = [NSBundle bundleWithPath:security_path];
+ notification_dictionary = [NSMutableDictionary dictionary];
+
+ request_title_format = NSLocalizedStringFromTableInBundle(@"SWC_ALERT_TITLE", swc_table, security_bundle, nil);
+ default_button_key = @"SWC_ALLOW_USE";
+ alternate_button_key = @"SWC_CANCEL";
+ info_message_key = @"SWC_INFO_MESSAGE";
+
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlertHeaderKey] = [NSString stringWithFormat: request_title_format, clientTaskName];
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlertMessageKey] = NSLocalizedStringFromTableInBundle(info_message_key, swc_table, security_bundle, nil);
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationDefaultButtonTitleKey] = NSLocalizedStringFromTableInBundle(default_button_key, swc_table, security_bundle, nil);
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlternateButtonTitleKey] = NSLocalizedStringFromTableInBundle(alternate_button_key, swc_table, security_bundle, nil);
+
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationLocalizationURLKey] = [security_bundle bundleURL];
+ notification_dictionary[(__bridge NSString *)kCFUserNotificationAlertTopMostKey] = [NSNumber numberWithBool:YES];
+
+ // additional keys for remote view controller
+ notification_dictionary[(__bridge NSString *)SBUserNotificationDismissOnLock] = [NSNumber numberWithBool:YES];
+ notification_dictionary[(__bridge NSString *)SBUserNotificationDontDismissOnUnlock] = [NSNumber numberWithBool:YES];
+ notification_dictionary[(__bridge NSString *)SBUserNotificationRemoteServiceBundleIdentifierKey] = @"com.apple.SharedWebCredentialViewService";
+ notification_dictionary[(__bridge NSString *)SBUserNotificationRemoteViewControllerClassNameKey] = @"SWCViewController";
+
+ SInt32 err;
+ if (!(notification = CFUserNotificationCreate(NULL, 0, 0, &err, (__bridge CFDictionaryRef)notification_dictionary)) ||
+ err)
+ goto out;
+ if (CFUserNotificationReceiveResponse(notification, 0, &response))
+ goto out;
+
+ //NSLog(@"Selection: %@, Response: %lu", gActiveItem, (unsigned long)response);
+ if (result && response == kCFUserNotificationDefaultResponse) {
+ CFRetainSafe(gActiveItem);
+ *result = gActiveItem;
+ }
+
+out:
+ if (alert_sem_held) {
+ dispatch_semaphore_signal(select_alert_sem);
+ }
+ CFReleaseSafe(notification);
+ CFReleaseNull(gActiveArray);
+ CFReleaseNull(gActiveItem);
+
+ return (result && *result);
+}
+
+
+static void swca_xpc_dictionary_handler(const xpc_connection_t connection, xpc_object_t event) {
+ xpc_type_t type = xpc_get_type(event);
+ __block CFErrorRef error = NULL;
+ xpc_object_t xpcError = NULL;
+ xpc_object_t replyMessage = NULL;
+ SecTaskRef clientTask = NULL;
+ CFStringRef clientTaskName = NULL;
+ CFArrayRef accessGroups = NULL;
+
+ secdebug("swcagent_xpc", "entering");
+ if (type == XPC_TYPE_DICTIONARY) {
+ replyMessage = xpc_dictionary_create_reply(event);
+
+ uint64_t operation = xpc_dictionary_get_uint64(event, kSecXPCKeyOperation);
+ secdebug("swcagent_xpc", "operation: %@ (%" PRIu64 ")", SWCAGetOperationDescription((enum SWCAXPCOperation)operation), operation);
+
+ bool hasEntitlement;
+ audit_token_t auditToken = {};
+#if !CHECK_ENTITLEMENTS
+ hasEntitlement = true;
+#else
+ // check our caller's private entitlement to invoke swcagent
+ // TODO: on iOS it's enough to have the entitlement; will need to check code requirement on OS X
+ xpc_connection_get_audit_token(connection, &auditToken);
+ clientTask = SecTaskCreateWithAuditToken(kCFAllocatorDefault, auditToken);
+ hasEntitlement = (clientTask && SecTaskGetBooleanValueForEntitlement(clientTask, kSecEntitlementPrivateAssociatedDomains));
+ if (!hasEntitlement) {
+ CFErrorRef entitlementError = NULL;
+ SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementPrivateAssociatedDomains);
+ CFReleaseSafe(entitlementError);
+ }
+ CFReleaseNull(clientTask);
+#endif
+
+ if (hasEntitlement) {
+ // fetch audit token for process which called securityd
+ size_t length = 0;
+ const uint8_t *bytes = xpc_dictionary_get_data(event, kSecXPCKeyClientToken, &length);
+ if (length == sizeof(audit_token_t)) {
+ memcpy(&auditToken, bytes, sizeof(audit_token_t));
+ } else {
+ secerror("swcagent_xpc - wrong length for client id");
+ hasEntitlement = false;
+ }
+ }
+ if (hasEntitlement) {
+ // identify original client
+ clientTask = SecTaskCreateWithAuditToken(kCFAllocatorDefault, auditToken);
+ accessGroups = SecTaskCopyAccessGroups(clientTask);
+ clientTaskName = SecTaskCopyLocalizedDescription(clientTask);
+#if CHECK_ENTITLEMENTS
+ // check for presence of original client's shared credential entitlement
+ hasEntitlement = (clientTask && SecTaskGetBooleanValueForEntitlement(clientTask, kSecEntitlementAssociatedDomains));
+ if (!hasEntitlement) {
+ CFErrorRef entitlementError = NULL;
+ SecError(errSecMissingEntitlement, &entitlementError, CFSTR("%@: %@ lacks entitlement %@"), SOSCCGetOperationDescription((enum SWCAXPCOperation)operation), clientTask, kSecEntitlementAssociatedDomains);
+ CFReleaseSafe(entitlementError);
+ }
+#endif
+ CFReleaseNull(clientTask);
+ }
+
+ if (hasEntitlement) {
+ switch (operation)
+ {
+ case swca_add_request_id:
+ {
+ CFDictionaryRef query = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error);
+ //secdebug("ipc", "swcagent: got swca_add_request_id, query: %@", query);
+ if (query) {
+ CFTypeRef result = NULL;
+ // confirm that we can add this item
+ if (swca_confirm_add(query, clientTaskName, accessGroups, &result, &error) && result) {
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ CFRelease(result);
+ }
+ CFRelease(query);
+ }
+ break;
+ }
+ case swca_copy_request_id:
+ {
+ CFDictionaryRef query = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error);
+ //secdebug("ipc", "swcagent: got swca_copy_request_id, query: %@", query);
+ if (query) {
+ CFTypeRef result = NULL;
+ // confirm that we can copy this item
+ if (swca_confirm_copy(query, clientTaskName, accessGroups, &result, &error) && result) {
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ CFRelease(result);
+ }
+ CFRelease(query);
+ }
+ break;
+ }
+ case swca_update_request_id:
+ {
+ CFDictionaryRef query = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error);
+ //secdebug("ipc", "swcagent: got swca_update_request_id, query: %@", query);
+ if (query) {
+ CFTypeRef result = NULL;
+ // confirm that we can copy this item
+ if (swca_confirm_update(query, clientTaskName, accessGroups, &result, &error) && result) {
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ CFRelease(result);
+ }
+ CFRelease(query);
+ }
+ break;
+ }
+ case swca_delete_request_id:
+ {
+ CFDictionaryRef query = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error);
+ //secdebug("ipc", "swcagent: got swca_delete_request_id, query: %@", query);
+ if (query) {
+ CFTypeRef result = NULL;
+ // confirm that we can copy this item
+ if (swca_confirm_delete(query, clientTaskName, accessGroups, &result, &error) && result) {
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ CFRelease(result);
+ }
+ CFRelease(query);
+ }
+ break;
+ }
+ case swca_select_request_id:
+ {
+ CFArrayRef items = SecXPCDictionaryCopyArray(event, kSecXPCKeyQuery, &error);
+ secdebug("ipc", "swcagent: got swca_select_request_id, items: %@", items);
+ if (items) {
+ CFTypeRef result = NULL;
+ // select a dictionary from an input array of dictionaries
+ if (swca_select_item(items, clientTaskName, accessGroups, &result, &error) && result) {
