]> git.saurik.com Git - apple/security.git/blob - keychain/securityd/Regressions/secd-01-items.m
Security-59306.61.1.tar.gz
[apple/security.git] / keychain / securityd / Regressions / secd-01-items.m
1 /*
2 * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24
25
26 #include "secd_regressions.h"
27
28 #include "keychain/securityd/SecDbItem.h"
29 #include "keychain/securityd/SecItemServer.h"
30
31 #include <utilities/array_size.h>
32 #include <utilities/SecFileLocations.h>
33
34 #include <unistd.h>
35
36 #include "SecdTestKeychainUtilities.h"
37
38 #if USE_KEYSTORE
39 #include "OSX/utilities/SecAKSWrappers.h"
40
41 int secd_01_items(int argc, char *const *argv)
42 {
43 plan_tests(24 + kSecdTestSetupTestCount);
44
45 secd_test_setup_testviews(); // if running all tests get the test views setup first
46 /* custom keychain dir */
47 secd_test_setup_temp_keychain("secd_01_items", NULL);
48
49 /* custom keybag */
50 keybag_handle_t keybag;
51 keybag_state_t state;
52 char *passcode="password";
53 int passcode_len=(int)strlen(passcode);
54
55 ok(kAKSReturnSuccess==aks_create_bag(passcode, passcode_len, kAppleKeyStoreDeviceBag, &keybag), "create keybag");
56 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
57 ok(!(state&keybag_state_locked), "keybag unlocked");
58 SecItemServerSetKeychainKeybag(keybag);
59
60 /* lock */
61 ok(kAKSReturnSuccess==aks_lock_bag(keybag), "lock keybag");
62 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
63 ok(state&keybag_state_locked, "keybag locked");
64
65
66 SecKeychainDbReset(NULL);
67
68 /* Creating a password */
69 int v_eighty = 80;
70 CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
71 const char *v_data = "test";
72 CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
73 const void *keys[] = {
74 kSecClass,
75 kSecAttrServer,
76 kSecAttrAccount,
77 kSecAttrPort,
78 kSecAttrProtocol,
79 kSecAttrAuthenticationType,
80 kSecReturnData,
81 kSecValueData
82 };
83 const void *values[] = {
84 kSecClassInternetPassword,
85 CFSTR("members.spamcop.net"),
86 CFSTR("smith"),
87 eighty,
88 CFSTR("http"),
89 CFSTR("dflt"),
90 kCFBooleanTrue,
91 pwdata
92 };
93
94 CFDictionaryRef item = CFDictionaryCreate(NULL, keys, values,
95 array_size(keys), NULL, NULL);
96
97
98 is_status(SecItemAdd(item, NULL), errSecInteractionNotAllowed, "add internet password while locked");
99
100 /* unlock */
101 ok(kAKSReturnSuccess==aks_unlock_bag(keybag, passcode, passcode_len), "unlock keybag");
102 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
103 ok(!(state&keybag_state_locked), "keybag unlocked");
104
105 ok_status(SecItemAdd(item, NULL), "add internet password, while unlocked");
106
107
108 /* lock */
109 ok(kAKSReturnSuccess==aks_lock_bag(keybag), "lock keybag");
110 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
111 ok(state&keybag_state_locked, "keybag locked");
112
113 is_status(SecItemAdd(item, NULL), errSecInteractionNotAllowed,
114 "add internet password again, while locked");
115
116 /* unlock */
117 ok(kAKSReturnSuccess==aks_unlock_bag(keybag, passcode, passcode_len), "unlock keybag");
118 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
119 ok(!(state&keybag_state_locked), "keybag unlocked");
120
121 is_status(SecItemAdd(item, NULL), errSecDuplicateItem,
122 "add internet password again, while unlocked");
123
124 CFTypeRef results = NULL;
125 /* Create a dict with all attrs except the data. */
126 CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
127 (array_size(keys)) - 1, NULL, NULL);
128 ok_status(SecItemCopyMatching(query, &results), "find internet password, while unlocked ");
129 if (results) {
130 CFRelease(results);
131 results = NULL;
132 }
133
134 /* lock */
135 ok(kAKSReturnSuccess==aks_lock_bag(keybag), "lock keybag");
136 ok(kAKSReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
137 ok(state&keybag_state_locked, "keybag locked");
138
139 is_status(SecItemCopyMatching(query, &results), errSecInteractionNotAllowed, "find internet password, while locked ");
140
141 /* Reset keybag and custom $HOME */
142 SecItemServerResetKeychainKeybag();
143 SetCustomHomePath(NULL);
144 SecKeychainDbReset(NULL);
145
146
147 CFReleaseNull(pwdata);
148 CFReleaseNull(eighty);
149 CFReleaseSafe(item);
150 CFReleaseSafe(query);
151
152 return 0;
153 }
154
155 #else
156
157 int secd_01_items(int argc, char *const *argv)
158 {
159 plan_tests(1);
160
161 todo("Not yet working in simulator");
162
163 TODO: {
164 ok(false);
165 }
166
167 /* not implemented in simulator (no keybag) */
168 return 0;
169 }
170 #endif
171