#ifndef _SYS_CODESIGN_H_
#define _SYS_CODESIGN_H_
-/* code signing attributes of a process */
-#define CS_VALID 0x0000001 /* dynamically valid */
-#define CS_ADHOC 0x0000002 /* ad hoc signed */
-
-#define CS_HARD 0x0000100 /* don't load invalid pages */
-#define CS_KILL 0x0000200 /* kill process if it becomes invalid */
-#define CS_CHECK_EXPIRATION 0x0000400 /* force expiration checking */
-#define CS_RESTRICT 0x0000800 /* tell dyld to treat restricted */
-#define CS_ENFORCEMENT 0x0001000 /* require enforcement */
-
-#define CS_ALLOWED_MACHO 0x00ffffe
-
-#define CS_EXEC_SET_HARD 0x0100000 /* set CS_HARD on any exec'ed process */
-#define CS_EXEC_SET_KILL 0x0200000 /* set CS_KILL on any exec'ed process */
-#define CS_EXEC_SET_ENFORCEMENT 0x0400000 /* set CS_ENFORCEMENT on any exec'ed process */
+#if KERNEL
+#include <kern/cs_blobs.h>
+#else
+#include <System/kern/cs_blobs.h>
+#endif
-#define CS_KILLED 0x1000000 /* was killed by kernel for invalidity */
+/* MAC flags used by F_ADDFILESIGS_* */
+#define MAC_VNODE_CHECK_DYLD_SIM 0x1 /* tells the MAC framework that dyld-sim is being loaded */
/* csops operations */
#define CS_OPS_STATUS 0 /* return status */
#define CS_OPS_SET_STATUS 9 /* set codesign flags */
#define CS_OPS_BLOB 10 /* get codesign blob */
#define CS_OPS_IDENTITY 11 /* get codesign identity */
+#define CS_OPS_CLEARINSTALLER 12 /* clear INSTALLER flag */
+#define CS_OPS_CLEARPLATFORM 13 /* clear platform binary status (DEVELOPMENT-only) */
-/* SigPUP */
-#define CS_OPS_SIGPUP_INSTALL 20
-#define CS_OPS_SIGPUP_DROP 21
-#define CS_OPS_SIGPUP_VALIDATE 22
-
-struct sigpup_install_table {
- uint64_t data;
- uint64_t length;
- uint64_t path;
-};
-
-
-/*
- * Magic numbers used by Code Signing
- */
-enum {
- CSMAGIC_REQUIREMENT = 0xfade0c00, /* single Requirement blob */
- CSMAGIC_REQUIREMENTS = 0xfade0c01, /* Requirements vector (internal requirements) */
- CSMAGIC_CODEDIRECTORY = 0xfade0c02, /* CodeDirectory blob */
- CSMAGIC_EMBEDDED_SIGNATURE = 0xfade0cc0, /* embedded form of signature data */
- CSMAGIC_EMBEDDED_SIGNATURE_OLD = 0xfade0b02, /* XXX */
- CSMAGIC_EMBEDDED_ENTITLEMENTS = 0xfade7171, /* embedded entitlements */
- CSMAGIC_DETACHED_SIGNATURE = 0xfade0cc1, /* multi-arch collection of embedded signatures */
- CSMAGIC_BLOBWRAPPER = 0xfade0b01, /* CMS Signature, among other things */
-
- CS_SUPPORTSSCATTER = 0x20100,
-
- CSSLOT_CODEDIRECTORY = 0, /* slot index for CodeDirectory */
- CSSLOT_INFOSLOT = 1,
- CSSLOT_REQUIREMENTS = 2,
- CSSLOT_RESOURCEDIR = 3,
- CSSLOT_APPLICATION = 4,
- CSSLOT_ENTITLEMENTS = 5,
-
- CSSLOT_SIGNATURESLOT = 0x10000, /* CMS Signature */
-
- CSTYPE_INDEX_REQUIREMENTS = 0x00000002, /* compat with amfi */
- CSTYPE_INDEX_ENTITLEMENTS = 0x00000005, /* compat with amfi */
-
- CS_HASHTYPE_SHA1 = 1
-};
-
-
-#define KERNEL_HAVE_CS_CODEDIRECTORY 1
-
-/*
- * C form of a CodeDirectory.
