KeychainAccessTests.swift 67 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. // Permission is hereby granted, free of charge, to any person obtaining a copy
  9. // of this software and associated documentation files (the "Software"), to deal
  10. // in the Software without restriction, including without limitation the rights
  11. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  12. // copies of the Software, and to permit persons to whom the Software is
  13. // furnished to do so, subject to the following conditions:
  14. //
  15. // The above copyright notice and this permission notice shall be included in
  16. // all copies or substantial portions of the Software.
  17. //
  18. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  21. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  22. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  23. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  24. // THE SOFTWARE.
  25. import Foundation
  26. import XCTest
  27. import KeychainAccess
  28. class KeychainAccessTests: XCTestCase {
  29. override func setUp() {
  30. super.setUp()
  31. do { try Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").removeAll() } catch {}
  32. do { try Keychain(service: "Twitter").removeAll() } catch {}
  33. do { try Keychain(server: URL(string: "https://example.com")!, protocolType: .https).removeAll() } catch {}
  34. do { try Keychain(server: URL(string: "https://example.com:443")!, protocolType: .https).removeAll() } catch {}
  35. do { try Keychain().removeAll() } catch {}
  36. }
  37. override func tearDown() {
  38. super.tearDown()
  39. }
  40. // MARK:
  41. func testGenericPassword() {
  42. do {
  43. // Add Keychain items
  44. let keychain = Keychain(service: "Twitter")
  45. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  46. do { try keychain.set("password_1234", key: "password") } catch {}
  47. let username = try! keychain.get("username")
  48. XCTAssertEqual(username, "kishikawa_katsumi")
  49. let password = try! keychain.get("password")
  50. XCTAssertEqual(password, "password_1234")
  51. }
  52. do {
  53. // Update Keychain items
  54. let keychain = Keychain(service: "Twitter")
  55. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  56. do { try keychain.set("1234_password", key: "password") } catch {}
  57. let username = try! keychain.get("username")
  58. XCTAssertEqual(username, "katsumi_kishikawa")
  59. let password = try! keychain.get("password")
  60. XCTAssertEqual(password, "1234_password")
  61. }
  62. do {
  63. // Remove Keychain items
  64. let keychain = Keychain(service: "Twitter")
  65. do { try keychain.remove("username") } catch {}
  66. do { try keychain.remove("password") } catch {}
  67. XCTAssertNil(try! keychain.get("username"))
  68. XCTAssertNil(try! keychain.get("password"))
  69. }
  70. }
  71. func testGenericPasswordSubscripting() {
  72. do {
  73. // Add Keychain items
  74. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  75. keychain["username"] = "kishikawa_katsumi"
  76. keychain["password"] = "password_1234"
  77. let username = keychain["username"]
  78. XCTAssertEqual(username, "kishikawa_katsumi")
  79. let password = keychain["password"]
  80. XCTAssertEqual(password, "password_1234")
  81. }
  82. do {
  83. // Update Keychain items
  84. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  85. keychain["username"] = "katsumi_kishikawa"
  86. keychain["password"] = "1234_password"
  87. let username = keychain["username"]
  88. XCTAssertEqual(username, "katsumi_kishikawa")
  89. let password = keychain["password"]
  90. XCTAssertEqual(password, "1234_password")
  91. }
  92. do {
  93. // Remove Keychain items
  94. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  95. keychain["username"] = nil
  96. keychain["password"] = nil
  97. XCTAssertNil(keychain["username"])
  98. XCTAssertNil(keychain["password"])
  99. }
  100. }
  101. // MARK:
  102. func testInternetPassword() {
  103. do {
  104. // Add Keychain items
  105. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  106. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  107. do { try keychain.set("password_1234", key: "password") } catch {}
  108. let username = try! keychain.get("username")
  109. XCTAssertEqual(username, "kishikawa_katsumi")
  110. let password = try! keychain.get("password")
  111. XCTAssertEqual(password, "password_1234")
  112. }
  113. do {
  114. // Update Keychain items
  115. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  116. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  117. do { try keychain.set("1234_password", key: "password") } catch {}
  118. let username = try! keychain.get("username")
  119. XCTAssertEqual(username, "katsumi_kishikawa")
  120. let password = try! keychain.get("password")
  121. XCTAssertEqual(password, "1234_password")
  122. }
  123. do {
  124. // Remove Keychain items
