X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/ecaf5866106b8f08bdb7c1b4f489ef4dfd01278a..7e6b461318c8a779d91381531435a68ee4e8b6ed:/OSX/libsecurity_keychain/lib/SecTrustSettings.cpp?ds=inline diff --git a/OSX/libsecurity_keychain/lib/SecTrustSettings.cpp b/OSX/libsecurity_keychain/lib/SecTrustSettings.cpp index a59873d6..f4ecc54e 100644 --- a/OSX/libsecurity_keychain/lib/SecTrustSettings.cpp +++ b/OSX/libsecurity_keychain/lib/SecTrustSettings.cpp @@ -27,9 +27,9 @@ */ #include "SecBridge.h" -#include "SecCertificatePriv.h" -#include "SecTrustSettings.h" -#include "SecTrustSettingsPriv.h" +#include +#include +#include #include "SecTrustSettingsCertificates.h" #include "SecCFRelease.h" #include "TrustSettingsUtils.h" @@ -303,6 +303,7 @@ static void tsRegisterCallback() static void tsTrustSettingsChanged() { tsPurgeCache(); + SecTrustSettingsPurgeUserAdminCertsCache(); /* The only interesting data is our pid */ NameValueDictionary nvd; @@ -846,6 +847,7 @@ OSStatus SecTrustSettingsCopyCertificates( OSStatus status; TrustSettings* ts; CFMutableArrayRef trustedCertArray = NULL; + SecTrustRef trust = NULL; status = TrustSettings::CreateTrustSettings(domain, CREATE_NO, TRIM_NO, ts); if (status != errSecSuccess) { @@ -892,7 +894,6 @@ OSStatus SecTrustSettingsCopyCertificates( SecPolicyRef policy = SecPolicyCreateBasicX509(); trustedCertArray = CFArrayCreateMutable(NULL, 0, &kCFTypeArrayCallBacks); for (i = 0; i < count ; i++) { - SecTrustRef trust; SecTrustResultType result; SecCertificateRef certificate = (SecCertificateRef) CFArrayGetValueAtIndex(outArray, i); status = SecTrustCreateWithCertificates(certificate, policy, &trust); @@ -908,6 +909,7 @@ OSStatus SecTrustSettingsCopyCertificates( if (result != kSecTrustResultFatalTrustFailure) { CFArrayAppendValue(trustedCertArray, certificate); } + CFReleaseNull(trust); } tsAddConditionalCerts(trustedCertArray); if (CFArrayGetCount(trustedCertArray) == 0) { @@ -925,16 +927,17 @@ out: CFReleaseSafe(outArray); CFReleaseSafe(trustedCertArray); } + CFReleaseNull(trust); return status; END_RCSAPI } static CFArrayRef gUserAdminCerts = NULL; static bool gUserAdminCertsCacheBuilt = false; -static ReadWriteLock gUserAdminCertsLock; +static ModuleNexus gUserAdminCertsLock; void SecTrustSettingsPurgeUserAdminCertsCache(void) { - StReadWriteLock _(gUserAdminCertsLock, StReadWriteLock::Write); + StReadWriteLock _(gUserAdminCertsLock(), StReadWriteLock::Write); CFReleaseNull(gUserAdminCerts); gUserAdminCertsCacheBuilt = false; } @@ -946,7 +949,7 @@ OSStatus SecTrustSettingsCopyCertificatesForUserAdminDomains( OSStatus result = errSecSuccess; { /* Hold the read lock for the check */ - StReadWriteLock _(gUserAdminCertsLock, StReadWriteLock::Read); + StReadWriteLock _(gUserAdminCertsLock(), StReadWriteLock::Read); if (gUserAdminCertsCacheBuilt) { if (gUserAdminCerts) { *certArray = (CFArrayRef)CFRetain(gUserAdminCerts); @@ -991,7 +994,7 @@ OSStatus SecTrustSettingsCopyCertificatesForUserAdminDomains( /* For valid results, update the global cache */ if (result == errSecSuccess || result == errSecNoTrustSettings) { - StReadWriteLock _(gUserAdminCertsLock, StReadWriteLock::Write); + StReadWriteLock _(gUserAdminCertsLock(), StReadWriteLock::Write); CFReleaseNull(gUserAdminCerts); gUserAdminCerts = (CFArrayRef)CFRetainSafe(outArray); gUserAdminCertsCacheBuilt = true;