]> git.saurik.com Git - apple/security.git/blame - sec/Security/Regressions/secitem/si-30-keychain-upgrade.c
Security-55471.tar.gz
[apple/security.git] / sec / Security / Regressions / secitem / si-30-keychain-upgrade.c
CommitLineData
427c49bc
A
1/*
2 * si-30-keychain-upgrade.c
3 * Security
4 *
5 * Created by Michael Brouwer on 4/29/08.
6 * Copyright (c) 2008,2010 Apple Inc.. All Rights Reserved.
7 *
8 */
9
10#include <CoreFoundation/CoreFoundation.h>
11#include <Security/SecBase.h>
12#include <Security/SecItem.h>
13#include <Security/SecItemPriv.h>
14#include <Security/SecInternal.h>
15#include <utilities/SecCFWrappers.h>
16
17#include <stdlib.h>
18#include <sys/stat.h>
19#include <sqlite3.h>
20
21#include "Security_regressions.h"
22#include "SecItemServer.h"
23
24/* TODO: This test needs to be updated. It was originally created to test upgrades from DB prior to the introduction of versionning, circa 2008.
25 We don't support upgrading from that old of keychain, but this test should be upgraded to test upgrades from v5 to v6 keychain, or more current
26*/
27
28const char *create_db_sql =
29"BEGIN TRANSACTION;"
30"CREATE TABLE genp(cdat REAL,mdat REAL,desc BLOB,icmt BLOB,crtr INTEGER,type INTEGER,scrp INTEGER,labl BLOB,alis BLOB,invi INTEGER,nega INTEGER,cusi INTEGER,prot BLOB,acct BLOB NOT NULL DEFAULT '',svce BLOB NOT NULL DEFAULT '',gena BLOB,data BLOB,PRIMARY KEY(acct,svce));"
31"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'4087574952','EnhancedVoicemail',NULL,X'34F32095A0ED6F32637629114439CE38E6FF39ADB591E761D20ED23F9FACF639258DA4F12454FD4D0189C0D39AAA9227');"
32"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'TlalocNet','AirPort',NULL,X'52E24441994D93D18F344DDF6A7F1F6EC43A63BCEB5F89B02FEBEEAAE108BB4933EAE73A0FB615F693C70BCFBCF034BE74BDF0280ECBEB357EEFA3B7EF03060B');"
33"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'weasels','AirPort',NULL,X'3FAD49851913382FBC92C9EB90D90D82A74B1DABB5F726648898B2FA2FBA405AA0B9D95D9837BBFF0F9B7C29954973249AA066F9F8AA68D79552970C687A7DA6');"
34"CREATE TABLE inet(cdat REAL,mdat REAL,desc BLOB,icmt BLOB,crtr INTEGER,type INTEGER,scrp INTEGER,labl BLOB,alis BLOB,invi INTEGER,nega INTEGER,cusi INTEGER,prot BLOB,acct BLOB NOT NULL DEFAULT '',sdmn BLOB NOT NULL DEFAULT '',srvr BLOB NOT NULL DEFAULT '',ptcl INTEGER NOT NULL DEFAULT 0,atyp BLOB NOT NULL DEFAULT '',port INTEGER NOT NULL DEFAULT 0,path BLOB NOT NULL DEFAULT '',data BLOB,PRIMARY KEY(acct,sdmn,srvr,ptcl,atyp,port,path));"
35"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'mb.7766@gmail.com','','imap.gmail.com','imap','',143,'',X'0029D7AFBF0000E0E386C8654070569B2DF1D7DC2D641AA29223297EC9E8AD86ED91CA6DEE3D2DA0FABD8F05DE5A7AD4CC46B134A211472B6DE50595EACAC149');"
36"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'brouwer','','phonehome.apple.com','imap','',143,'',X'BB373BAE840427C5E1247540ADA559AB14DF3788906B786498A8E1CFF4B4C596634E4A4C7F9C55EA1B646163AFCDADA8');"
37"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'mb.7766@gmail.com','','smtp.gmail.com','smtp','',25,'',X'042C08A4AECD3957822F531A602734F07B89DABA3BA6629ECEFE10E264C12635F83EFBB1707C6B39FB20CCE0200D8997B690FBB0B92911BFE9B2D1E05B1CD5F5');"
38"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'brouwer','','phonehome.apple.com','smtp','',25,'',X'25B0775265ADC808B8AFB2F2602C44B13F5ECC1F04B1D5E6EAE1B803446F3A817CCF8401416FE673CE366E25FACF5C55');"
39"CREATE TABLE cert(ctyp INTEGER NOT NULL DEFAULT 0,cenc INTEGER,labl BLOB,alis BLOB,subj BLOB,issr BLOB NOT NULL DEFAULT '',slnr BLOB NOT NULL DEFAULT '',skid BLOB,pkhh BLOB,data BLOB,PRIMARY KEY(ctyp,issr,slnr));"
