+++ /dev/null
-/*
- * si-33-keychain-backup.c
- * Security
- *
- * Created by Michael Brouwer on 1/30/10.
- * Copyright 2010 Apple Inc. All rights reserved.
- *
- */
-
-#include <TargetConditionals.h>
-
-#if TARGET_OS_EMBEDDED && !TARGET_IPHONE_SIMULATOR
-#define USE_KEYSTORE 1
-#else /* No AppleKeyStore.kext on this OS. */
-#define USE_KEYSTORE 0
-#endif
-
-
-#include <CoreFoundation/CoreFoundation.h>
-#include <Security/SecBase.h>
-#include <Security/SecItem.h>
-#include <Security/SecInternal.h>
-#include <Security/SecItemPriv.h>
-#include <utilities/array_size.h>
-
-#if USE_KEYSTORE
-#include <IOKit/IOKitLib.h>
-#include <Kernel/IOKit/crypto/AppleKeyStoreDefs.h>
-#endif
-
-#include <stdlib.h>
-#include <fcntl.h>
-#include <unistd.h>
-#include <sys/stat.h>
-#include <sqlite3.h>
-
-#include "Security_regressions.h"
-
-struct test_persistent_s {
- CFTypeRef persist[2];
- CFDictionaryRef query;
- CFDictionaryRef query1;
- CFDictionaryRef query2;
- CFMutableDictionaryRef query3;
- CFMutableDictionaryRef query4;
-};
-
-static void test_persistent(struct test_persistent_s *p)
-{
- int v_eighty = 80;
- CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
- const char *v_data = "test";
- CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
- const void *keys[] = {
- kSecClass,
- kSecAttrServer,
- kSecAttrAccount,
- kSecAttrPort,
- kSecAttrProtocol,
- kSecAttrAuthenticationType,
- kSecReturnPersistentRef,
- kSecValueData
- };
- const void *values[] = {
- kSecClassInternetPassword,
- CFSTR("zuigt.nl"),
- CFSTR("frtnbf"),
- eighty,
- CFSTR("http"),
- CFSTR("dflt"),
- kCFBooleanTrue,
- pwdata
- };
- CFDictionaryRef item = CFDictionaryCreate(NULL, keys, values,
- array_size(keys), &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
-
- p->persist[0] = NULL;
- ok_status(SecItemAdd(item, &p->persist[0]), "add internet password");
- CFTypeRef results = NULL;
- CFTypeRef results2 = NULL;
- SKIP: {
- skip("no persistent ref", 3, ok(p->persist[0], "got back persistent ref"));
-
- /* Create a dict with all attrs except the data. */
- keys[(array_size(keys)) - 2] = kSecReturnAttributes;
- p->query = CFDictionaryCreate(NULL, keys, values,
- (array_size(keys)) - 1, &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
- ok_status(SecItemCopyMatching(p->query, &results), "find internet password by attr");
-
- const void *keys_persist[] = {
- kSecReturnAttributes,
- kSecValuePersistentRef
- };
- const void *values_persist[] = {
- kCFBooleanTrue,
- p->persist[0]
- };
- p->query2 = CFDictionaryCreate(NULL, keys_persist, values_persist,
- (array_size(keys_persist)), &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
- ok_status(SecItemCopyMatching(p->query2, &results2), "find internet password by persistent ref");
- ok(CFEqual(results, results2 ? results2 : CFSTR("")), "same item (attributes)");
-
- CFReleaseNull(results);
- CFReleaseNull(results2);
- }
- ok_status(SecItemDelete(p->query), "delete internet password");
-
- ok_status(!SecItemCopyMatching(p->query, &results),
- "don't find internet password by attributes");
- ok(!results, "no results");
-
- /* clean up left over from aborted run */
- if (results) {
- CFDictionaryRef cleanup = CFDictionaryCreate(NULL, &kSecValuePersistentRef,
- &results, 1, &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
- SecItemDelete(cleanup);
- CFRelease(results);
- CFRelease(cleanup);
- }
-
- ok_status(!SecItemCopyMatching(p->query2, &results2),
- "don't find internet password by persistent ref anymore");
- ok(!results2, "no results");
-
- CFReleaseNull(p->persist[0]);
-
- /* Add a new item and get it's persitant ref. */
- ok_status(SecItemAdd(item, &p->persist[0]), "add internet password");
- p->persist[1] = NULL;
