]> git.saurik.com Git - apple/security.git/blob - OSX/sec/SOSCircle/Regressions/sc-20-keynames.m
Security-58286.270.3.0.1.tar.gz
[apple/security.git] / OSX / sec / SOSCircle / Regressions / sc-20-keynames.m
1 /*
2 * Copyright (c) 2012-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24
25
26 #include <Security/SecBase.h>
27 #include <Security/SecItem.h>
28 #include <Security/SecKey.h>
29
30 #include <Security/SecureObjectSync/SOSAccount.h>
31 #include <Security/SecureObjectSync/SOSCircle.h>
32 #include <Security/SecureObjectSync/SOSPeerInfo.h>
33 #include <Security/SecureObjectSync/SOSInternal.h>
34 #include <Security/SecureObjectSync/SOSKVSKeys.h>
35 #include <utilities/SecCFWrappers.h>
36
37 #include <CoreFoundation/CoreFoundation.h>
38
39 #include <stdlib.h>
40 #include <unistd.h>
41
42 #include "SOSCircle_regressions.h"
43
44 #include "SOSRegressionUtilities.h"
45
46
47 static int kTestTestCount = 15;
48 static void tests(void)
49 {
50 SecKeyRef publicKey = NULL;
51 SecKeyRef octagonSigningPublicKey = NULL;
52 SecKeyRef octagonEncryptionPublicKey = NULL;
53
54 CFErrorRef error = NULL;
55
56 SOSCircleRef circle = SOSCircleCreate(NULL, CFSTR("Test Circle"), &error);
57
58 CFStringRef circle_key = SOSCircleKeyCreateWithCircle(circle, NULL);
59
60 CFStringRef circle_name = NULL;
61 ok(circle_key, "Circle key created");
62 is(SOSKVSKeyGetKeyType(circle_key), kCircleKey, "Is circle key");
63 is(SOSKVSKeyGetKeyTypeAndParse(circle_key, &circle_name, NULL, NULL, NULL, NULL, NULL), kCircleKey, "Is circle key, extract name");
64 ok(circle_name, "Circle name extracted");
65 ok(CFEqualSafe(circle_name, SOSCircleGetName(circle)), "Circle name matches '%@' '%@'", circle_name, SOSCircleGetName(circle));
66 CFReleaseNull(circle_name);
67 CFReleaseNull(circle_key);
68
69 SOSPeerInfoRef pi = SOSCreatePeerInfoFromName(CFSTR("Test Peer"), &publicKey, &octagonSigningPublicKey, &octagonEncryptionPublicKey, &error);
70
71 CFStringRef other_peer_id = CFSTR("OTHER PEER");
72
73 CFStringRef messageKey = SOSMessageKeyCreateWithCircleAndPeerNames(circle, SOSPeerInfoGetPeerID(pi), other_peer_id);
74
75 ok(messageKey, "Getting message key '%@'", messageKey);
76
77 CFStringRef message_circle_name = NULL;
78 CFStringRef message_from_peer_id = NULL;
79 CFStringRef message_to_peer_id = NULL;
80 CFStringRef message_ring = NULL;
81 CFStringRef message_peer_info = NULL;
82 CFStringRef message_backup = NULL;
83
84 is(SOSKVSKeyGetKeyType(messageKey), kMessageKey, "Is message key");
85 is(SOSKVSKeyGetKeyTypeAndParse(messageKey,
86 &message_circle_name,
87 &message_peer_info,
88 &message_ring,
89 &message_backup,
90 &message_from_peer_id,
91 &message_to_peer_id), kMessageKey, "Is message key, extract parts");
92
93
94 ok(CFEqualSafe(SOSCircleGetName(circle), message_circle_name), "circle key matches in message (%@ v %@)",SOSCircleGetName(circle), message_circle_name);
95
96
97 ok(CFEqualSafe(SOSPeerInfoGetPeerID(pi), message_from_peer_id), "from peer set correctly (%@ v %@)", SOSPeerInfoGetPeerID(pi), message_from_peer_id);
98
99 ok(CFEqualSafe(other_peer_id, message_to_peer_id), "to peer set correctly (%@ v %@)", other_peer_id, message_to_peer_id);
100
101 CFStringRef retirementKey = SOSRetirementKeyCreateWithCircleAndPeer(circle, SOSPeerInfoGetPeerID(pi));
102 CFStringRef retirement_circle_name = NULL;
103 CFStringRef retirement_peer_id = NULL;
104
105 is(SOSKVSKeyGetKeyType(retirementKey), kRetirementKey, "Is retirement key");
106 is(SOSKVSKeyGetKeyTypeAndParse(retirementKey,
107 &retirement_circle_name,
108 NULL,
109 NULL,
110 NULL,
111 &retirement_peer_id,
112 NULL), kRetirementKey, "Is retirement key, extract parts");
113 CFReleaseSafe(retirementKey);
114 ok(CFEqualSafe(SOSCircleGetName(circle), retirement_circle_name), "circle key matches in retirement (%@ v %@)",
115 SOSCircleGetName(circle), retirement_circle_name);
116 ok(CFEqualSafe(SOSPeerInfoGetPeerID(pi), retirement_peer_id), "retirement peer set correctly (%@ v %@)",
117 SOSPeerInfoGetPeerID(pi), retirement_peer_id);
118
119 CFReleaseNull(publicKey);
120 CFReleaseNull(octagonSigningPublicKey);
121 CFReleaseNull(octagonEncryptionPublicKey);
122 CFReleaseNull(circle);
123 CFReleaseNull(error);
124 CFReleaseNull(pi);
125 CFReleaseNull(messageKey);
126 CFReleaseNull(message_circle_name);
127 CFReleaseNull(message_from_peer_id);
128 CFReleaseNull(message_to_peer_id);
129 CFReleaseNull(retirement_circle_name);
130 CFReleaseNull(retirement_peer_id);
131
132 }
133
134 int sc_20_keynames(int argc, char *const *argv)
135 {
136 plan_tests(kTestTestCount);
137
138 tests();
139
140 return 0;
141 }