  125. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  126. do { try keychain.remove("username") } catch {}
  127. do { try keychain.remove("password") } catch {}
  128. XCTAssertNil(try! keychain.get("username"))
  129. XCTAssertNil(try! keychain.get("password"))
  130. }
  131. }
  132. func testInternetPasswordSubscripting() {
  133. do {
  134. // Add Keychain items
  135. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  136. keychain["username"] = "kishikawa_katsumi"
  137. keychain["password"] = "password_1234"
  138. let username = keychain["username"]
  139. XCTAssertEqual(username, "kishikawa_katsumi")
  140. let password = keychain["password"]
  141. XCTAssertEqual(password, "password_1234")
  142. }
  143. do {
  144. // Update Keychain items
  145. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  146. keychain["username"] = "katsumi_kishikawa"
  147. keychain["password"] = "1234_password"
  148. let username = keychain["username"]
  149. XCTAssertEqual(username, "katsumi_kishikawa")
  150. let password = keychain["password"]
  151. XCTAssertEqual(password, "1234_password")
  152. }
  153. do {
  154. // Remove Keychain items
  155. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  156. keychain["username"] = nil
  157. keychain["password"] = nil
  158. XCTAssertNil(keychain["username"])
  159. XCTAssertNil(keychain["password"])
  160. }
  161. }
  162. // MARK:
  163. func testDefaultInitializer() {
  164. let keychain = Keychain()
  165. XCTAssertEqual(keychain.service, Bundle.main.bundleIdentifier)
  166. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  167. XCTAssertNil(keychain.accessGroup)
  168. }
  169. func testInitializerWithService() {
  170. let keychain = Keychain(service: "com.example.github-token")
  171. XCTAssertEqual(keychain.service, "com.example.github-token")
  172. XCTAssertNil(keychain.accessGroup)
  173. }
  174. func testInitializerWithAccessGroup() {
  175. let keychain = Keychain(accessGroup: "27AEDK3C9F.shared")
  176. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  177. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  178. }
  179. func testInitializerWithServiceAndAccessGroup() {
  180. let keychain = Keychain(service: "com.example.github-token", accessGroup: "27AEDK3C9F.shared")
  181. XCTAssertEqual(keychain.service, "com.example.github-token")
  182. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  183. }
  184. func testInitializerWithServer() {
  185. let server = "https://kishikawakatsumi.com"
  186. let url = URL(string: server)!
  187. do {
  188. let keychain = Keychain(server: server, protocolType: .https)
  189. XCTAssertEqual(keychain.server, url)
  190. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  191. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  192. }
  193. do {
  194. let keychain = Keychain(server: url, protocolType: .https)
  195. XCTAssertEqual(keychain.server, url)
  196. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  197. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  198. }
  199. }
  200. func testInitializerWithServerAndAuthenticationType() {
  201. let server = "https://kishikawakatsumi.com"
  202. let url = URL(string: server)!
  203. do {
  204. let keychain = Keychain(server: server, protocolType: .https, authenticationType: .htmlForm)
  205. XCTAssertEqual(keychain.server, url)
  206. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  207. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  208. }
  209. do {
  210. let keychain = Keychain(server: url, protocolType: .https, authenticationType: .htmlForm)
  211. XCTAssertEqual(keychain.server, url)
  212. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  213. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  214. }
  215. }
  216. // MARK:
  217. func testContains() {
  218. let keychain = Keychain(service: "Twitter")
  219. XCTAssertFalse(try! keychain.contains("username"), "not stored username")
  220. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  221. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  222. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  223. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  224. do { try keychain.set("password1234", key: "password") } catch {}
  225. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  226. XCTAssertTrue(try! keychain.contains("password"), "stored password")
  227. }
  228. // MARK:
  229. func testSetString() {
  230. let keychain = Keychain(service: "Twitter")
  231. XCTAssertNil(try! keychain.get("username"), "not stored username")
  232. XCTAssertNil(try! keychain.get("password"), "not stored password")
  233. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  234. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  235. XCTAssertNil(try! keychain.get("password"), "not stored password")
  236. do { try keychain.set("password1234", key: "password") } catch {}
