blob: e91f7d62d509c3db9a3de9710e1d20e61d71daf8 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/logging.h"
#include "base/time.h"
#include "chrome/browser/mock_keychain_mac.h"
MockKeychain::MockKeychain(unsigned int item_capacity)
: item_capacity_(item_capacity), item_count_(0), search_copy_count_(0),
keychain_item_copy_count_(0), attribute_data_copy_count_(0),
find_generic_result_(noErr), called_add_generic_(false),
password_data_count_(0) {
UInt32 tags[] = { kSecAccountItemAttr,
kSecServerItemAttr,
kSecPortItemAttr,
kSecPathItemAttr,
kSecProtocolItemAttr,
kSecAuthenticationTypeItemAttr,
kSecSecurityDomainItemAttr,
kSecCreationDateItemAttr,
kSecNegativeItemAttr,
kSecCreatorItemAttr };
// Create the test keychain data storage.
keychain_attr_list_ = static_cast<SecKeychainAttributeList*>(
calloc(item_capacity_, sizeof(SecKeychainAttributeList)));
keychain_data_ = static_cast<KeychainPasswordData*>(
calloc(item_capacity_, sizeof(KeychainPasswordData)));
for (unsigned int i = 0; i < item_capacity_; ++i) {
keychain_attr_list_[i].count = arraysize(tags);
keychain_attr_list_[i].attr = static_cast<SecKeychainAttribute*>(
calloc(keychain_attr_list_[i].count, sizeof(SecKeychainAttribute)));
for (unsigned int j = 0; j < keychain_attr_list_[i].count; ++j) {
keychain_attr_list_[i].attr[j].tag = tags[j];
size_t data_size = 0;
switch (tags[j]) {
case kSecPortItemAttr:
data_size = sizeof(UInt32);
break;
case kSecProtocolItemAttr:
data_size = sizeof(SecProtocolType);
break;
case kSecAuthenticationTypeItemAttr:
data_size = sizeof(SecAuthenticationType);
break;
case kSecNegativeItemAttr:
data_size = sizeof(Boolean);
break;
case kSecCreatorItemAttr:
data_size = sizeof(OSType);
break;
}
if (data_size > 0) {
keychain_attr_list_[i].attr[j].length = data_size;
keychain_attr_list_[i].attr[j].data = calloc(1, data_size);
}
}
}
}
MockKeychain::~MockKeychain() {
for (unsigned int i = 0; i < item_capacity_; ++i) {
for (unsigned int j = 0; j < keychain_attr_list_[i].count; ++j) {
if (keychain_attr_list_[i].attr[j].data) {
free(keychain_attr_list_[i].attr[j].data);
}
}
free(keychain_attr_list_[i].attr);
if (keychain_data_[i].data) {
free(keychain_data_[i].data);
}
}
free(keychain_attr_list_);
free(keychain_data_);
}
SecKeychainAttribute* MockKeychain::AttributeWithTag(
const SecKeychainAttributeList& attribute_list, UInt32 tag) {
int attribute_index = -1;
for (unsigned int i = 0; i < attribute_list.count; ++i) {
if (attribute_list.attr[i].tag == tag) {
attribute_index = i;
break;
}
}
if (attribute_index == -1) {
NOTREACHED() << "Unsupported attribute: " << tag;
return NULL;
}
return &(attribute_list.attr[attribute_index]);
}
void MockKeychain::SetTestDataBytes(int item, UInt32 tag, const void* data,
size_t length) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
tag);
attribute->length = length;
if (length > 0) {
if (attribute->data) {
free(attribute->data);
}
attribute->data = malloc(length);
CHECK(attribute->data);
memcpy(attribute->data, data, length);
} else {
attribute->data = NULL;
}
}
void MockKeychain::SetTestDataString(int item, UInt32 tag, const char* value) {
SetTestDataBytes(item, tag, value, value ? strlen(value) : 0);
}
void MockKeychain::SetTestDataPort(int item, UInt32 value) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
kSecPortItemAttr);
UInt32* data = static_cast<UInt32*>(attribute->data);
*data = value;
}
void MockKeychain::SetTestDataProtocol(int item, SecProtocolType value) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
kSecProtocolItemAttr);
SecProtocolType* data = static_cast<SecProtocolType*>(attribute->data);
*data = value;
}
void MockKeychain::SetTestDataAuthType(int item, SecAuthenticationType value) {
SecKeychainAttribute* attribute = AttributeWithTag(
keychain_attr_list_[item], kSecAuthenticationTypeItemAttr);
SecAuthenticationType* data = static_cast<SecAuthenticationType*>(
attribute->data);
*data = value;
}
void MockKeychain::SetTestDataNegativeItem(int item, Boolean value) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
kSecNegativeItemAttr);
Boolean* data = static_cast<Boolean*>(attribute->data);
*data = value;
}
void MockKeychain::SetTestDataCreator(int item, OSType value) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[item],
kSecCreatorItemAttr);
OSType* data = static_cast<OSType*>(attribute->data);
*data = value;
}
void MockKeychain::SetTestDataPasswordBytes(int item, const void* data,
size_t length) {
keychain_data_[item].length = length;
if (length > 0) {
if (keychain_data_[item].data) {
free(keychain_data_[item].data);
}
keychain_data_[item].data = malloc(length);
memcpy(keychain_data_[item].data, data, length);
} else {
keychain_data_[item].data = NULL;
}
}
void MockKeychain::SetTestDataPasswordString(int item, const char* value) {
SetTestDataPasswordBytes(item, value, value ? strlen(value) : 0);
}
OSStatus MockKeychain::ItemCopyAttributesAndData(
SecKeychainItemRef itemRef, SecKeychainAttributeInfo *info,
SecItemClass *itemClass, SecKeychainAttributeList **attrList,
UInt32 *length, void **outData) const {
DCHECK(itemRef);
unsigned int item_index = reinterpret_cast<unsigned int>(itemRef) - 1;
if (item_index >= item_count_) {
return errSecInvalidItemRef;
}
DCHECK(!itemClass); // itemClass not implemented in the Mock.
