]> git.saurik.com Git - apple/security.git/blob - OSX/sec/securityd/Regressions/secd-01-items.m
Security-58286.31.2.tar.gz
[apple/security.git] / OSX / sec / securityd / Regressions / secd-01-items.m
1 /*
2 * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24
25
26 #include "secd_regressions.h"
27
28 #include <securityd/SecDbItem.h>
29 #include <securityd/SecItemServer.h>
30
31 #include <utilities/array_size.h>
32 #include <utilities/SecFileLocations.h>
33
34 #include <unistd.h>
35
36 #include "SecdTestKeychainUtilities.h"
37
38 #if USE_KEYSTORE
39 #include <libaks.h>
40
41 int secd_01_items(int argc, char *const *argv)
42 {
43 plan_tests(24 + kSecdTestSetupTestCount);
44
45 secd_test_setup_testviews(); // if running all tests get the test views setup first
46 /* custom keychain dir */
47 secd_test_setup_temp_keychain("secd_01_items", NULL);
48
49 /* custom keybag */
50 keybag_handle_t keybag;
51 keybag_state_t state;
52 char *passcode="password";
53 int passcode_len=(int)strlen(passcode);
54
55 ok(kIOReturnSuccess==aks_create_bag(passcode, passcode_len, kAppleKeyStoreDeviceBag, &keybag), "create keybag");
56 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
57 ok(!(state&keybag_state_locked), "keybag unlocked");
58 SecItemServerSetKeychainKeybag(keybag);
59
60 /* lock */
61 ok(kIOReturnSuccess==aks_lock_bag(keybag), "lock keybag");
62 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
63 ok(state&keybag_state_locked, "keybag locked");
64
65
66 SecKeychainDbReset(NULL);
67
68 /* Creating a password */
69 int v_eighty = 80;
70 CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
71 const char *v_data = "test";
72 CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
73 const void *keys[] = {
74 kSecClass,
75 kSecAttrServer,
76 kSecAttrAccount,
77 kSecAttrPort,
78 kSecAttrProtocol,
79 kSecAttrAuthenticationType,
80 kSecValueData
81 };
82 const void *values[] = {
83 kSecClassInternetPassword,
84 CFSTR("members.spamcop.net"),
85 CFSTR("smith"),
86 eighty,
87 CFSTR("http"),
88 CFSTR("dflt"),
89 pwdata
90 };
91
92 CFDictionaryRef item = CFDictionaryCreate(NULL, keys, values,
93 array_size(keys), NULL, NULL);
94
95
96 is_status(SecItemAdd(item, NULL), errSecInteractionNotAllowed, "add internet password while locked");
97
98 /* unlock */
99 ok(kIOReturnSuccess==aks_unlock_bag(keybag, passcode, passcode_len), "unlock keybag");
100 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
101 ok(!(state&keybag_state_locked), "keybag unlocked");
102
103 ok_status(SecItemAdd(item, NULL), "add internet password, while unlocked");
104
105
106 /* lock */
107 ok(kIOReturnSuccess==aks_lock_bag(keybag), "lock keybag");
108 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
109 ok(state&keybag_state_locked, "keybag locked");
110
111 is_status(SecItemAdd(item, NULL), errSecInteractionNotAllowed,
112 "add internet password again, while locked");
113
114 /* unlock */
115 ok(kIOReturnSuccess==aks_unlock_bag(keybag, passcode, passcode_len), "unlock keybag");
116 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
117 ok(!(state&keybag_state_locked), "keybag unlocked");
118
119 is_status(SecItemAdd(item, NULL), errSecDuplicateItem,
120 "add internet password again, while unlocked");
121
122 CFTypeRef results = NULL;
123 /* Create a dict with all attrs except the data. */
124 CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
125 (array_size(keys)) - 1, NULL, NULL);
126 ok_status(SecItemCopyMatching(query, &results), "find internet password, while unlocked ");
127 if (results) {
128 CFRelease(results);
129 results = NULL;
130 }
131
132 /* lock */
133 ok(kIOReturnSuccess==aks_lock_bag(keybag), "lock keybag");
134 ok(kIOReturnSuccess==aks_get_lock_state(keybag, &state), "get keybag state");
135 ok(state&keybag_state_locked, "keybag locked");
136
137 is_status(SecItemCopyMatching(query, &results), errSecInteractionNotAllowed, "find internet password, while locked ");
138
139 /* Reset keybag and custom $HOME */
140 SecItemServerResetKeychainKeybag();
141 SetCustomHomePath(NULL);
142 SecKeychainDbReset(NULL);
143
144
145 CFReleaseNull(pwdata);
146 CFReleaseNull(eighty);
147 CFReleaseSafe(item);
148 CFReleaseSafe(query);
149
150 return 0;
151 }
152
153 #else
154
155 int secd_01_items(int argc, char *const *argv)
156 {
157 plan_tests(1);
158
159 todo("Not yet working in simulator");
160
161 TODO: {
162 ok(false);
163 }
164
165 /* not implemented in simulator (no keybag) */
166 return 0;
167 }
168 #endif
169