  237. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  238. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  239. }
  240. func testSetStringWithLabel() {
  241. let keychain = Keychain(service: "Twitter")
  242. .label("Twitter Account")
  243. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  244. do {
  245. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  246. return attributes?.label
  247. }
  248. XCTAssertNil(label)
  249. } catch {
  250. XCTFail("error occurred")
  251. }
  252. keychain["kishikawakatsumi"] = "password1234"
  253. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  254. do {
  255. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  256. return attributes?.label
  257. }
  258. XCTAssertEqual(label, "Twitter Account")
  259. } catch {
  260. XCTFail("error occurred")
  261. }
  262. }
  263. func testSetStringWithComment() {
  264. let keychain = Keychain(service: "Twitter")
  265. .comment("Kishikawa Katsumi")
  266. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  267. do {
  268. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  269. return attributes?.comment
  270. }
  271. XCTAssertNil(comment)
  272. } catch {
  273. XCTFail("error occurred")
  274. }
  275. keychain["kishikawakatsumi"] = "password1234"
  276. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  277. do {
  278. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  279. return attributes?.comment
  280. }
  281. XCTAssertEqual(comment, "Kishikawa Katsumi")
  282. } catch {
  283. XCTFail("error occurred")
  284. }
  285. }
  286. func testSetStringWithLabelAndComment() {
  287. let keychain = Keychain(service: "Twitter")
  288. .label("Twitter Account")
  289. .comment("Kishikawa Katsumi")
  290. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  291. do {
  292. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  293. return attributes?.label
  294. }
  295. XCTAssertNil(label)
  296. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  297. return attributes?.comment
  298. }
  299. XCTAssertNil(comment)
  300. } catch {
  301. XCTFail("error occurred")
  302. }
  303. keychain["kishikawakatsumi"] = "password1234"
  304. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  305. do {
  306. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  307. return attributes?.label
  308. }
  309. XCTAssertEqual(label, "Twitter Account")
  310. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  311. return attributes?.comment
  312. }
  313. XCTAssertEqual(comment, "Kishikawa Katsumi")
  314. } catch {
  315. XCTFail("error occurred")
  316. }
  317. }
  318. func testSetData() {
  319. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  320. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  321. let keychain = Keychain(service: "Twitter")
  322. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  323. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  324. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  325. }
  326. func testStringConversionError() {
  327. let keychain = Keychain(service: "Twitter")
  328. let length = 256
  329. let data = NSMutableData(length: length)!
  330. let bytes = data.mutableBytes.bindMemory(to: UInt8.self, capacity: length)
  331. _ = SecRandomCopyBytes(kSecRandomDefault, length, bytes)
  332. do {
  333. try keychain.set(data as Data, key: "RandomData")
  334. let _ = try keychain.getString("RandomData")
  335. XCTFail("no error occurred")
  336. } catch let error as NSError {
  337. XCTAssertEqual(error.domain, KeychainAccessErrorDomain)
  338. XCTAssertEqual(error.code, Int(Status.conversionError.rawValue))
  339. XCTAssertEqual(error.userInfo[NSLocalizedDescriptionKey] as! String, Status.conversionError.localizedDescription)
  340. } catch {
  341. XCTFail("unexpected error occurred")
  342. }
  343. do {
  344. try keychain.set(data as Data, key: "RandomData")
  345. let _ = try keychain.getString("RandomData")
  346. XCTFail("no error occurred")
  347. } catch Status.conversionError {
  348. XCTAssertTrue(true)
  349. } catch {
  350. XCTFail("unexpected error occurred")
  351. }
  352. }
  353. func testGetPersistentRef() {
  354. let keychain = Keychain(service: "Twitter")
  355. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  356. do {
  357. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  358. XCTAssertNil(persistentRef)
  359. } catch {
  360. XCTFail("error occurred")
  361. }
  362. keychain["kishikawakatsumi"] = "password1234"
  363. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  364. do {
  365. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  366. XCTAssertNotNil(persistentRef)
  367. } catch {
  368. XCTFail("error occurred")
  369. }
  370. }
  371. #if os(iOS) || os(tvOS)
  372. func testSetAttributes() {
  373. let expectation = self.expectation(description: "Touch ID authentication")
  374. DispatchQueue.global(qos: .default).async {
  375. do {