if (attrList) {
*attrList = &(keychain_attr_list_[item_index]);
}
if (outData) {
*outData = keychain_data_[item_index].data;
DCHECK(length);
*length = keychain_data_[item_index].length;
}
++attribute_data_copy_count_;
return noErr;
}
OSStatus MockKeychain::ItemModifyAttributesAndData(
SecKeychainItemRef itemRef, const SecKeychainAttributeList *attrList,
UInt32 length, const void *data) const {
DCHECK(itemRef);
const char* fail_trigger = "fail_me";
if (length == strlen(fail_trigger) &&
memcmp(data, fail_trigger, length) == 0) {
return errSecAuthFailed;
}
unsigned int item_index = reinterpret_cast<unsigned int>(itemRef) - 1;
if (item_index >= item_count_) {
return errSecInvalidItemRef;
}
MockKeychain* mutable_this = const_cast<MockKeychain*>(this);
if (attrList) {
for (UInt32 change_attr = 0; change_attr < attrList->count; ++change_attr) {
if (attrList->attr[change_attr].tag == kSecCreatorItemAttr) {
void* data = attrList->attr[change_attr].data;
mutable_this->SetTestDataCreator(item_index,
*(static_cast<OSType*>(data)));
} else {
NOTIMPLEMENTED();
}
}
}
if (data) {
mutable_this->SetTestDataPasswordBytes(item_index, data, length);
}
return noErr;
}
OSStatus MockKeychain::ItemFreeAttributesAndData(
SecKeychainAttributeList *attrList,
void *data) const {
--attribute_data_copy_count_;
return noErr;
}
OSStatus MockKeychain::ItemDelete(SecKeychainItemRef itemRef) const {
unsigned int item_index = reinterpret_cast<unsigned int>(itemRef) - 1;
// The mock only supports deleting the last item.
if (item_index != item_count_ - 1) {
NOTIMPLEMENTED();
}
--item_count_;
return noErr;
}
OSStatus MockKeychain::SearchCreateFromAttributes(
CFTypeRef keychainOrArray, SecItemClass itemClass,
const SecKeychainAttributeList *attrList,
SecKeychainSearchRef *searchRef) const {
// Figure out which of our mock items matches, and set up the array we'll use
// to generate results out of SearchCopyNext.
remaining_search_results_.clear();
for (unsigned int mock_item = 0; mock_item < item_count_; ++mock_item) {
bool mock_item_matches = true;
for (UInt32 search_attr = 0; search_attr < attrList->count; ++search_attr) {
SecKeychainAttribute* mock_attribute =
AttributeWithTag(keychain_attr_list_[mock_item],
attrList->attr[search_attr].tag);
if (mock_attribute->length != attrList->attr[search_attr].length ||
memcmp(mock_attribute->data, attrList->attr[search_attr].data,
attrList->attr[search_attr].length) != 0) {
mock_item_matches = false;
break;
}
}
if (mock_item_matches) {
remaining_search_results_.push_back(mock_item);
}
}
DCHECK(searchRef);
*searchRef = reinterpret_cast<SecKeychainSearchRef>(kDummySearchRef);
++search_copy_count_;
return noErr;
}
OSStatus MockKeychain::AddInternetPassword(
SecKeychainRef keychain,
UInt32 serverNameLength, const char *serverName,
UInt32 securityDomainLength, const char *securityDomain,
UInt32 accountNameLength, const char *accountName,
UInt32 pathLength, const char *path,
UInt16 port, SecProtocolType protocol,
SecAuthenticationType authenticationType,
UInt32 passwordLength, const void *passwordData,
SecKeychainItemRef *itemRef) const {
// Check for the magic duplicate item trigger.
if (strcmp(serverName, "some.domain.com") == 0) {
return errSecDuplicateItem;
}
// Use empty slots until they run out, then just keep replacing the last item.
