| Index: crypto/mock_apple_keychain_mac.cc
|
| diff --git a/crypto/mock_apple_keychain_mac.cc b/crypto/mock_apple_keychain_mac.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..5f33e5b20993256d50eb9c5c5540e2db0a9b4e9f
|
| --- /dev/null
|
| +++ b/crypto/mock_apple_keychain_mac.cc
|
| @@ -0,0 +1,519 @@
|
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/time/time.h"
|
| +#include "crypto/mock_apple_keychain.h"
|
| +
|
| +namespace crypto {
|
| +
|
| +// static
|
| +const SecKeychainSearchRef MockAppleKeychain::kDummySearchRef =
|
| + reinterpret_cast<SecKeychainSearchRef>(1000);
|
| +
|
| +MockAppleKeychain::MockAppleKeychain()
|
| + : locked_(false),
|
| + next_item_key_(0),
|
| + search_copy_count_(0),
|
| + keychain_item_copy_count_(0),
|
| + attribute_data_copy_count_(0),
|
| + find_generic_result_(noErr),
|
| + called_add_generic_(false),
|
| + password_data_count_(0) {}
|
| +
|
| +void MockAppleKeychain::InitializeKeychainData(MockKeychainItemType key) const {
|
| + UInt32 tags[] = { kSecAccountItemAttr,
|
| + kSecServerItemAttr,
|
| + kSecPortItemAttr,
|
| + kSecPathItemAttr,
|
| + kSecProtocolItemAttr,
|
| + kSecAuthenticationTypeItemAttr,
|
| + kSecSecurityDomainItemAttr,
|
| + kSecCreationDateItemAttr,
|
| + kSecNegativeItemAttr,
|
| + kSecCreatorItemAttr };
|
| + keychain_attr_list_[key] = SecKeychainAttributeList();
|
| + keychain_data_[key] = KeychainPasswordData();
|
| + keychain_attr_list_[key].count = arraysize(tags);
|
| + keychain_attr_list_[key].attr = static_cast<SecKeychainAttribute*>(
|
| + calloc(keychain_attr_list_[key].count, sizeof(SecKeychainAttribute)));
|
| + for (unsigned int i = 0; i < keychain_attr_list_[key].count; ++i) {
|
| + keychain_attr_list_[key].attr[i].tag = tags[i];
|
| + size_t data_size = 0;
|
| + switch (tags[i]) {
|
| + case kSecPortItemAttr:
|
| + data_size = sizeof(UInt32);
|
| + break;
|
| + case kSecProtocolItemAttr:
|
| + data_size = sizeof(SecProtocolType);
|
| + break;
|
| + case kSecAuthenticationTypeItemAttr:
|
| + data_size = sizeof(SecAuthenticationType);
|
| + break;
|
| + case kSecNegativeItemAttr:
|
| + data_size = sizeof(Boolean);
|
| + break;
|
| + case kSecCreatorItemAttr:
|
| + data_size = sizeof(OSType);
|
| + break;
|
| + }
|
| + if (data_size > 0) {
|
| + keychain_attr_list_[key].attr[i].length = data_size;
|
| + keychain_attr_list_[key].attr[i].data = calloc(1, data_size);
|
| + }
|
| + }
|
| +}
|
| +
|
| +MockAppleKeychain::~MockAppleKeychain() {
|
| + for (MockKeychainAttributesMap::iterator it = keychain_attr_list_.begin();
|
| + it != keychain_attr_list_.end();
|
| + ++it) {
|
| + for (unsigned int i = 0; i < it->second.count; ++i) {
|
| + if (it->second.attr[i].data)
|
| + free(it->second.attr[i].data);
|
| + }
|
| + free(it->second.attr);
|
| + if (keychain_data_[it->first].data)
|
| + free(keychain_data_[it->first].data);
|
| + }
|
| + keychain_attr_list_.clear();
|
| + keychain_data_.clear();
|
| +}
|
| +
|
| +SecKeychainAttribute* MockAppleKeychain::AttributeWithTag(
|
| + const SecKeychainAttributeList& attribute_list,
|
| + UInt32 tag) {
|
| + int attribute_index = -1;
|
| + for (unsigned int i = 0; i < attribute_list.count; ++i) {
|
| + if (attribute_list.attr[i].tag == tag) {
|
| + attribute_index = i;
|
| + break;
|
| + }
|
| + }
|
| + if (attribute_index == -1) {
|
| + NOTREACHED() << "Unsupported attribute: " << tag;
|
| + return NULL;
|
| + }
|
| + return &(attribute_list.attr[attribute_index]);