  376. var attributes = [String: Any]()
  377. attributes[String(kSecAttrDescription)] = "Description Test"
  378. attributes[String(kSecAttrComment)] = "Comment Test"
  379. attributes[String(kSecAttrCreator)] = "Creator Test"
  380. attributes[String(kSecAttrType)] = "Type Test"
  381. attributes[String(kSecAttrLabel)] = "Label Test"
  382. attributes[String(kSecAttrIsInvisible)] = true
  383. attributes[String(kSecAttrIsNegative)] = true
  384. let keychain = Keychain(service: "Twitter")
  385. .attributes(attributes)
  386. .accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence)
  387. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  388. do {
  389. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  390. XCTAssertNil(attributes)
  391. } catch {
  392. XCTFail("error occurred")
  393. }
  394. keychain["kishikawakatsumi"] = "password1234"
  395. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  396. do {
  397. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  398. XCTAssertEqual(attributes?.`class`, ItemClass.genericPassword.rawValue)
  399. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  400. XCTAssertNil(attributes?.ref)
  401. XCTAssertNotNil(attributes?.persistentRef)
  402. XCTAssertEqual(attributes?.accessible, Accessibility.whenPasscodeSetThisDeviceOnly.rawValue)
  403. XCTAssertNotNil(attributes?.accessControl)
  404. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  405. XCTAssertNotNil(attributes?.synchronizable)
  406. XCTAssertNotNil(attributes?.creationDate)
  407. XCTAssertNotNil(attributes?.modificationDate)
  408. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  409. XCTAssertEqual(attributes?.comment, "Comment Test")
  410. XCTAssertEqual(attributes?.creator, "Creator Test")
  411. XCTAssertEqual(attributes?.type, "Type Test")
  412. XCTAssertEqual(attributes?.label, "Label Test")
  413. XCTAssertEqual(attributes?.isInvisible, true)
  414. XCTAssertEqual(attributes?.isNegative, true)
  415. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  416. XCTAssertEqual(attributes?.service, "Twitter")
  417. XCTAssertNil(attributes?.generic)
  418. XCTAssertNil(attributes?.securityDomain)
  419. XCTAssertNil(attributes?.server)
  420. XCTAssertNil(attributes?.`protocol`)
  421. XCTAssertNil(attributes?.authenticationType)
  422. XCTAssertNil(attributes?.port)
  423. XCTAssertNil(attributes?.path)
  424. XCTAssertEqual(attributes![String(kSecClass)] as? String, ItemClass.genericPassword.rawValue)
  425. XCTAssertEqual(attributes![String(kSecValueData)] as? Data, "password1234".data(using: .utf8))
  426. expectation.fulfill()
  427. } catch {
  428. XCTFail("error occurred")
  429. }
  430. }
  431. }
  432. waitForExpectations(timeout: 10.0, handler: nil)
  433. do {
  434. var attributes = [String: Any]()
  435. attributes[String(kSecAttrDescription)] = "Description Test"
  436. attributes[String(kSecAttrComment)] = "Comment Test"
  437. attributes[String(kSecAttrCreator)] = "Creator Test"
  438. attributes[String(kSecAttrType)] = "Type Test"
  439. attributes[String(kSecAttrLabel)] = "Label Test"
  440. attributes[String(kSecAttrIsInvisible)] = true
  441. attributes[String(kSecAttrIsNegative)] = true
  442. attributes[String(kSecAttrSecurityDomain)] = "securitydomain"
  443. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  444. .attributes(attributes)
  445. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  446. do {
  447. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  448. XCTAssertNil(attributes)
  449. } catch {
  450. XCTFail("error occurred")
  451. }
  452. do {
  453. keychain["kishikawakatsumi"] = "password1234"
  454. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  455. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  456. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  457. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  458. XCTAssertNil(attributes?.ref)
  459. XCTAssertNotNil(attributes?.persistentRef)
  460. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  461. #if os(iOS)
  462. if #available(iOS 11.3, *) {
  463. XCTAssertNotNil(attributes?.accessControl)
  464. } else if #available(iOS 9.0, *) {
  465. XCTAssertNil(attributes?.accessControl)
  466. } else {
  467. XCTAssertNotNil(attributes?.accessControl)
  468. }
  469. #else
  470. if #available(tvOS 11.3, *) {
  471. XCTAssertNotNil(attributes?.accessControl)
  472. } else {
  473. XCTAssertNil(attributes?.accessControl)
  474. }
  475. #endif
  476. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  477. XCTAssertNotNil(attributes?.synchronizable)
  478. XCTAssertNotNil(attributes?.creationDate)
  479. XCTAssertNotNil(attributes?.modificationDate)
  480. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  481. XCTAssertEqual(attributes?.comment, "Comment Test")
  482. XCTAssertEqual(attributes?.creator, "Creator Test")
  483. XCTAssertEqual(attributes?.type, "Type Test")