int target_item = (item_count_ == item_capacity_) ? item_capacity_ - 1
: item_count_++;
MockKeychain* mutable_this = const_cast<MockKeychain*>(this);
mutable_this->SetTestDataBytes(target_item, kSecServerItemAttr, serverName,
serverNameLength);
mutable_this->SetTestDataBytes(target_item, kSecSecurityDomainItemAttr,
securityDomain, securityDomainLength);
mutable_this->SetTestDataBytes(target_item, kSecAccountItemAttr, accountName,
accountNameLength);
mutable_this->SetTestDataBytes(target_item, kSecPathItemAttr, path,
pathLength);
mutable_this->SetTestDataPort(target_item, port);
mutable_this->SetTestDataProtocol(target_item, protocol);
mutable_this->SetTestDataAuthType(target_item, authenticationType);
mutable_this->SetTestDataPasswordBytes(target_item, passwordData,
passwordLength);
base::Time::Exploded exploded_time;
base::Time::Now().UTCExplode(&exploded_time);
char time_string[128];
snprintf(time_string, sizeof(time_string), "%04d%02d%02d%02d%02d%02dZ",
exploded_time.year, exploded_time.month, exploded_time.day_of_month,
exploded_time.hour, exploded_time.minute, exploded_time.second);
mutable_this->SetTestDataString(target_item, kSecCreationDateItemAttr,
time_string);
added_via_api_.insert(target_item);
if (itemRef) {
*itemRef = reinterpret_cast<SecKeychainItemRef>(target_item + 1);
++keychain_item_copy_count_;
}
return noErr;
}
OSStatus MockKeychain::SearchCopyNext(SecKeychainSearchRef searchRef,
SecKeychainItemRef *itemRef) const {
if (remaining_search_results_.empty()) {
return errSecItemNotFound;
}
unsigned int index = remaining_search_results_.front();
remaining_search_results_.erase(remaining_search_results_.begin());
*itemRef = reinterpret_cast<SecKeychainItemRef>(index + 1);
++keychain_item_copy_count_;
return noErr;
}
OSStatus MockKeychain::FindGenericPassword(CFTypeRef keychainOrArray,
UInt32 serviceNameLength,
const char *serviceName,
UInt32 accountNameLength,
const char *accountName,
UInt32 *passwordLength,
void **passwordData,
SecKeychainItemRef *itemRef) const {
// When simulating |noErr| we return canned |passwordData| and
// |passwordLenght|. Otherwise, just return given code.
if (find_generic_result_ == noErr) {
static char password[] = "my_password";
DCHECK(passwordData);
*passwordData = static_cast<void*>(password);
DCHECK(passwordLength);
*passwordLength = strlen(password);
password_data_count_++;
}
return find_generic_result_;
}
OSStatus MockKeychain::ItemFreeContent(SecKeychainAttributeList *attrList,
void *data) const {
// No-op.
password_data_count_--;
return noErr;
}
OSStatus MockKeychain::AddGenericPassword(SecKeychainRef keychain,
UInt32 serviceNameLength,
const char *serviceName,
UInt32 accountNameLength,
const char *accountName,
UInt32 passwordLength,
const void *passwordData,
SecKeychainItemRef *itemRef) const {
called_add_generic_ = true;
DCHECK(passwordLength > 0);
DCHECK(passwordData);
add_generic_password_ =
std::string(const_cast<char*>(static_cast<const char*>(passwordData)),
passwordLength);
return noErr;
}
void MockKeychain::Free(CFTypeRef ref) const {
if (!ref) {
return;
}
if (reinterpret_cast<int>(ref) == kDummySearchRef) {
--search_copy_count_;
} else {
--keychain_item_copy_count_;
}
}
int MockKeychain::UnfreedSearchCount() const {
return search_copy_count_;
}
int MockKeychain::UnfreedKeychainItemCount() const {
return keychain_item_copy_count_;
}
int MockKeychain::UnfreedAttributeDataCount() const {
return attribute_data_copy_count_;
}
bool MockKeychain::CreatorCodesSetForAddedItems() const {
for (std::set<unsigned int>::const_iterator i = added_via_api_.begin();
i != added_via_api_.end(); ++i) {
SecKeychainAttribute* attribute = AttributeWithTag(keychain_attr_list_[*i],
kSecCreatorItemAttr);
OSType* data = static_cast<OSType*>(attribute->data);
if (*data == 0) {
return false;
}
}
return true;
}
void MockKeychain::AddTestItem(const KeychainTestData& item_data) {
unsigned int index = item_count_++;
CHECK(index < item_capacity_);
SetTestDataAuthType(index, item_data.auth_type);
SetTestDataString(index, kSecServerItemAttr, item_data.server);
SetTestDataProtocol(index, item_data.protocol);
SetTestDataString(index, kSecPathItemAttr, item_data.path);
SetTestDataPort(index, item_data.port);
SetTestDataString(index, kSecSecurityDomainItemAttr,
item_data.security_domain);
SetTestDataString(index, kSecCreationDateItemAttr, item_data.creation_date);
SetTestDataString(index, kSecAccountItemAttr, item_data.username);
SetTestDataPasswordString(index, item_data.password);
SetTestDataNegativeItem(index, item_data.negative_item);
}