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ CFRelease(result);
+ }
+ CFRelease(items);
+ }
+ break;
+ }
+ case swca_copy_pairs_request_id:
+ {
+ secdebug("ipc", "swcagent: got swca_copy_pairs_request_id");
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, gActiveArray, &error);
+ break;
+ }
+ case swca_set_selection_request_id:
+ {
+ CFDictionaryRef dict = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error);
+ secdebug("ipc", "swcagent: got swca_set_selection_request_id, dict: %@", dict);
+ if (dict) {
+ int32_t value = (int32_t) 1;
+ CFNumberRef number = CFNumberCreate(kCFAllocatorDefault, kCFNumberSInt32Type, &value);
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, number, &error);
+ CFReleaseSafe(number);
+ }
+ CFReleaseSafe(gActiveItem);
+ gActiveItem = dict;
+ break;
+ }
+ case swca_enabled_request_id:
+ {
+ // return Safari's password autofill enabled status
+ CFTypeRef result = (SWCAIsAutofillEnabled()) ? kCFBooleanTrue : kCFBooleanFalse;
+ SecXPCDictionarySetPList(replyMessage, kSecXPCKeyResult, result, &error);
+ }
+ default:
+ secdebug("ipc", "swcagent: got unsupported request id (%ld)", (long)operation);
+ break;
+ }
+ }
+ if (error)
+ {
+ if(SecErrorGetOSStatus(error) == errSecItemNotFound)
+ secdebug("ipc", "%@ %@ %@", clientTask, SWCAGetOperationDescription((enum SWCAXPCOperation)operation), error);
+ else
+ secerror("%@ %@ %@", clientTask, SWCAGetOperationDescription((enum SWCAXPCOperation)operation), error);
+
+ xpcError = SecCreateXPCObjectWithCFError(error);
+ xpc_dictionary_set_value(replyMessage, kSecXPCKeyError, xpcError);
+ } else if (replyMessage) {
+ secdebug("ipc", "%@ %@ responding %@", clientTask, SWCAGetOperationDescription((enum SWCAXPCOperation)operation), replyMessage);
+ }
+ } else {
+ SecCFCreateErrorWithFormat(kSecXPCErrorUnexpectedType, sSecXPCErrorDomain, NULL, &error, 0, CFSTR("Messages expect to be xpc dictionary, got: %@"), event);
+ secerror("%@: returning error: %@", clientTask, error);
+ xpcError = SecCreateXPCObjectWithCFError(error);
+ replyMessage = xpc_create_reply_with_format(event, "{%string: %value}", kSecXPCKeyError, xpcError);
+ }
+
+ if (replyMessage) {
+ xpc_connection_send_message(connection, replyMessage);
+ xpc_release(replyMessage);
+ }
+ if (xpcError) {
+ xpc_release(xpcError);
+ }
+ CFReleaseSafe(error);
+ CFReleaseSafe(accessGroups);
+ CFReleaseSafe(clientTaskName);
+}
+
+static void swca_xpc_init()
+{
+ secdebug("swcagent_xpc", "start");
+
+ xpc_connection_t listener = xpc_connection_create_mach_service(kSWCAXPCServiceName, NULL, XPC_CONNECTION_MACH_SERVICE_LISTENER);
+ if (!listener) {
+ seccritical("swcagent failed to register xpc listener, exiting");
+ abort();
+ }
+
+ xpc_connection_set_event_handler(listener, ^(xpc_object_t connection) {
+ if (xpc_get_type(connection) == XPC_TYPE_CONNECTION) {
+ xpc_connection_set_event_handler(connection, ^(xpc_object_t event) {
+ if (xpc_get_type(event) == XPC_TYPE_DICTIONARY) {
+ xpc_retain(connection);
+ xpc_retain(event);
+ dispatch_async(dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
+ swca_xpc_dictionary_handler(connection, event);
+ xpc_release(event);
+ xpc_release(connection);
+ });
+ }
+ });
+ xpc_connection_resume(connection);
+ }
+ });
+ xpc_connection_resume(listener);
+}
+
+int main(int argc, char *argv[])
+{
+ @autoreleasepool {
+ char *wait4debugger = getenv("WAIT4DEBUGGER");
+ if (wait4debugger && !strcasecmp("YES", wait4debugger)) {
+ seccritical("SIGSTOPing self, awaiting debugger");
+ kill(getpid(), SIGSTOP);
+ asl_log(NULL, NULL, ASL_LEVEL_CRIT,
+ "Again, for good luck (or bad debuggers)");
+ kill(getpid(), SIGSTOP);
+ }
+ swca_xpc_init();
+ dispatch_main();
+ }
+ return 0;
+}
+
+/* vi:set ts=4 sw=4 et: */