- CFMutableDictionaryRef item2 = CFDictionaryCreateMutableCopy(NULL, 0, item);
- CFDictionarySetValue(item2, kSecAttrAccount, CFSTR("johndoe-bu"));
- ok_status(SecItemAdd(item2, &p->persist[1]), "add second internet password");
- is(CFGetTypeID(p->persist[0]), CFDataGetTypeID(), "result is a CFData");
- p->query3 = CFDictionaryCreateMutable(NULL, 0, &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
- CFDictionaryAddValue(p->query3, kSecValuePersistentRef, p->persist[0]);
- CFMutableDictionaryRef update = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
- CFDictionaryAddValue(update, kSecAttrServer, CFSTR("zuigt.com"));
- ok_status(SecItemUpdate(p->query3, update), "update via persitant ref");
-
- /* Verify that the update really worked. */
- CFDictionaryAddValue(p->query3, kSecReturnAttributes, kCFBooleanTrue);
- ok_status(SecItemCopyMatching(p->query3, &results2), "find updated internet password by persistent ref");
- CFStringRef server = CFDictionaryGetValue(results2, kSecAttrServer);
- ok(CFEqual(server, CFSTR("zuigt.com")), "verify attribute was modified by update");
- CFReleaseNull(results2);
- CFDictionaryRemoveValue(p->query3, kSecReturnAttributes);
-
- /* Verify that item2 wasn't affected by the update. */
- p->query4 = CFDictionaryCreateMutable(NULL, 0, &kCFTypeDictionaryKeyCallBacks,
- &kCFTypeDictionaryValueCallBacks);
- CFDictionaryAddValue(p->query4, kSecValuePersistentRef, p->persist[1]);
- CFDictionaryAddValue(p->query4, kSecReturnAttributes, kCFBooleanTrue);
- ok_status(SecItemCopyMatching(p->query4, &results2), "find non updated internet password by persistent ref");
- server = CFDictionaryGetValue(results2, kSecAttrServer);
- ok(CFEqual(server, CFSTR("zuigt.nl")), "verify second items attribute was not modified by update");
- CFReleaseNull(results2);
-
- /* Delete the item via persitant ref. */
- ok_status(SecItemDelete(p->query3), "delete via persitant ref");
- is_status(SecItemCopyMatching(p->query3, &results2), errSecItemNotFound,
- "don't find deleted internet password by persistent ref");
- CFReleaseNull(results2);
- ok_status(SecItemCopyMatching(p->query4, &results2),
- "find non deleted internet password by persistent ref");
- CFReleaseNull(results2);
-
- CFRelease(update);
- CFReleaseNull(item);
- CFReleaseNull(item2);
- CFReleaseNull(eighty);
- CFReleaseNull(pwdata);
-}
-
-static void test_persistent2(struct test_persistent_s *p)
-{
- CFTypeRef results = NULL;
- CFTypeRef results2 = NULL;
-
- ok_status(!SecItemCopyMatching(p->query, &results),
- "don't find internet password by attributes");
- ok(!results, "no results");
-
- ok_status(!SecItemCopyMatching(p->query2, &results2),
- "don't find internet password by persistent ref anymore");
- ok(!results2, "no results");
-
- SKIP:{
- ok_status(SecItemCopyMatching(p->query4, &results2), "find non updated internet password by persistent ref");
- skip("non updated internet password by persistent ref NOT FOUND!", 2, results2);
- ok(results2, "non updated internet password not found");
- CFStringRef server = CFDictionaryGetValue(results2, kSecAttrServer);
- ok(CFEqual(server, CFSTR("zuigt.nl")), "verify second items attribute was not modified by update");
- CFReleaseNull(results2);
- }
-
- is_status(SecItemCopyMatching(p->query3, &results2), errSecItemNotFound,
- "don't find deleted internet password by persistent ref");
- CFReleaseNull(results2);
- ok_status(SecItemCopyMatching(p->query4, &results2),
- "find non deleted internet password by persistent ref");
- CFReleaseNull(results2);
-
- ok_status(SecItemDelete(p->query4),"Deleted internet password by persistent ref");
-
- CFRelease(p->query);
- CFRelease(p->query2);
- CFRelease(p->query3);
- CFRelease(p->query4);
- CFReleaseNull(p->persist[0]);
