]> git.saurik.com Git - apple/security.git/blobdiff - SecurityTool/sharedTool/KeychainCheck.m
Security-59306.11.20.tar.gz
[apple/security.git] / SecurityTool / sharedTool / KeychainCheck.m
diff --git a/SecurityTool/sharedTool/KeychainCheck.m b/SecurityTool/sharedTool/KeychainCheck.m
new file mode 100644 (file)
index 0000000..724082b
--- /dev/null
@@ -0,0 +1,151 @@
+/*
+ * Copyright (c) 2017 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ *
+ */
+
+#import "KeychainCheck.h"
+#import "SFKeychainControl.h"
+#import "builtin_commands.h"
+#import "SOSControlHelper.h"
+#import "SOSTypes.h"
+#import "CKKSControlProtocol.h"
+#import <Security/SecItemPriv.h>
+#import <Foundation/NSXPCConnection_Private.h>
+
+@interface KeychainCheck ()
+
+- (void)checkKeychain;
+- (void)cleanKeychain;
+
+@end
+
+@implementation KeychainCheck {
+    NSXPCConnection* _connection;
+}
+
+- (instancetype)initWithEndpoint:(xpc_endpoint_t)endpoint
+{
+    if (self = [super init]) {
+        NSXPCListenerEndpoint* listenerEndpoint = [[NSXPCListenerEndpoint alloc] init];
+        [listenerEndpoint _setEndpoint:endpoint];
+        _connection = [[NSXPCConnection alloc] initWithListenerEndpoint:listenerEndpoint];
+        if (!_connection) {
+            return  nil;
+        }
+
+        NSXPCInterface* interface = [NSXPCInterface interfaceWithProtocol:@protocol(SFKeychainControl)];
+        _connection.remoteObjectInterface = interface;
+        [_connection resume];
+    }
+
+    return self;
+}
+
+- (void)checkKeychain
+{
+    dispatch_semaphore_t semaphore = dispatch_semaphore_create(0);
+    [[_connection remoteObjectProxyWithErrorHandler:^(NSError* error) {
+        NSLog(@"failed to communicate with server with error: %@", error);
+        dispatch_semaphore_signal(semaphore);
+    }] rpcFindCorruptedItemsWithReply:^(NSArray* corruptedItems, NSError* error) {
+        if (error) {
+            NSLog(@"error searching keychain: %@", error.localizedDescription);
+        }
+
+        if (corruptedItems.count > 0) {
+            NSLog(@"found %d corrupted items", (int)corruptedItems.count);
+        }
+        else {
+            NSLog(@"no corrupted items found");
+        }
+
+        dispatch_semaphore_signal(semaphore);
+    }];
+
+    if (dispatch_semaphore_wait(semaphore, DISPATCH_TIME_FOREVER)) {
+        NSLog(@"timed out trying to communicate with server");
+    }
+}
+
+- (void)cleanKeychain
+{
+    dispatch_semaphore_t semaphore = dispatch_semaphore_create(0);
+    [[_connection remoteObjectProxyWithErrorHandler:^(NSError* error) {
+        NSLog(@"failed to communicate with server with error: %@", error);
+        dispatch_semaphore_signal(semaphore);
+    }] rpcDeleteCorruptedItemsWithReply:^(bool success, NSError* error) {
+        if (success) {
+            NSLog(@"successfully cleaned keychain");
+        }
+        else {
+            NSLog(@"error attempting to clean keychain: %@", error);
+        }
+
+        dispatch_semaphore_signal(semaphore);
+    }];
+
+    if (dispatch_semaphore_wait(semaphore, DISPATCH_TIME_FOREVER)) {
+        NSLog(@"timed out trying to communicate with server");
+    }
+}
+
+@end
+
+int command_keychain_check(int argc, char* const* argv)
+{
+    KeychainCheck* keychainCheck = [[KeychainCheck alloc] initWithEndpoint:_SecSecuritydCopyKeychainControlEndpoint(NULL)];
+    [keychainCheck checkKeychain];
+    return 0;
+}
+
+int command_keychain_cleanup(int argc, char* const* argv)
+{
+    KeychainCheck* keychainCheck = [[KeychainCheck alloc] initWithEndpoint:_SecSecuritydCopyKeychainControlEndpoint(NULL)];
+    [keychainCheck cleanKeychain];
+    return 0;
+}
+
+int verify_backup_integrity(int argc, char * const *argv) {
+    int arg;
+    BOOL lightweight = NO;
+
+    while ((arg = getopt(argc, argv, "l")) != -1) {
+        switch(arg) {
+            case 'l':
+                lightweight = YES;
+                break;
+        }
+    }
+
+    NSLog(@"Running backup integrity validation in %@ mode", lightweight ? @"lightweight" : @"default");
+    dispatch_semaphore_t sema = dispatch_semaphore_create(0);
+    SecItemVerifyBackupIntegrity(lightweight, ^(NSDictionary* results, NSError *error) {
+        NSLog(@"%@", results);
+        dispatch_semaphore_signal(sema);
+    });
+
+    if (dispatch_semaphore_wait(sema, dispatch_time(DISPATCH_TIME_NOW, NSEC_PER_SEC * 30))) {
+        NSLog(@"Timed out waiting for backup integrity validation");
+    }
+
+    return 0;
+}