kc-15-item-update-label-skimaad.m [plain text]
/*
* Copyright (c) 2016 Apple Inc. All Rights Reserved.
*
* @APPLE_LICENSE_HEADER_START@
*
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* compliance with the License. Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this
* file.
*
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the xLicense.
*
* @APPLE_LICENSE_HEADER_END@
*/
// <rdar://3425797>
#include "keychain_regressions.h"
#include "kc-helpers.h"
#include "kc-item-helpers.h"
#import <Foundation/Foundation.h>
#include <CoreFoundation/CoreFoundation.h>
#include <Security/Security.h>
#include <CoreServices/CoreServices.h>
//Call SecKeychainAddGenericPassword to add a new password to the keychain:
static OSStatus StorePasswordKeychain (SecKeychainRef keychain, void* password,UInt32 passwordLength)
{
OSStatus status;
status = SecKeychainAddGenericPassword (
keychain,
10, // length of service name
"SurfWriter", // service name
10, // length of account name
"MyUserAcct", // account name
passwordLength, // length of password
password, // pointer to password data
NULL // the item reference
);
ok_status(status, " return (status);
}
//Call SecKeychainFindGenericPassword to get a password from the keychain:
static OSStatus GetPasswordKeychain (SecKeychainRef keychain, void *passwordData,UInt32 *passwordLength,SecKeychainItemRef *itemRef)
{
OSStatus status;
status = SecKeychainFindGenericPassword (
keychain,
10, // length of service name
"SurfWriter", // service name
10, // length of account name
"MyUserAcct", // account name
passwordLength, // length of password
passwordData, // pointer to password data
itemRef // the item reference
);
ok_status(status, " return (status);
}
//Call SecKeychainItemModifyAttributesAndData to change the password for an item already in the keychain:
static OSStatus ChangePasswordKeychain (SecKeychainItemRef itemRef)
{
OSStatus status;
void * password = "myNewP4sSw0rD";
UInt32 passwordLength = (UInt32) strlen(password);
void * label = "New Item Label";
UInt32 labelLength = (UInt32) strlen(label);
NSString *account = @"New Account";
NSString *service = @"New Service";
const char *serviceUTF8 = [service UTF8String];
const char *accountUTF8 = [account UTF8String];
//// be changed later via SecKeychainItemModifyAttributesAndData(). ##### THIS IS A BUG. #####
// To work around the bug, pass 7 instead of kSecLabelItemAttr. This value is the index of the label
// attribute in the database schema (and in the SecItemAttr enumeration).
//
//#define LABEL_ITEM_ATTR_TAG 7
#define LABEL_ITEM_ATTR_TAG kSecLabelItemAttr
// set up attribute vector (each attribute consists of {tag, length, pointer})
SecKeychainAttribute attrs[] = {
{ LABEL_ITEM_ATTR_TAG, labelLength, (char *)label },
{ kSecAccountItemAttr, (UInt32) strlen(accountUTF8), (char *)accountUTF8 },
{ kSecServiceItemAttr, (UInt32) strlen(serviceUTF8), (char *)serviceUTF8 } };
const SecKeychainAttributeList attributes = { sizeof(attrs) / sizeof(attrs[0]), attrs };
status = SecKeychainItemModifyAttributesAndData (
itemRef, // the item reference
&attributes, // attributes to change
passwordLength, // length of password
password // pointer to password data
);
ok_status(status, " return (status);
}
int kc_15_item_update_label_skimaad(int argc, char *const *argv)
{
plan_tests(28);
initializeKeychainTests(__FUNCTION__);
SecKeychainRef keychain = getPopulatedTestKeychain();
OSStatus status;
void * myPassword = "myP4sSw0rD";
UInt32 myPasswordLength = (UInt32) strlen(myPassword);
void *passwordData = nil; // will be allocated and filled in by SecKeychainFindGenericPassword
UInt32 passwordLength = 0;
SecKeychainItemRef itemRef = nil;
StorePasswordKeychain(keychain, myPassword, myPasswordLength);
itemRef = checkNCopyFirst(testName, createQueryCustomItemDictionaryWithService(keychain, kSecClassGenericPassword, CFSTR("SurfWriter"), CFSTR("SurfWriter")), 1);
checkN(testName, createQueryCustomItemDictionaryWithService(keychain, kSecClassGenericPassword, CFSTR("New Item Label"), CFSTR("New Service")), 0);
readPasswordContents(itemRef, CFSTR("myP4sSw0rD"));
CFReleaseNull(itemRef);
GetPasswordKeychain (keychain, &passwordData,&passwordLength,&itemRef); //Call SecKeychainFindGenericPassword
ok(passwordData, "Recieved password data");
/*
free the data allocated by SecKeychainFindGenericPassword:
*/
status = SecKeychainItemFreeContent (
NULL, //No attribute data to release
passwordData //Release data buffer allocated by SecKeychainFindGenericPassword
);
ok_status(status, "
ChangePasswordKeychain(itemRef);
checkN(testName, createQueryCustomItemDictionaryWithService(keychain, kSecClassGenericPassword, CFSTR("SurfWriter"), CFSTR("SurfWriter")), 0);
itemRef = checkNCopyFirst(testName, createQueryCustomItemDictionaryWithService(keychain, kSecClassGenericPassword, CFSTR("New Item Label"), CFSTR("New Service")), 1);
readPasswordContents(itemRef, CFSTR("myNewP4sSw0rD"));
CFReleaseNull(itemRef);
checkPrompts(0, "no prompts during test");
ok_status(SecKeychainDelete(keychain), " CFReleaseNull(keychain);
deleteTestFiles();
return 0;
}