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataBytes(MockKeychainItemType item,
|
| + UInt32 tag,
|
| + const void* data,
|
| + size_t length) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
|
| + tag);
|
| + attribute->length = length;
|
| + if (length > 0) {
|
| + if (attribute->data)
|
| + free(attribute->data);
|
| + attribute->data = malloc(length);
|
| + CHECK(attribute->data);
|
| + memcpy(attribute->data, data, length);
|
| + } else {
|
| + attribute->data = NULL;
|
| + }
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataString(MockKeychainItemType item,
|
| + UInt32 tag,
|
| + const char* value) {
|
| + SetTestDataBytes(item, tag, value, value ? strlen(value) : 0);
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataPort(MockKeychainItemType item,
|
| + UInt32 value) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
|
| + kSecPortItemAttr);
|
| + UInt32* data = static_cast<UInt32*>(attribute->data);
|
| + *data = value;
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataProtocol(MockKeychainItemType item,
|
| + SecProtocolType value) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
|
| + kSecProtocolItemAttr);
|
| + SecProtocolType* data = static_cast<SecProtocolType*>(attribute->data);
|
| + *data = value;
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataAuthType(MockKeychainItemType item,
|
| + SecAuthenticationType value) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(
|
| + keychain_attr_list_[item], kSecAuthenticationTypeItemAttr);
|
| + SecAuthenticationType* data = static_cast<SecAuthenticationType*>(
|
| + attribute->data);
|
| + *data = value;
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataNegativeItem(MockKeychainItemType item,
|
| + Boolean value) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
|
| + kSecNegativeItemAttr);
|
| + Boolean* data = static_cast<Boolean*>(attribute->data);
|
| + *data = value;
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataCreator(MockKeychainItemType item,
|
| + OSType value) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
|
| + kSecCreatorItemAttr);
|
| + OSType* data = static_cast<OSType*>(attribute->data);
|
| + *data = value;
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataPasswordBytes(MockKeychainItemType item,
|
| + const void* data,
|
| + size_t length) {
|
| + keychain_data_[item].length = length;
|
| + if (length > 0) {
|
| + if (keychain_data_[item].data)
|
| + free(keychain_data_[item].data);
|
| + keychain_data_[item].data = malloc(length);
|
| + memcpy(keychain_data_[item].data, data, length);
|
| + } else {
|
| + keychain_data_[item].data = NULL;
|
| + }
|
| +}
|
| +
|
| +void MockAppleKeychain::SetTestDataPasswordString(MockKeychainItemType item,
|
| + const char* value) {
|
| + SetTestDataPasswordBytes(item, value, value ? strlen(value) : 0);
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::ItemCopyAttributesAndData(
|
| + SecKeychainItemRef itemRef,
|
| + SecKeychainAttributeInfo* info,
|
| + SecItemClass* itemClass,
|
| + SecKeychainAttributeList** attrList,
|
| + UInt32* length,
|
| + void** outData) const {
|
| + DCHECK(itemRef);
|
| + MockKeychainItemType key =
|
| + reinterpret_cast<MockKeychainItemType>(itemRef) - 1;
|
| + if (keychain_attr_list_.find(key) == keychain_attr_list_.end())
|
| + return errSecInvalidItemRef;
|
| +
|
| + DCHECK(!itemClass); // itemClass not implemented in the Mock.
