/* * Copyright (c) 2006-2013 Apple Inc. All Rights Reserved. * * @APPLE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this * file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_LICENSE_HEADER_END@ */ // // csutilities - miscellaneous utilities for the code signing implementation // // This is a collection of odds and ends that wouldn't fit anywhere else. // The common theme is that the contents are otherwise naturally homeless. // #ifndef _H_CSUTILITIES #define _H_CSUTILITIES #include #include #include #include #include #include #include namespace Security { namespace CodeSigning { // // Test for the canonical Apple CA certificate // bool isAppleCA(SecCertificateRef cert); bool isAppleCA(const Hashing::Byte *sha1); // // Calculate canonical hashes of certificate. // This is simply defined as (always) the SHA1 hash of the DER. // void hashOfCertificate(const void *certData, size_t certLength, SHA1::Digest digest); void hashOfCertificate(SecCertificateRef cert, SHA1::Digest digest); bool verifyHash(SecCertificateRef cert, const Hashing::Byte *digest); // // Calculate hashes of (a section of) a file. // Starts at the current file position. // Extends to end of file, or (if limit > 0) at most limit bytes. // Returns number of bytes digested. // template size_t hashFileData(UnixPlusPlus::FileDesc fd, _Hash *hasher, size_t limit = 0) { unsigned char buffer[4096]; size_t total = 0; for (;;) { size_t size = sizeof(buffer); if (limit && limit < size) size = limit; size_t got = fd.read(buffer, size); total += got; if (fd.atEnd()) break; hasher->update(buffer, got); if (limit && (limit -= got) == 0) break; } return total; } template size_t hashFileData(const char *path, _Hash *hasher) { UnixPlusPlus::AutoFileDesc fd(path); return hashFileData(fd, hasher); } // // Check to see if a certificate contains a particular field, by OID. This works for extensions, // even ones not recognized by the local CL. It does not return any value, only presence. // bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid); bool certificateHasPolicy(SecCertificateRef cert, const CSSM_OID &policyOid); // // Encapsulation of the copyfile(3) API. // This is slated to go into utilities once stable. // class Copyfile { public: Copyfile(); ~Copyfile() { copyfile_state_free(mState); } operator copyfile_state_t () const { return mState; } void set(uint32_t flag, const void *value); void get(uint32_t flag, void *value); void operator () (const char *src, const char *dst, copyfile_flags_t flags); private: void check(int rc); private: copyfile_state_t mState; }; // // MessageTracer support // class MessageTrace { public: MessageTrace(const char *domain, const char *signature); ~MessageTrace() { ::asl_free(mAsl); } void add(const char *key, const char *format, ...); void send(const char *format, ...); private: aslmsg mAsl; }; // // A reliable uid set/reset bracket // class UidGuard { public: UidGuard() : mPrevious(-1) { } UidGuard(uid_t uid) : mPrevious(-1) { seteuid(uid); } ~UidGuard() { if (active()) UnixError::check(::seteuid(mPrevious)); } bool seteuid(uid_t uid) { if (uid == geteuid()) return true; // no change, don't bother the kernel if (!active()) mPrevious = ::geteuid(); return ::seteuid(uid) == 0; } bool active() const { return mPrevious != uid_t(-1); } operator bool () const { return active(); } uid_t saved() const { assert(active()); return mPrevious; } private: uid_t mPrevious; }; } // end namespace CodeSigning } // end namespace Security #endif // !_H_CSUTILITIES