1/*
2 *  si-30-keychain-upgrade.c
3 *  Security
4 *
5 *  Created by Michael Brouwer on 4/29/08.
6 *  Copyright (c) 2008,2010 Apple Inc.. All Rights Reserved.
7 *
8 */
9
10#include <CoreFoundation/CoreFoundation.h>
11#include <Security/SecBase.h>
12#include <Security/SecItem.h>
13#include <Security/SecItemPriv.h>
14#include <Security/SecInternal.h>
15#include <utilities/SecCFWrappers.h>
16
17#include <stdlib.h>
18#include <sys/stat.h>
19#include <sqlite3.h>
20
21#include "Security_regressions.h"
22#include "SecItemServer.h"
23
24/* TODO: This test needs to be updated. It was originally created to test upgrades from DB prior to the introduction of versionning, circa 2008.
25   We don't support upgrading from that old of keychain, but this test should be upgraded to test upgrades from v5 to v6 keychain, or more current
26*/
27
28const char *create_db_sql =
29"BEGIN TRANSACTION;"
30"CREATE TABLE genp(cdat REAL,mdat REAL,desc BLOB,icmt BLOB,crtr INTEGER,type INTEGER,scrp INTEGER,labl BLOB,alis BLOB,invi INTEGER,nega INTEGER,cusi INTEGER,prot BLOB,acct BLOB NOT NULL DEFAULT '',svce BLOB NOT NULL DEFAULT '',gena BLOB,data BLOB,PRIMARY KEY(acct,svce));"
31"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'4087574952','EnhancedVoicemail',NULL,X'34F32095A0ED6F32637629114439CE38E6FF39ADB591E761D20ED23F9FACF639258DA4F12454FD4D0189C0D39AAA9227');"
32"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'TlalocNet','AirPort',NULL,X'52E24441994D93D18F344DDF6A7F1F6EC43A63BCEB5F89B02FEBEEAAE108BB4933EAE73A0FB615F693C70BCFBCF034BE74BDF0280ECBEB357EEFA3B7EF03060B');"
33"INSERT INTO \"genp\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'weasels','AirPort',NULL,X'3FAD49851913382FBC92C9EB90D90D82A74B1DABB5F726648898B2FA2FBA405AA0B9D95D9837BBFF0F9B7C29954973249AA066F9F8AA68D79552970C687A7DA6');"
34"CREATE TABLE inet(cdat REAL,mdat REAL,desc BLOB,icmt BLOB,crtr INTEGER,type INTEGER,scrp INTEGER,labl BLOB,alis BLOB,invi INTEGER,nega INTEGER,cusi INTEGER,prot BLOB,acct BLOB NOT NULL DEFAULT '',sdmn BLOB NOT NULL DEFAULT '',srvr BLOB NOT NULL DEFAULT '',ptcl INTEGER NOT NULL DEFAULT 0,atyp BLOB NOT NULL DEFAULT '',port INTEGER NOT NULL DEFAULT 0,path BLOB NOT NULL DEFAULT '',data BLOB,PRIMARY KEY(acct,sdmn,srvr,ptcl,atyp,port,path));"
35"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'mb.7766@gmail.com','','imap.gmail.com','imap','',143,'',X'0029D7AFBF0000E0E386C8654070569B2DF1D7DC2D641AA29223297EC9E8AD86ED91CA6DEE3D2DA0FABD8F05DE5A7AD4CC46B134A211472B6DE50595EACAC149');"
36"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'brouwer','','phonehome.apple.com','imap','',143,'',X'BB373BAE840427C5E1247540ADA559AB14DF3788906B786498A8E1CFF4B4C596634E4A4C7F9C55EA1B646163AFCDADA8');"
37"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'mb.7766@gmail.com','','smtp.gmail.com','smtp','',25,'',X'042C08A4AECD3957822F531A602734F07B89DABA3BA6629ECEFE10E264C12635F83EFBB1707C6B39FB20CCE0200D8997B690FBB0B92911BFE9B2D1E05B1CD5F5');"
38"INSERT INTO \"inet\" VALUES(NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,'brouwer','','phonehome.apple.com','smtp','',25,'',X'25B0775265ADC808B8AFB2F2602C44B13F5ECC1F04B1D5E6EAE1B803446F3A817CCF8401416FE673CE366E25FACF5C55');"
39"CREATE TABLE cert(ctyp INTEGER NOT NULL DEFAULT 0,cenc INTEGER,labl BLOB,alis BLOB,subj BLOB,issr BLOB NOT NULL DEFAULT '',slnr BLOB NOT NULL DEFAULT '',skid BLOB,pkhh BLOB,data BLOB,PRIMARY KEY(ctyp,issr,slnr));"