|
| + if (locked_ && outData)
|
| + return errSecAuthFailed;
|
| +
|
| + if (attrList)
|
| + *attrList = &(keychain_attr_list_[key]);
|
| + if (outData) {
|
| + *outData = keychain_data_[key].data;
|
| + DCHECK(length);
|
| + *length = keychain_data_[key].length;
|
| + }
|
| +
|
| + ++attribute_data_copy_count_;
|
| + return noErr;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::ItemModifyAttributesAndData(
|
| + SecKeychainItemRef itemRef,
|
| + const SecKeychainAttributeList* attrList,
|
| + UInt32 length,
|
| + const void* data) const {
|
| + DCHECK(itemRef);
|
| + if (locked_)
|
| + return errSecAuthFailed;
|
| + const char* fail_trigger = "fail_me";
|
| + if (length == strlen(fail_trigger) &&
|
| + memcmp(data, fail_trigger, length) == 0) {
|
| + return errSecAuthFailed;
|
| + }
|
| +
|
| + MockKeychainItemType key =
|
| + reinterpret_cast<MockKeychainItemType>(itemRef) - 1;
|
| + if (keychain_attr_list_.find(key) == keychain_attr_list_.end())
|
| + return errSecInvalidItemRef;
|
| +
|
| + MockAppleKeychain* mutable_this = const_cast<MockAppleKeychain*>(this);
|
| + if (attrList) {
|
| + for (UInt32 change_attr = 0; change_attr < attrList->count; ++change_attr) {
|
| + if (attrList->attr[change_attr].tag == kSecCreatorItemAttr) {
|
| + void* data = attrList->attr[change_attr].data;
|
| + mutable_this->SetTestDataCreator(key, *(static_cast<OSType*>(data)));
|
| + } else {
|
| + NOTIMPLEMENTED();
|
| + }
|
| + }
|
| + }
|
| + if (data)
|
| + mutable_this->SetTestDataPasswordBytes(key, data, length);
|
| + return noErr;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::ItemFreeAttributesAndData(
|
| + SecKeychainAttributeList* attrList,
|
| + void* data) const {
|
| + --attribute_data_copy_count_;
|
| + return noErr;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::ItemDelete(SecKeychainItemRef itemRef) const {
|
| + if (locked_)
|
| + return errSecAuthFailed;
|
| + MockKeychainItemType key =
|
| + reinterpret_cast<MockKeychainItemType>(itemRef) - 1;
|
| +
|
| + for (unsigned int i = 0; i < keychain_attr_list_[key].count; ++i) {
|
| + if (keychain_attr_list_[key].attr[i].data)
|
| + free(keychain_attr_list_[key].attr[i].data);
|
| + }
|
| + free(keychain_attr_list_[key].attr);
|
| + if (keychain_data_[key].data)
|
| + free(keychain_data_[key].data);
|
| +
|
| + keychain_attr_list_.erase(key);
|
| + keychain_data_.erase(key);
|
| + added_via_api_.erase(key);
|
| + return noErr;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::SearchCreateFromAttributes(
|
| + CFTypeRef keychainOrArray,
|
| + SecItemClass itemClass,
|
| + const SecKeychainAttributeList* attrList,
|
| + SecKeychainSearchRef* searchRef) const {
|
| + // Figure out which of our mock items matches, and set up the array we'll use
|
| + // to generate results out of SearchCopyNext.
|
| + remaining_search_results_.clear();
|
| + for (MockKeychainAttributesMap::const_iterator it =
|
| + keychain_attr_list_.begin();
|
| + it != keychain_attr_list_.end();
|
| + ++it) {
|
| + bool mock_item_matches = true;
|
| + for (UInt32 search_attr = 0; search_attr < attrList->count; ++search_attr) {
|
| + SecKeychainAttribute* mock_attribute =
|
| + AttributeWithTag(it->second, attrList->attr[search_attr].tag);
|
| + if (mock_attribute->length != attrList->attr[search_attr].length ||
|
| + memcmp(mock_attribute->data, attrList->attr[search_attr].data,
|
| + attrList->attr[search_attr].length) != 0) {
|
| + mock_item_matches = false;
|
| + break;
|
| + }
|
| + }
|
| + if (mock_item_matches)
|
| + remaining_search_results_.push_back(it->first);
|
| + }
|
| +
|
| + DCHECK(searchRef);
|
| + *searchRef = kDummySearchRef;
|
| + ++search_copy_count_;
|
| + return noErr;
|
| +}
|
| +
|
| +bool MockAppleKeychain::AlreadyContainsInternetPassword(
|
| + UInt32 serverNameLength,
|
| + const char* serverName,