  484. XCTAssertEqual(attributes?.label, "Label Test")
  485. XCTAssertEqual(attributes?.isInvisible, true)
  486. XCTAssertEqual(attributes?.isNegative, true)
  487. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  488. XCTAssertNil(attributes?.service)
  489. XCTAssertNil(attributes?.generic)
  490. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  491. XCTAssertEqual(attributes?.server, "example.com")
  492. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  493. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  494. XCTAssertEqual(attributes?.port, 443)
  495. XCTAssertEqual(attributes?.path, "")
  496. } catch {
  497. XCTFail("error occurred")
  498. }
  499. do {
  500. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  501. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  502. keychain["kishikawakatsumi"] = "1234password"
  503. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "updated password")
  504. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  505. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  506. XCTAssertEqual(attributes?.data, "1234password".data(using: .utf8))
  507. XCTAssertNil(attributes?.ref)
  508. XCTAssertNotNil(attributes?.persistentRef)
  509. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  510. #if os(iOS)
  511. if #available(iOS 11.3, *) {
  512. XCTAssertNotNil(attributes?.accessControl)
  513. } else if #available(iOS 9.0, *) {
  514. XCTAssertNil(attributes?.accessControl)
  515. } else {
  516. XCTAssertNotNil(attributes?.accessControl)
  517. }
  518. #else
  519. if #available(tvOS 11.3, *) {
  520. XCTAssertNotNil(attributes?.accessControl)
  521. } else {
  522. XCTAssertNil(attributes?.accessControl)
  523. }
  524. #endif
  525. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  526. XCTAssertNotNil(attributes?.synchronizable)
  527. XCTAssertNotNil(attributes?.creationDate)
  528. XCTAssertNotNil(attributes?.modificationDate)
  529. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  530. XCTAssertEqual(attributes?.comment, "Comment Test")
  531. XCTAssertEqual(attributes?.creator, "Creator Test")
  532. XCTAssertEqual(attributes?.type, "Type Test")
  533. XCTAssertEqual(attributes?.label, "Label Test")
  534. XCTAssertEqual(attributes?.isInvisible, true)
  535. XCTAssertEqual(attributes?.isNegative, true)
  536. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  537. XCTAssertNil(attributes?.service)
  538. XCTAssertNil(attributes?.generic)
  539. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  540. XCTAssertEqual(attributes?.server, "example.com")
  541. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  542. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  543. XCTAssertEqual(attributes?.port, 443)
  544. XCTAssertEqual(attributes?.path, "")
  545. } catch {
  546. XCTFail("error occurred")
  547. }
  548. do {
  549. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  550. .attributes([String(kSecAttrDescription): "Updated Description"])
  551. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "stored password")
  552. keychain["kishikawakatsumi"] = "password1234"
  553. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "updated password")
  554. let attributes = keychain[attributes: "kishikawakatsumi"]
  555. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  556. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  557. XCTAssertNil(attributes?.ref)
  558. XCTAssertNotNil(attributes?.persistentRef)
  559. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  560. #if os(iOS)
  561. if #available(iOS 11.3, *) {
  562. XCTAssertNotNil(attributes?.accessControl)
  563. } else if #available(iOS 9.0, *) {
  564. XCTAssertNil(attributes?.accessControl)
  565. } else {
  566. XCTAssertNotNil(attributes?.accessControl)
  567. }
  568. #else
  569. if #available(tvOS 11.3, *) {
  570. XCTAssertNotNil(attributes?.accessControl)
  571. } else {
  572. XCTAssertNil(attributes?.accessControl)
  573. }
  574. #endif
  575. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  576. XCTAssertNotNil(attributes?.synchronizable)
  577. XCTAssertNotNil(attributes?.creationDate)
  578. XCTAssertNotNil(attributes?.modificationDate)
  579. XCTAssertEqual(attributes?.attributeDescription, "Updated Description")
  580. XCTAssertEqual(attributes?.comment, "Comment Test")
  581. XCTAssertEqual(attributes?.creator, "Creator Test")
  582. XCTAssertEqual(attributes?.type, "Type Test")
  583. XCTAssertEqual(attributes?.label, "Label Test")
  584. XCTAssertEqual(attributes?.isInvisible, true)
  585. XCTAssertEqual(attributes?.isNegative, true)
  586. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  587. XCTAssertNil(attributes?.service)
  588. XCTAssertNil(attributes?.generic)
  589. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  590. XCTAssertEqual(attributes?.server, "example.com")
  591. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  592. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  593. XCTAssertEqual(attributes?.port, 443)