- CFReleaseNull(p->persist[1]);
-}
-
-static CFMutableDictionaryRef test_create_lockdown_identity_query(void) {
- CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
- CFDictionaryAddValue(query, kSecClass, kSecClassGenericPassword);
- CFDictionaryAddValue(query, kSecAttrAccessGroup, CFSTR("lockdown-identities"));
- return query;
-}
-
-static CFMutableDictionaryRef test_create_managedconfiguration_query(void) {
- CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
- CFDictionaryAddValue(query, kSecClass, kSecClassGenericPassword);
- CFDictionaryAddValue(query, kSecAttrService, CFSTR("com.apple.managedconfiguration"));
- CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("Public"));
- CFDictionaryAddValue(query, kSecAttrAccessGroup, CFSTR("apple"));
- return query;
-}
-
-static void test_add_lockdown_identity_items(void) {
- CFMutableDictionaryRef query = test_create_lockdown_identity_query();
- const char *v_data = "lockdown identity data (which should be a cert + key)";
- CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
- CFDictionaryAddValue(query, kSecValueData, pwdata);
- ok_status(SecItemAdd(query, NULL), "test_add_lockdown_identity_items");
- CFReleaseSafe(pwdata);
- CFReleaseSafe(query);
-}
-
-static void test_remove_lockdown_identity_items(void) {
- CFMutableDictionaryRef query = test_create_lockdown_identity_query();
- ok_status(SecItemDelete(query), "test_remove_lockdown_identity_items");
- CFReleaseSafe(query);
-}
-
-static void test_no_find_lockdown_identity_item(void) {
- CFMutableDictionaryRef query = test_create_lockdown_identity_query();
- is_status(SecItemCopyMatching(query, NULL), errSecItemNotFound,
- "test_no_find_lockdown_identity_item");
- CFReleaseSafe(query);
-}
-
-static void test_add_managedconfiguration_item(void) {
- CFMutableDictionaryRef query = test_create_managedconfiguration_query();
- const char *v_data = "public managedconfiguration password history data";
- CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
- CFDictionaryAddValue(query, kSecValueData, pwdata);
- ok_status(SecItemAdd(query, NULL), "test_add_managedconfiguration_item");
- CFReleaseSafe(pwdata);
- CFReleaseSafe(query);
-}
-
-static void test_find_managedconfiguration_item(void) {
- CFMutableDictionaryRef query = test_create_managedconfiguration_query();
- ok_status(SecItemCopyMatching(query, NULL), "test_find_managedconfiguration_item");
- ok_status(SecItemDelete(query), "test_find_managedconfiguration_item (deleted)");
- CFReleaseSafe(query);
-}
-
-#if USE_KEYSTORE
-static io_connect_t connect_to_keystore(void)
-{
- io_registry_entry_t apple_key_bag_service;
- kern_return_t result;
- io_connect_t keystore = MACH_PORT_NULL;
-
- apple_key_bag_service = IOServiceGetMatchingService(kIOMasterPortDefault,
- IOServiceMatching(kAppleKeyStoreServiceName));
-
- if (apple_key_bag_service == IO_OBJECT_NULL) {
- fprintf(stderr, "Failed to get service.\n");
- return keystore;
- }
-
- result = IOServiceOpen(apple_key_bag_service, mach_task_self(), 0, &keystore);
- if (KERN_SUCCESS != result)
- fprintf(stderr, "Failed to open keystore\n");
-
- if (keystore != MACH_PORT_NULL) {
- IOReturn kernResult = IOConnectCallMethod(keystore,
- kAppleKeyStoreUserClientOpen, NULL, 0, NULL, 0, NULL, NULL,
- NULL, NULL);
- if (kernResult) {
- fprintf(stderr, "Failed to open AppleKeyStore: %x\n", kernResult);
- }
- }
- return keystore;
-}
-
-static CFDataRef create_keybag(keybag_handle_t bag_type, CFDataRef password)
-{
- uint64_t inputs[] = { bag_type };
- uint64_t outputs[] = {0};
- uint32_t num_inputs = array_size(inputs);
- uint32_t num_outputs = array_size(outputs);
- IOReturn kernResult;
-
- io_connect_t keystore;
-
- unsigned char keybagdata[4096]; //Is that big enough?