|
| + UInt32 securityDomainLength,
|
| + const char* securityDomain,
|
| + UInt32 accountNameLength,
|
| + const char* accountName,
|
| + UInt32 pathLength,
|
| + const char* path,
|
| + UInt16 port,
|
| + SecProtocolType protocol,
|
| + SecAuthenticationType authenticationType) const {
|
| + for (MockKeychainAttributesMap::const_iterator it =
|
| + keychain_attr_list_.begin();
|
| + it != keychain_attr_list_.end();
|
| + ++it) {
|
| + SecKeychainAttribute* attribute;
|
| + attribute = AttributeWithTag(it->second, kSecServerItemAttr);
|
| + if ((attribute->length != serverNameLength) ||
|
| + (attribute->data == NULL && *serverName != '\0') ||
|
| + (attribute->data != NULL && *serverName == '\0') ||
|
| + strncmp(serverName,
|
| + (const char*) attribute->data,
|
| + serverNameLength) != 0) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecSecurityDomainItemAttr);
|
| + if ((attribute->length != securityDomainLength) ||
|
| + (attribute->data == NULL && *securityDomain != '\0') ||
|
| + (attribute->data != NULL && *securityDomain == '\0') ||
|
| + strncmp(securityDomain,
|
| + (const char*) attribute->data,
|
| + securityDomainLength) != 0) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecAccountItemAttr);
|
| + if ((attribute->length != accountNameLength) ||
|
| + (attribute->data == NULL && *accountName != '\0') ||
|
| + (attribute->data != NULL && *accountName == '\0') ||
|
| + strncmp(accountName,
|
| + (const char*) attribute->data,
|
| + accountNameLength) != 0) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecPathItemAttr);
|
| + if ((attribute->length != pathLength) ||
|
| + (attribute->data == NULL && *path != '\0') ||
|
| + (attribute->data != NULL && *path == '\0') ||
|
| + strncmp(path,
|
| + (const char*) attribute->data,
|
| + pathLength) != 0) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecPortItemAttr);
|
| + if ((attribute->data == NULL) ||
|
| + (port != *(static_cast<UInt32*>(attribute->data)))) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecProtocolItemAttr);
|
| + if ((attribute->data == NULL) ||
|
| + (protocol != *(static_cast<SecProtocolType*>(attribute->data)))) {
|
| + continue;
|
| + }
|
| + attribute = AttributeWithTag(it->second, kSecAuthenticationTypeItemAttr);
|
| + if ((attribute->data == NULL) ||
|
| + (authenticationType !=
|
| + *(static_cast<SecAuthenticationType*>(attribute->data)))) {
|
| + continue;
|
| + }
|
| + // The keychain already has this item, since all fields other than the
|
| + // password match.
|
| + return true;
|
| + }
|
| + return false;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::AddInternetPassword(
|
| + SecKeychainRef keychain,
|
| + UInt32 serverNameLength,
|
| + const char* serverName,
|
| + UInt32 securityDomainLength,
|
| + const char* securityDomain,
|
| + UInt32 accountNameLength,
|
| + const char* accountName,
|
| + UInt32 pathLength,
|
| + const char* path,
|
| + UInt16 port,
|
| + SecProtocolType protocol,
|
| + SecAuthenticationType authenticationType,
|
| + UInt32 passwordLength,
|
| + const void* passwordData,
|
| + SecKeychainItemRef* itemRef) const {
|
| + if (locked_)
|
| + return errSecAuthFailed;
|
| +
|
| + // Check for the magic duplicate item trigger.
|
| + if (strcmp(serverName, "some.domain.com") == 0)
|
| + return errSecDuplicateItem;
|
| +
|
| + // If the account already exists in the keychain, we don't add it.
|
| + if (AlreadyContainsInternetPassword(serverNameLength, serverName,
|
| + securityDomainLength, securityDomain,
|
| + accountNameLength, accountName,
|
| + pathLength, path,
|
| + port, protocol,
|
| + authenticationType)) {
|
| + return errSecDuplicateItem;
|
| + }
|
| +
|
| + // Pick the next unused slot.
|
| + MockKeychainItemType key = next_item_key_++;
|
| +
|
| + // Initialize keychain data storage at the target location.
