]> git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_keychain/regressions/si-33-keychain-backup.c
Security-57740.31.2.tar.gz
[apple/security.git] / OSX / libsecurity_keychain / regressions / si-33-keychain-backup.c
1 /*
2 * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 #include <CoreFoundation/CoreFoundation.h>
25 #include <TargetConditionals.h>
26 #include <stdio.h>
27
28 #include "keychain_regressions.h"
29 #include <Security/SecBase.h>
30 #include <Security/SecItem.h>
31 #include <Security/SecItemPriv.h>
32 #include <libaks.h>
33 #include <AssertMacros.h>
34
35 #define DATA_ARG(x) (x) ? CFDataGetBytePtr((x)) : NULL, (x) ? (int)CFDataGetLength((x)) : 0
36
37 static CFDataRef create_keybag(keybag_handle_t bag_type, CFDataRef password)
38 {
39 keybag_handle_t handle = bad_keybag_handle;
40
41 if (aks_create_bag(DATA_ARG(password), bag_type, &handle) == 0) {
42 void * keybag = NULL;
43 int keybag_size = 0;
44 if (aks_save_bag(handle, &keybag, &keybag_size) == 0) {
45 return CFDataCreate(kCFAllocatorDefault, keybag, keybag_size);
46 }
47 }
48
49 return CFDataCreate(kCFAllocatorDefault, NULL, 0);
50 }
51
52 /* Test low level keychain migration from device to device interface. */
53 static void tests(void)
54 {
55 int v_eighty = 80;
56 CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
57 const char *v_data = "test";
58 CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
59 CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
60 CFTypeRef result = NULL;
61 CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
62 CFDictionaryAddValue(query, kSecAttrServer, CFSTR("members.spamcop.net"));
63 CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
64 CFDictionaryAddValue(query, kSecAttrPort, eighty);
65 CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
66 CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
67 CFDictionaryAddValue(query, kSecValueData, pwdata);
68 CFDictionaryAddValue(query, kSecAttrSynchronizable, kCFBooleanTrue);
69
70 CFDataRef keybag = NULL;
71 const char *p = "sup3rsekretpassc0de";
72 CFDataRef password = CFDataCreate(NULL, (UInt8 *)p, strlen(p));
73
74 keybag = create_keybag(kAppleKeyStoreAsymmetricBackupBag, password);
75
76 SecItemDelete(query);
77
78 // add syncable item
79 ok_status(SecItemAdd(query, NULL), "add internet password");
80
81 ok_status(SecItemCopyMatching(query, &result), "find item we are about to destroy");
82 if (result) { CFRelease(result); result = NULL; }
83
84 CFDictionaryRef backup = NULL;
85
86 ok_status(_SecKeychainBackupSyncable(keybag, password, NULL, &backup), "export items");
87
88 ok_status(SecItemDelete(query), "delete item we backed up");
89 is_status(SecItemCopyMatching(query, &result), errSecItemNotFound, "find item we are about to destroy");
90 if (result) { CFRelease(result); result = NULL; }
91
92 ok_status(_SecKeychainRestoreSyncable(keybag, password, backup), "import items");
93
94 ok_status(SecItemCopyMatching(query, &result), "find restored item");
95 if (result) { CFRelease(result); result = NULL; }
96
97 ok_status(SecItemDelete(query), "delete restored item");
98
99 if (backup) { CFRelease(backup); }
100 if (password) { CFRelease(password); }
101 }
102
103 int si_33_keychain_backup(int argc, char *const *argv)
104 {
105 plan_tests(8);
106
107
108 tests();
109
110 return 0;
111 }