diff options
| author | 2013-09-06 05:52:49 +0200 | |
|---|---|---|
| committer | 2013-09-17 11:43:34 +0200 | |
| commit | e2f5717487f6950ff6253ccce6a967b0ad9ebbea (patch) | |
| tree | c62b8477bcb0d20a7b8ac4f4285686bcd31a5484 /src | |
| parent | f89e375e1334996591322cf6a454f9e121e423d2 (diff) | |
| download | libimobiledevice-e2f5717487f6950ff6253ccce6a967b0ad9ebbea.tar.gz libimobiledevice-e2f5717487f6950ff6253ccce6a967b0ad9ebbea.tar.bz2 | |
Make sure to re-use the DeviceCertificate instead of generating a new one every time
This prevented iTunes from using a pairing made by libimobiledevice giving an error
that the device sent invalid data.
Diffstat (limited to 'src')
| -rw-r--r-- | src/lockdown.c | 23 |
1 files changed, 15 insertions, 8 deletions
diff --git a/src/lockdown.c b/src/lockdown.c index c0ea645..2b0ab89 100644 --- a/src/lockdown.c +++ b/src/lockdown.c | |||
| @@ -890,7 +890,13 @@ static lockdownd_error_t generate_pair_record_plist(const char *udid, char* syst | |||
| 890 | key_data_t host_cert = { NULL, 0 }; | 890 | key_data_t host_cert = { NULL, 0 }; |
| 891 | key_data_t root_cert = { NULL, 0 }; | 891 | key_data_t root_cert = { NULL, 0 }; |
| 892 | 892 | ||
| 893 | ret = lockdownd_gen_pair_cert_for_udid(udid, public_key, &device_cert, &host_cert, &root_cert); | 893 | userpref_error_t uret = userpref_device_record_get_certs_as_pem(udid, &root_cert, &host_cert, &device_cert); |
| 894 | if ((uret == USERPREF_E_SUCCESS) && (root_cert.size > 0) && (host_cert.size > 0) && (device_cert.size > 0)) { | ||
| 895 | ret = LOCKDOWN_E_SUCCESS; | ||
| 896 | } | ||
| 897 | |||
| 898 | if (ret != LOCKDOWN_E_SUCCESS) | ||
| 899 | ret = lockdownd_gen_pair_cert_for_udid(udid, public_key, &device_cert, &host_cert, &root_cert); | ||
| 894 | if (ret != LOCKDOWN_E_SUCCESS) { | 900 | if (ret != LOCKDOWN_E_SUCCESS) { |
| 895 | return ret; | 901 | return ret; |
| 896 | } | 902 | } |
| @@ -1059,6 +1065,12 @@ static lockdownd_error_t lockdownd_do_pair(lockdownd_client_t client, lockdownd_ | |||
| 1059 | plist_free(escrow_bag); | 1065 | plist_free(escrow_bag); |
| 1060 | escrow_bag = NULL; | 1066 | escrow_bag = NULL; |
| 1061 | } | 1067 | } |
| 1068 | |||
| 1069 | /* store DeviceCertificate upon successful pairing */ | ||
| 1070 | plist_t devcrt = plist_dict_get_item(dict_record, USERPREF_DEVICE_CERTIFICATE_KEY); | ||
| 1071 | if (devcrt && plist_get_node_type(devcrt) == PLIST_DATA) { | ||
| 1072 | userpref_device_record_set_value(client->udid, USERPREF_DEVICE_CERTIFICATE_KEY, plist_copy(devcrt)); | ||
| 1073 | } | ||
| 1062 | } | 1074 | } |
| 1063 | } | 1075 | } |
| 1064 | } else { | 1076 | } else { |
| @@ -1366,7 +1378,7 @@ lockdownd_error_t lockdownd_gen_pair_cert_for_udid(const char *udid, key_data_t | |||
| 1366 | key_data_t pem_root_cert = { NULL, 0 }; | 1378 | key_data_t pem_root_cert = { NULL, 0 }; |
| 1367 | key_data_t pem_host_cert = { NULL, 0 }; | 1379 | key_data_t pem_host_cert = { NULL, 0 }; |
| 1368 | 1380 | ||
| 1369 | uret = userpref_device_record_get_certs_as_pem(udid, &pem_root_cert, &pem_host_cert); | 1381 | uret = userpref_device_record_get_certs_as_pem(udid, &pem_root_cert, &pem_host_cert, NULL); |
| 1370 | if (USERPREF_E_SUCCESS == uret) { | 1382 | if (USERPREF_E_SUCCESS == uret) { |
| 1371 | /* copy buffer for output */ | 1383 | /* copy buffer for output */ |
| 1372 | membp = BIO_new(BIO_s_mem()); | 1384 | membp = BIO_new(BIO_s_mem()); |
| @@ -1505,7 +1517,7 @@ lockdownd_error_t lockdownd_gen_pair_cert_for_udid(const char *udid, key_data_t | |||
| 1505 | gnutls_datum_t pem_root_cert = { NULL, 0 }; | 1517 | gnutls_datum_t pem_root_cert = { NULL, 0 }; |
| 1506 | gnutls_datum_t pem_host_cert = { NULL, 0 }; | 1518 | gnutls_datum_t pem_host_cert = { NULL, 0 }; |
| 1507 | 1519 | ||
| 1508 | uret = userpref_device_record_get_certs_as_pem(udid, &pem_root_cert, &pem_host_cert); | 1520 | uret = userpref_device_record_get_certs_as_pem(udid, &pem_root_cert, &pem_host_cert, NULL); |
| 1509 | 1521 | ||
| 1510 | if (USERPREF_E_SUCCESS == uret) { | 1522 | if (USERPREF_E_SUCCESS == uret) { |
| 1511 | /* copy buffer for output */ | 1523 | /* copy buffer for output */ |
| @@ -1560,11 +1572,6 @@ lockdownd_error_t lockdownd_gen_pair_cert_for_udid(const char *udid, key_data_t | |||
| 1560 | 1572 | ||
| 1561 | gnutls_free(der_pub_key.data); | 1573 | gnutls_free(der_pub_key.data); |
| 1562 | #endif | 1574 | #endif |
| 1563 | /* save device cert in config */ | ||
| 1564 | if (odevice_cert->size) { | ||
| 1565 | userpref_device_record_set_value(udid, USERPREF_DEVICE_CERTIFICATE_KEY, plist_new_data((char*)odevice_cert->data, (uint64_t)odevice_cert->size)); | ||
| 1566 | } | ||
| 1567 | |||
| 1568 | return ret; | 1575 | return ret; |
| 1569 | } | 1576 | } |
| 1570 | 1577 | ||
