// // script0007 // // KCSetData // KCGetData // // Create & Add an Internet Password item a default Keychain, then modify the data // 35 KCNewItem Input Arguments : 4 Class : inet Creator : meme Data : /48/First Internet password:abcdefghijklmnopqrstuvwx Results : 2 OSStatus 0 ItemIndex : 0 3 KCMakeKCRefFromFSSpec Input Arguments : 1 KeychainFile : test0007.001 Results : 2 OSStatus 0 KeychainIndex : 0 14 KCCreateKeychain Input Arguments : 2 KeychainIndex : 0 Password : Apple Results : 2 OSStatus 0 KeychainIndex : 0 8 KCUnlock Input Arguments : 2 KeychainIndex : 0 Password : Apple Results : 1 OSStatus 0 13 KCSetDefaultKeychain Input Arguments : 1 KeychainIndex : 0 Results : 1 OSStatus 0 41 KCAddItem Input Arguments : 1 ItemIndex : 0 Results : 1 OSStatus 0 38 KCSetData Input Arguments : 2 ItemIndex : 0 Data : /6/Monkey Results : 1 OSStatus 0 45 KCUpdateItem Input Arguments : 1 ItemIndex : 0 Results : 1 OSStatus 0 // // THIS IS WRONG NOW - the rogueapp does come up and // // NOTE! We return errKCInvalid (soon to change to access denied) // We want to prohibit processes from accessing data that is cached in // memory that hasn't been written out. We want to stop the process // from bypassing our rogue-app/access control UI // 39 KCGetData Input Arguments : 2 ItemIndex : 0 Data : /6/000000 Results : 3 OSStatus 0 Data : /6/Monkey ActualLength : 6 46 KCReleaseItem Input Arguments : 1 ItemIndex : 0 Results : 1 OSStatus 0 6 KCReleaseKeychain Input Arguments : 2 KeychainIndex : 0 Results : 1 OSStatus 0