secd-02-upgrade-while-locked.m [plain text]
/*
* Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
*
* @APPLE_LICENSE_HEADER_START@
*
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* compliance with the License. Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this
* file.
*
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
*
* @APPLE_LICENSE_HEADER_END@
*/
#include "secd_regressions.h"
#include <securityd/SecDbItem.h>
#include <utilities/array_size.h>
#include <utilities/SecCFWrappers.h>
#include <utilities/SecFileLocations.h>
#include <utilities/fileIo.h>
#include <securityd/SOSCloudCircleServer.h>
#include <securityd/SecItemServer.h>
#include <Security/SecBasePriv.h>
#include <TargetConditionals.h>
#include <AssertMacros.h>
#include <stdio.h>
#include <unistd.h>
#include <sys/stat.h>
#include <pthread.h>
#if TARGET_OS_IPHONE && USE_KEYSTORE
#include <libaks.h>
#include "SecdTestKeychainUtilities.h"
#include "ios6_1_keychain_2_db.h"
static OSStatus query_one(void)
{
OSStatus ok;
/* querying a password */
const void *keys[] = {
kSecClass,
kSecAttrAccessGroup,
};
const void *values[] = {
kSecClassGenericPassword,
CFSTR("test"),
};
CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
array_size(keys), NULL, NULL);
CFTypeRef results = NULL;
ok = SecItemCopyMatching(query, &results);
CFReleaseSafe(results);
CFReleaseSafe(query);
return ok;
}
static void *do_query(void *arg)
{
/* querying a password */
const void *keys[] = {
kSecClass,
kSecAttrAccessGroup,
};
const void *values[] = {
kSecClassGenericPassword,
CFSTR("test"),
};
CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
array_size(keys), NULL, NULL);
CFTypeRef results = NULL;
for(int i=0;i<20;i++)
verify_action(SecItemCopyMatching(query, &results)==errSecInteractionNotAllowed, CFReleaseSafe(query); return (void *)-1);
CFReleaseSafe(query);
return NULL;
}
static void *do_sos(void *arg)
{
for(int i=0;i<20;i++)
verify_action(SOSCCThisDeviceIsInCircle_Server(NULL)==-1, return (void *)-1);
return NULL;
}
#define N_THREADS 10
void SecAccessGroupsSetCurrent(CFArrayRef accessGroups);
CFArrayRef SecAccessGroupsGetCurrent(void);
int secd_02_upgrade_while_locked(int argc, char *const *argv)
{
plan_tests(11 + N_THREADS + kSecdTestSetupTestCount);
__block keybag_handle_t keybag;
__block keybag_state_t state;
char *passcode="password";
int passcode_len=(int)strlen(passcode);
/* custom keychain dir */
secd_test_setup_temp_keychain("secd_02_upgrade_while_locked", ^{
CFStringRef keychain_path_cf = __SecKeychainCopyPath();
CFStringPerformWithCString(keychain_path_cf, ^(const char *keychain_path) {
writeFile(keychain_path, ios6_1_keychain_2_db, ios6_1_keychain_2_db_len);
/* custom notification */
SecItemServerSetKeychainChangedNotification("com.apple.secdtests.keychainchanged");
/* Create and lock custom keybag */
ok(kIOReturnSuccess==aks_create_bag(passcode, passcode_len, kAppleKeyStoreDeviceBag, &keybag), "create keybag");
ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
ok(!(state&keybag_state_locked), "keybag unlocked");
SecItemServerSetKeychainKeybag(keybag);
/* lock */
ok(kIOReturnSuccess==aks_lock_bag(keybag), "lock keybag");
ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
ok(state&keybag_state_locked, "keybag locked");
});
CFReleaseSafe(keychain_path_cf);
});
CFArrayRef old_ag = SecAccessGroupsGetCurrent();
CFMutableArrayRef test_ag = CFArrayCreateMutableCopy(NULL, 0, old_ag);
CFArrayAppendValue(test_ag, CFSTR("test"));
SecAccessGroupsSetCurrent(test_ag);
pthread_t query_thread[N_THREADS];
pthread_t sos_thread;
void *query_err[N_THREADS] = {NULL,};
void *sos_err = NULL;
for(int i=0; i<N_THREADS; i++)
pthread_create(&query_thread[i], NULL, do_query, NULL);
pthread_create(&sos_thread, NULL, do_sos, NULL);
for(int i=0; i<N_THREADS; i++)
pthread_join(query_thread[i],&query_err[i]);
pthread_join(sos_thread, &sos_err);
for(int i=0; i<N_THREADS; i++)
ok(query_err[i]==NULL, "query thread ok");
ok(sos_err==NULL, "sos thread ok");
ok(kIOReturnSuccess==aks_unlock_bag(keybag, passcode, passcode_len), "lock keybag");
ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
ok(!(state&keybag_state_locked), "keybag unlocked");
is_status(query_one(), errSecItemNotFound, "Query after unlock");
/* Reset keybag */
SecItemServerResetKeychainKeybag();
// Reset server accessgroups.
SecAccessGroupsSetCurrent(old_ag);
CFReleaseSafe(test_ag);
return 0;
}
#else
int secd_02_upgrade_while_locked(int argc, char *const *argv)
{
plan_tests(1);
todo("Not yet working in simulator");
TODO: {
ok(false);
}
/* not implemented in simulator (no keybag) */
/* Not implemented in OSX (no upgrade scenario) */
return 0;
}
#endif