40"CREATE TABLE keys(kcls INTEGER NOT NULL DEFAULT 0,labl BLOB,alis BLOB,perm INTEGER,priv INTEGER,modi INTEGER,klbl BLOB NOT NULL DEFAULT '',atag BLOB NOT NULL DEFAULT '',crtr INTEGER NOT NULL DEFAULT 0,type INTEGER NOT NULL DEFAULT 0,bsiz INTEGER NOT NULL DEFAULT 0,esiz INTEGER NOT NULL DEFAULT 0,sdat REAL NOT NULL DEFAULT 0,edat REAL NOT NULL DEFAULT 0,sens INTEGER,asen INTEGER,extr INTEGER,next INTEGER,encr INTEGER,decr INTEGER,drve INTEGER,sign INTEGER,vrfy INTEGER,snrc INTEGER,vyrc INTEGER,wrap INTEGER,unwp INTEGER,data BLOB,PRIMARY KEY(kcls,klbl,atag,crtr,type,bsiz,esiz,sdat,edat));"
41"CREATE INDEX ialis ON cert(alis);"
42"CREATE INDEX isubj ON cert(subj);"
43"CREATE INDEX iskid ON cert(skid);"
44"CREATE INDEX ipkhh ON cert(pkhh);"
45"CREATE INDEX ikcls ON keys(kcls);"
46"CREATE INDEX iklbl ON keys(klbl);"
47"CREATE INDEX iencr ON keys(encr);"
48"CREATE INDEX idecr ON keys(decr);"
49"CREATE INDEX idrve ON keys(drve);"
50"CREATE INDEX isign ON keys(sign);"
51"CREATE INDEX ivrfy ON keys(vrfy);"
52"CREATE INDEX iwrap ON keys(wrap);"
53"CREATE INDEX iunwp ON keys(unwp);"
54"COMMIT;";
55
56void kc_dbhandle_reset(void);
57
58#ifdef NO_SERVER
59static void ensureKeychainExists(void) {
60 CFDictionaryRef query = CFDictionaryCreateForCFTypes(0, kSecClass,kSecClassInternetPassword, NULL);
61 CFTypeRef results = NULL;
62 is_status(SecItemCopyMatching(query, &results), errSecItemNotFound, "expected nothing got %@", results);
63 CFReleaseNull(query);
64 CFReleaseNull(results);
65}
66#endif
67
68/* Test basic add delete update copy matching stuff. */
69static void tests(void)
70{
71#ifndef NO_SERVER
72 plan_skip_all("No testing against server.");
73#else
74 char *keychain_name;
75
76 ensureKeychainExists();
77
78 CFStringRef dbPath = __SecKeychainCopyPath();
79 keychain_name = CFStringToCString(dbPath);
80 CFRelease(dbPath);
81
82 /* delete the keychain file, and let sqllite recreate it */
83 ok_unix(unlink(keychain_name), "delete keychain file");
84
85 sqlite3 *db;
86 is(sqlite3_open(keychain_name, &db), SQLITE_OK, "create keychain");
87 is(sqlite3_exec(db, create_db_sql, NULL, NULL, NULL), SQLITE_OK,
88 "populate keychain");
89 free(keychain_name);
90
91 kc_dbhandle_reset();
92
93 int v_eighty = 80;
94 CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
95 const char *v_data = "test";
96 CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
97 CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
98 CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
99 CFDictionaryAddValue(query, kSecAttrServer, CFSTR("members.spamcop.net"));
100 CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
101 CFDictionaryAddValue(query, kSecAttrPort, eighty);
102 CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
103 CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
104 CFDictionaryAddValue(query, kSecValueData, pwdata);
105 ok_status(SecItemAdd(query, NULL), "add internet password");
106 is_status(SecItemAdd(query, NULL), errSecDuplicateItem,
107 "add internet password again");
108
109 ok_status(SecItemCopyMatching(query, NULL), "Found the item we added");
110
111 ok_status(SecItemDelete(query), "Deleted the item we added");
112
113 CFReleaseSafe(eighty);
114 CFReleaseSafe(pwdata);
115 CFReleaseSafe(query);
116#endif
117}
118
119int si_30_keychain_upgrade(int argc, char *const *argv)
120{
121 plan_tests(8);
122
123 tests();
124
125 return 0;
126}