- size_t keybagsize=sizeof(keybagdata);
-
- keystore=connect_to_keystore();
-
- kernResult = IOConnectCallMethod(keystore,
- kAppleKeyStoreKeyBagCreate,
- inputs, num_inputs, NULL, 0,
- outputs, &num_outputs, NULL, 0);
-
- if (kernResult) {
- fprintf(stderr, "kAppleKeyStoreKeyBagCreate: 0x%x\n", kernResult);
- return NULL;
- }
-
- /* Copy out keybag */
- inputs[0]=outputs[0];
- num_inputs=1;
-
- kernResult = IOConnectCallMethod(keystore,
- kAppleKeyStoreKeyBagCopy,
- inputs, num_inputs, NULL, 0,
- NULL, 0, keybagdata, &keybagsize);
-
- if (kernResult) {
- fprintf(stderr, "kAppleKeyStoreKeyBagCopy: 0x%x\n", kernResult);
- return NULL;
- }
-
- return CFDataCreate(kCFAllocatorDefault, keybagdata, keybagsize);
-}
-#endif
-
-/* Test low level keychain migration from device to device interface. */
-static void tests(void)
-{
- int v_eighty = 80;
- CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
- const char *v_data = "test";
- CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
- CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
- CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
- CFDictionaryAddValue(query, kSecAttrServer, CFSTR("members.spamcop.net"));
- CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
- CFDictionaryAddValue(query, kSecAttrPort, eighty);
- CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
- CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
- CFDictionaryAddValue(query, kSecValueData, pwdata);
- ok_status(SecItemAdd(query, NULL), "add internet password");
- is_status(SecItemAdd(query, NULL), errSecDuplicateItem,
- "add internet password again");
-
- ok_status(SecItemCopyMatching(query, NULL), "Found the item we added");
-
- struct test_persistent_s p = {};
- test_persistent(&p);
-
- CFDataRef backup = NULL, keybag = NULL, password = NULL;
-
- test_add_lockdown_identity_items();
-
-#if USE_KEYSTORE
- keybag = create_keybag(kAppleKeyStoreBackupBag, password);
-#else
- keybag = CFDataCreate(kCFAllocatorDefault, NULL, 0);
-#endif
-
- ok(backup = _SecKeychainCopyBackup(keybag, password),
- "_SecKeychainCopyBackup");
-
- test_add_managedconfiguration_item();
- test_remove_lockdown_identity_items();
-
- ok_status(_SecKeychainRestoreBackup(backup, keybag, password),
- "_SecKeychainRestoreBackup");
- CFReleaseSafe(backup);
-
- test_no_find_lockdown_identity_item();
- test_find_managedconfiguration_item();
-
- ok_status(SecItemCopyMatching(query, NULL),
- "Found the item we added after restore");
-
- test_persistent2(&p);
-
-#if USE_KEYSTORE
- CFReleaseNull(keybag);
- keybag = create_keybag(kAppleKeyStoreOTABackupBag, password);
-#endif
-
- ok(backup = _SecKeychainCopyBackup(keybag, password),
- "_SecKeychainCopyBackup");
- ok_status(_SecKeychainRestoreBackup(backup, keybag, password),
- "_SecKeychainRestoreBackup");
- ok_status(SecItemCopyMatching(query, NULL),
- "Found the item we added after restore");
- CFReleaseNull(backup);
-
- CFDictionaryAddValue(query, kSecUseTombstones, kCFBooleanTrue);
-
- ok_status(SecItemDelete(query), "Deleted item we added");
-
-#if USE_KEYSTORE
- CFReleaseNull(keybag);
- keybag = create_keybag(kAppleKeyStoreOTABackupBag /* use truthiness bag once it's there */, password);
-#endif
-
- // add syncable item
- CFDictionaryAddValue(query, kSecAttrSynchronizable, kCFBooleanTrue);
- ok_status(SecItemAdd(query, NULL), "add internet password");
-
- // and non-syncable item
- test_add_managedconfiguration_item();
-
- CFDictionaryRef syncableBackup = NULL;
-
- ok_status(_SecKeychainBackupSyncable(keybag, password, NULL, &syncableBackup), "export items");
-
- // TODO: add item, call SecServerCopyTruthInTheCloud again
-
- // CFShow(syncableBackup);
-
- // find and delete
- ok_status(SecItemCopyMatching(query, NULL), "find item we are about to destroy");
-
- ok_status(SecItemDelete(query), "delete item we backed up");
-
- // ensure we added a tombstone
- CFDictionaryAddValue(query, kSecAttrTombstone, kCFBooleanTrue);
- ok_status(SecItemCopyMatching(query, NULL), "find tombstone for item we deleted");
- CFDictionaryRemoveValue(query, kSecAttrTombstone);
-
- test_find_managedconfiguration_item();
-
- // TODO: add a different new item - delete what's not in the syncableBackup?
-
- // Do another backup after some changes
- CFDictionaryRef scratch = NULL;
- ok_status(_SecKeychainBackupSyncable(keybag, password, syncableBackup, &scratch), "export items after changes");
- CFReleaseNull(scratch);
-
- ok_status(_SecKeychainRestoreSyncable(keybag, password, syncableBackup), "import items");
-
- // non-syncable item should (still) be gone -> add should work
- test_add_managedconfiguration_item();
- test_find_managedconfiguration_item();
-
- // syncable item should have not been restored, because the tombstone was newer than the item in the backup -> copy matching should fail
- is_status(errSecItemNotFound, SecItemCopyMatching(query, NULL),
- "find restored item");
- is_status(errSecItemNotFound, SecItemDelete(query), "delete restored item");
-
- CFReleaseSafe(syncableBackup);
- CFReleaseSafe(keybag);
- CFReleaseSafe(eighty);
- CFReleaseSafe(pwdata);
- CFReleaseSafe(query);
-}
-
-int si_33_keychain_backup(int argc, char *const *argv)
-{
- plan_tests(62);
-
-
- tests();
-
- return 0;
-}