|
| + InitializeKeychainData(key);
|
| +
|
| + MockAppleKeychain* mutable_this = const_cast<MockAppleKeychain*>(this);
|
| + mutable_this->SetTestDataBytes(key, kSecServerItemAttr, serverName,
|
| + serverNameLength);
|
| + mutable_this->SetTestDataBytes(key, kSecSecurityDomainItemAttr,
|
| + securityDomain, securityDomainLength);
|
| + mutable_this->SetTestDataBytes(key, kSecAccountItemAttr, accountName,
|
| + accountNameLength);
|
| + mutable_this->SetTestDataBytes(key, kSecPathItemAttr, path, pathLength);
|
| + mutable_this->SetTestDataPort(key, port);
|
| + mutable_this->SetTestDataProtocol(key, protocol);
|
| + mutable_this->SetTestDataAuthType(key, authenticationType);
|
| + mutable_this->SetTestDataPasswordBytes(key, passwordData,
|
| + passwordLength);
|
| + base::Time::Exploded exploded_time;
|
| + base::Time::Now().UTCExplode(&exploded_time);
|
| + char time_string[128];
|
| + snprintf(time_string, sizeof(time_string), "%04d%02d%02d%02d%02d%02dZ",
|
| + exploded_time.year, exploded_time.month, exploded_time.day_of_month,
|
| + exploded_time.hour, exploded_time.minute, exploded_time.second);
|
| + mutable_this->SetTestDataString(key, kSecCreationDateItemAttr, time_string);
|
| +
|
| + added_via_api_.insert(key);
|
| +
|
| + if (itemRef) {
|
| + *itemRef = reinterpret_cast<SecKeychainItemRef>(key + 1);
|
| + ++keychain_item_copy_count_;
|
| + }
|
| + return noErr;
|
| +}
|
| +
|
| +OSStatus MockAppleKeychain::SearchCopyNext(SecKeychainSearchRef searchRef,
|
| + SecKeychainItemRef* itemRef) const {
|
| + if (remaining_search_results_.empty())
|
| + return errSecItemNotFound;
|
| + MockKeychainItemType key = remaining_search_results_.front();
|
| + remaining_search_results_.erase(remaining_search_results_.begin());
|
| + *itemRef = reinterpret_cast<SecKeychainItemRef>(key + 1);
|
| + ++keychain_item_copy_count_;
|
| + return noErr;
|
| +}
|
| +
|
| +void MockAppleKeychain::Free(CFTypeRef ref) const {
|
| + if (!ref)
|
| + return;
|
| +
|
| + if (ref == kDummySearchRef) {
|
| + --search_copy_count_;
|
| + } else {
|
| + --keychain_item_copy_count_;
|
| + }
|
| +}
|
| +
|
| +int MockAppleKeychain::UnfreedSearchCount() const {
|
| + return search_copy_count_;
|
| +}
|
| +
|
| +int MockAppleKeychain::UnfreedKeychainItemCount() const {
|
| + return keychain_item_copy_count_;
|
| +}
|
| +
|
| +int MockAppleKeychain::UnfreedAttributeDataCount() const {
|
| + return attribute_data_copy_count_;
|
| +}
|
| +
|
| +bool MockAppleKeychain::CreatorCodesSetForAddedItems() const {
|
| + for (std::set<MockKeychainItemType>::const_iterator
|
| + i = added_via_api_.begin();
|
| + i != added_via_api_.end();
|
| + ++i) {
|
| + SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[*i],
|
| + kSecCreatorItemAttr);
|
| + OSType* data = static_cast<OSType*>(attribute->data);
|
| + if (*data == 0)
|
| + return false;
|
| + }
|
| + return true;
|
| +}
|
| +
|
| +void MockAppleKeychain::AddTestItem(const KeychainTestData& item_data) {
|
| + MockKeychainItemType key = next_item_key_++;
|
| +
|
| + InitializeKeychainData(key);
|
| + SetTestDataAuthType(key, item_data.auth_type);
|
| + SetTestDataString(key, kSecServerItemAttr, item_data.server);
|
| + SetTestDataProtocol(key, item_data.protocol);
|
| + SetTestDataString(key, kSecPathItemAttr, item_data.path);
|
| + SetTestDataPort(key, item_data.port);
|
| + SetTestDataString(key, kSecSecurityDomainItemAttr,
|
| + item_data.security_domain);
|
| + SetTestDataString(key, kSecCreationDateItemAttr, item_data.creation_date);
|
| + SetTestDataString(key, kSecAccountItemAttr, item_data.username);
|
| + SetTestDataPasswordString(key, item_data.password);
|
| + SetTestDataNegativeItem(key, item_data.negative_item);
|
| +}
|
| +
|
| +} // namespace crypto
|
|
|