secd-36-ks-encrypt.m [plain text]
/*
* Copyright (c) 2016 Apple Inc. All Rights Reserved.
*
* @APPLE_LICENSE_HEADER_START@
*
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* compliance with the License. Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this
* file.
*
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
*
* @APPLE_LICENSE_HEADER_END@
*/
#include "secd_regressions.h"
#include <Security/Security.h>
#include <utilities/SecCFWrappers.h>
#include "SecDbKeychainItem.h"
#include <TargetConditionals.h>
#if USE_KEYSTORE
#include <libaks.h>
#include "SecdTestKeychainUtilities.h"
int secd_36_ks_encrypt(int argc, char *const *argv)
{
plan_tests(8);
secd_test_setup_temp_keychain("secd_36_ks_encrypt", NULL);
keybag_handle_t keybag;
keybag_state_t state;
CFDictionaryRef data = NULL;
CFDataRef enc = NULL;
CFErrorRef error = NULL;
SecAccessControlRef ac = NULL;
bool ret;
char passcode[] = "password";
int passcode_len = sizeof(passcode) - 1;
/* Create and lock custom keybag */
is(kIOReturnSuccess, aks_create_bag(passcode, passcode_len, kAppleKeyStoreDeviceBag, &keybag), "create keybag");
is(kIOReturnSuccess, aks_get_lock_state(keybag, &state), "get keybag state");
is(0, (int)(state&keybag_state_locked), "keybag unlocked");
data = (__bridge CFDictionaryRef)@{
(id)kSecValueData : @"secret here",
};
ok(ac = SecAccessControlCreate(NULL, &error), "SecAccessControlCreate: ok(SecAccessControlSetProtection(ac, kSecAttrAccessibleWhenUnlocked, &error), "SecAccessControlSetProtection:
ret = ks_encrypt_data(keybag, ac, NULL, data, (__bridge CFDictionaryRef)@{@"persistref" : @"aaa-bbb-ccc"}, NULL, &enc, true, &error);
is(true, ret);
CFReleaseNull(ac);
{
CFMutableDictionaryRef attributes = NULL;
uint32_t version = 0;
ret = ks_decrypt_data(keybag, kAKSKeyOpDecrypt, &ac, NULL, enc, NULL, NULL, &attributes, &version, true, NULL, &error);
is(true, ret, "ks_decrypt_data:
CFTypeRef aclProtection = ac ? SecAccessControlGetProtection(ac) : NULL;
ok(aclProtection && CFEqual(aclProtection, kSecAttrAccessibleWhenUnlocked), "AccessControl protection is:
CFReleaseNull(ac);
}
CFReleaseNull(error);
CFReleaseNull(enc);
return 0;
}
#else /* !USE_KEYSTORE */
int secd_36_ks_encrypt(int argc, char *const *argv)
{
plan_tests(1);
ok(true);
return 0;
}
#endif /* USE_KEYSTORE */