40"CREATE TABLE keys(kcls INTEGER NOT NULL DEFAULT 0,labl BLOB,alis BLOB,perm INTEGER,priv INTEGER,modi INTEGER,klbl BLOB NOT NULL DEFAULT '',atag BLOB NOT NULL DEFAULT '',crtr INTEGER NOT NULL DEFAULT 0,type INTEGER NOT NULL DEFAULT 0,bsiz INTEGER NOT NULL DEFAULT 0,esiz INTEGER NOT NULL DEFAULT 0,sdat REAL NOT NULL DEFAULT 0,edat REAL NOT NULL DEFAULT 0,sens INTEGER,asen INTEGER,extr INTEGER,next INTEGER,encr INTEGER,decr INTEGER,drve INTEGER,sign INTEGER,vrfy INTEGER,snrc INTEGER,vyrc INTEGER,wrap INTEGER,unwp INTEGER,data BLOB,PRIMARY KEY(kcls,klbl,atag,crtr,type,bsiz,esiz,sdat,edat));"
41"CREATE INDEX ialis ON cert(alis);"
42"CREATE INDEX isubj ON cert(subj);"
43"CREATE INDEX iskid ON cert(skid);"
44"CREATE INDEX ipkhh ON cert(pkhh);"
45"CREATE INDEX ikcls ON keys(kcls);"
46"CREATE INDEX iklbl ON keys(klbl);"
47"CREATE INDEX iencr ON keys(encr);"
48"CREATE INDEX idecr ON keys(decr);"
49"CREATE INDEX idrve ON keys(drve);"
50"CREATE INDEX isign ON keys(sign);"
51"CREATE INDEX ivrfy ON keys(vrfy);"
52"CREATE INDEX iwrap ON keys(wrap);"
53"CREATE INDEX iunwp ON keys(unwp);"
54"COMMIT;";
55
56void kc_dbhandle_reset(void);
57
58#ifdef NO_SERVER
59static void ensureKeychainExists(void) {
60    CFDictionaryRef query = CFDictionaryCreateForCFTypes(0, kSecClass,kSecClassInternetPassword, NULL);
61    CFTypeRef results = NULL;
62    is_status(SecItemCopyMatching(query, &results), errSecItemNotFound, "expected nothing got %@", results);
63    CFReleaseNull(query);
64    CFReleaseNull(results);
65}
66#endif
67
68/* Test basic add delete update copy matching stuff. */
69static void tests(void)
70{
71#ifndef NO_SERVER
72    plan_skip_all("No testing against server.");
73#else
74    char *keychain_name;
75
76    ensureKeychainExists();
77
78    CFStringRef dbPath = __SecKeychainCopyPath();
79    keychain_name = CFStringToCString(dbPath);
80    CFRelease(dbPath);
81
82    /* delete the keychain file, and let sqllite recreate it */
83    ok_unix(unlink(keychain_name), "delete keychain file");
84
85    sqlite3 *db;
86    is(sqlite3_open(keychain_name, &db), SQLITE_OK, "create keychain");
87    is(sqlite3_exec(db, create_db_sql, NULL, NULL, NULL), SQLITE_OK,
88        "populate keychain");
89    free(keychain_name);
90
91    kc_dbhandle_reset();
92
93    int v_eighty = 80;
94    CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
95    const char *v_data = "test";
96    CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
97    CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
98    CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
99    CFDictionaryAddValue(query, kSecAttrServer, CFSTR("members.spamcop.net"));
100    CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
101    CFDictionaryAddValue(query, kSecAttrPort, eighty);
102    CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
103    CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
104    CFDictionaryAddValue(query, kSecValueData, pwdata);
105    ok_status(SecItemAdd(query, NULL), "add internet password");
106    is_status(SecItemAdd(query, NULL), errSecDuplicateItem,
107	"add internet password again");
108
109    ok_status(SecItemCopyMatching(query, NULL), "Found the item we added");
110
111    ok_status(SecItemDelete(query), "Deleted the item we added");
112
113    CFReleaseSafe(eighty);
114    CFReleaseSafe(pwdata);
115    CFReleaseSafe(query);
116#endif
117}
118
119int si_30_keychain_upgrade(int argc, char *const *argv)
120{
121	plan_tests(8);
122
123	tests();
124
125	return 0;
126}
127