- */
-typedef struct __CodeDirectory {
- uint32_t magic; /* magic number (CSMAGIC_CODEDIRECTORY) */
- uint32_t length; /* total length of CodeDirectory blob */
- uint32_t version; /* compatibility version */
- uint32_t flags; /* setup and mode flags */
- uint32_t hashOffset; /* offset of hash slot element at index zero */
- uint32_t identOffset; /* offset of identifier string */
- uint32_t nSpecialSlots; /* number of special hash slots */
- uint32_t nCodeSlots; /* number of ordinary (code) hash slots */
- uint32_t codeLimit; /* limit to main image signature range */
- uint8_t hashSize; /* size of each hash in bytes */
- uint8_t hashType; /* type of hash (cdHashType* constants) */
- uint8_t spare1; /* unused (must be zero) */
- uint8_t pageSize; /* log2(page size in bytes); 0 => infinite */
- uint32_t spare2; /* unused (must be zero) */
- /* Version 0x20100 */
- uint32_t scatterOffset; /* offset of optional scatter vector */
- /* followed by dynamic content as located by offset fields above */
-} CS_CodeDirectory;
-
-/*
- * Structure of an embedded-signature SuperBlob
- */
-
-typedef struct __BlobIndex {
- uint32_t type; /* type of entry */
- uint32_t offset; /* offset of entry */
-} CS_BlobIndex;
-
-typedef struct __SC_SuperBlob {
- uint32_t magic; /* magic number */
- uint32_t length; /* total length of SuperBlob */
- uint32_t count; /* number of index entries following */
- CS_BlobIndex index[]; /* (count) entries */
- /* followed by Blobs in no particular order as indicated by offsets in index */
-} CS_SuperBlob;
-
-typedef struct __SC_GenericBlob {
- uint32_t magic; /* magic number */
- uint32_t length; /* total length of blob */
- char data[];
-} CS_GenericBlob;
-
-typedef struct __SC_Scatter {
- uint32_t count; // number of pages; zero for sentinel (only)
- uint32_t base; // first page number
- uint64_t targetOffset; // offset in target
- uint64_t spare; // reserved
-} SC_Scatter;
-
+#define CS_MAX_TEAMID_LEN 64
#ifndef KERNEL
#include <sys/types.h>
+#include <mach/message.h>
__BEGIN_DECLS
/* code sign operations */
#else /* !KERNEL */
+#include <mach/vm_types.h>
+
#include <sys/cdefs.h>
+#include <sys/_types/_off_t.h>
struct vnode;
-
-struct cscsr_functions {
- int csr_version;
-#define CSCSR_VERSION 1
- int (*csr_validate_header)(const uint8_t *, size_t);
- const void* (*csr_find_file_codedirectory)(struct vnode *, const uint8_t *, size_t, size_t *);
-};
+struct cs_blob;
+struct fileglob;
__BEGIN_DECLS
+int cs_valid(struct proc *);
int cs_enforcement(struct proc *);
-int cs_entitlements_blob_get(struct proc *, void **out_start, size_t *out_length);
+int cs_require_lv(struct proc *);
+int cs_system_require_lv(void);
+uint32_t cs_entitlement_flags(struct proc *p);
+int cs_entitlements_blob_get(struct proc *, void **, size_t *);
+int cs_restricted(struct proc *);
uint8_t * cs_get_cdhash(struct proc *);
-void cs_register_cscsr(struct cscsr_functions *);
-__END_DECLS
+struct cs_blob * csproc_get_blob(struct proc *);
+struct cs_blob * csvnode_get_blob(struct vnode *, off_t);
+void csvnode_print_debug(struct vnode *);
+
+off_t csblob_get_base_offset(struct cs_blob *);
+vm_size_t csblob_get_size(struct cs_blob *);
+vm_address_t csblob_get_addr(struct cs_blob *);
+const char * csblob_get_teamid(struct cs_blob *);
+const char * csblob_get_identity(struct cs_blob *);
+const uint8_t * csblob_get_cdhash(struct cs_blob *);
+int csblob_get_platform_binary(struct cs_blob *);
+unsigned int csblob_get_flags(struct cs_blob *);
+uint8_t csblob_get_hashtype(struct cs_blob const *);
+unsigned int csblob_get_signer_type(struct cs_blob *);
+#if DEVELOPMENT || DEBUG
+void csproc_clear_platform_binary(struct proc *);
+#endif
+
+int csblob_get_entitlements(struct cs_blob *, void **, size_t *);
+
+const CS_GenericBlob *
+ csblob_find_blob(struct cs_blob *, uint32_t, uint32_t);
+const CS_GenericBlob *
+ csblob_find_blob_bytes(const uint8_t *, size_t, uint32_t, uint32_t);
+void * csblob_entitlements_dictionary_copy(struct cs_blob *csblob);
+void csblob_entitlements_dictionary_set(struct cs_blob *csblob, void * entitlements);
+
+/*
+ * Mostly convenience functions below
+ */
+
+const char * csproc_get_teamid(struct proc *);
+const char * csvnode_get_teamid(struct vnode *, off_t);
+int csproc_get_platform_binary(struct proc *);
+int csproc_get_prod_signed(struct proc *);
+const char * csfg_get_teamid(struct fileglob *);
+int csfg_get_path(struct fileglob *, char *, int *);
+int csfg_get_platform_binary(struct fileglob *);
+uint8_t * csfg_get_cdhash(struct fileglob *, uint64_t, size_t *);
+int csfg_get_prod_signed(struct fileglob *);
+unsigned int csfg_get_signer_type(struct fileglob *);
+unsigned int csproc_get_signer_type(struct proc *);
+
+extern int cs_debug;
#ifdef XNU_KERNEL_PRIVATE
void cs_init(void);
int cs_allow_invalid(struct proc *);
-int cs_invalid_page(addr64_t);
-int sigpup_install(user_addr_t);
-int sigpup_drop(void);
+int cs_invalid_page(addr64_t vaddr, boolean_t *cs_killed);
+int csproc_get_platform_path(struct proc *);
-extern int cs_debug;
-extern int cs_validation;
#if !SECURE_KERNEL
extern int cs_enforcement_panic;
#endif
#endif /* XNU_KERNEL_PRIVATE */
+
+__END_DECLS
+
+
+
#endif /* KERNEL */
#endif /* _SYS_CODESIGN_H_ */