  594. XCTAssertEqual(attributes?.path, "")
  595. }
  596. }
  597. }
  598. #endif
  599. func testRemoveString() {
  600. let keychain = Keychain(service: "Twitter")
  601. XCTAssertNil(try! keychain.get("username"), "not stored username")
  602. XCTAssertNil(try! keychain.get("password"), "not stored password")
  603. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  604. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  605. do { try keychain.set("password1234", key: "password") } catch {}
  606. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  607. do { try keychain.remove("username") } catch {}
  608. XCTAssertNil(try! keychain.get("username"), "removed username")
  609. XCTAssertEqual(try! keychain.get("password"), "password1234", "left password")
  610. do { try keychain.remove("password") } catch {}
  611. XCTAssertNil(try! keychain.get("username"), "removed username")
  612. XCTAssertNil(try! keychain.get("password"), "removed password")
  613. }
  614. func testRemoveData() {
  615. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  616. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  617. let keychain = Keychain(service: "Twitter")
  618. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  619. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  620. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  621. do { try keychain.remove("JSONData") } catch {}
  622. XCTAssertNil(try! keychain.getData("JSONData"), "removed JSON data")
  623. }
  624. // MARK:
  625. func testSubscripting() {
  626. let keychain = Keychain(service: "Twitter")
  627. XCTAssertNil(keychain["username"], "not stored username")
  628. XCTAssertNil(keychain["password"], "not stored password")
  629. XCTAssertNil(keychain[string: "username"], "not stored username")
  630. XCTAssertNil(keychain[string: "password"], "not stored password")
  631. keychain["username"] = "kishikawakatsumi"
  632. XCTAssertEqual(keychain["username"], "kishikawakatsumi", "stored username")
  633. XCTAssertEqual(keychain[string: "username"], "kishikawakatsumi", "stored username")
  634. keychain["password"] = "password1234"
  635. XCTAssertEqual(keychain["password"], "password1234", "stored password")
  636. XCTAssertEqual(keychain[string: "password"], "password1234", "stored password")
  637. keychain[string: "username"] = nil
  638. XCTAssertNil(keychain["username"], "removed username")
  639. XCTAssertEqual(keychain["password"], "password1234", "left password")
  640. XCTAssertNil(keychain[string: "username"], "removed username")
  641. XCTAssertEqual(keychain[string: "password"], "password1234", "left password")
  642. keychain[string: "password"] = nil
  643. XCTAssertNil(keychain["username"], "removed username")
  644. XCTAssertNil(keychain["password"], "removed password")
  645. XCTAssertNil(keychain[string: "username"], "removed username")
  646. XCTAssertNil(keychain[string: "password"], "removed password")
  647. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  648. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  649. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  650. keychain[data: "JSONData"] = JSONData
  651. XCTAssertEqual(keychain[data: "JSONData"], JSONData, "stored JSON data")
  652. keychain[data: "JSONData"] = nil
  653. XCTAssertNil(keychain[data:"JSONData"], "removed JSON data")
  654. }
  655. // MARK:
  656. func testErrorHandling() {
  657. do {
  658. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  659. try keychain.removeAll()
  660. XCTAssertTrue(true, "no error occurred")
  661. } catch {
  662. XCTFail("error occurred")
  663. }
  664. do {
  665. let keychain = Keychain(service: "Twitter")
  666. try keychain.removeAll()
  667. XCTAssertTrue(true, "no error occurred")
  668. } catch {
  669. XCTFail("error occurred")
  670. }
  671. do {
  672. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  673. try keychain.removeAll()
  674. XCTAssertTrue(true, "no error occurred")
  675. } catch {
  676. XCTFail("error occurred")
  677. }
  678. do {
  679. let keychain = Keychain()
  680. try keychain.removeAll()
  681. XCTAssertTrue(true, "no error occurred")
  682. } catch {
  683. XCTFail("error occurred")
  684. }
  685. do {
  686. // Add Keychain items
  687. let keychain = Keychain(service: "Twitter")
  688. do {
  689. try keychain.set("kishikawa_katsumi", key: "username")
  690. XCTAssertTrue(true, "no error occurred")
  691. } catch {
  692. XCTFail("error occurred")
  693. }
  694. do {
  695. try keychain.set("password_1234", key: "password")
  696. XCTAssertTrue(true, "no error occurred")
  697. } catch {
  698. XCTFail("error occurred")
  699. }
  700. do {
  701. let username = try keychain.get("username")
  702. XCTAssertEqual(username, "kishikawa_katsumi")
  703. } catch {
  704. XCTFail("error occurred")
  705. }
  706. do {
  707. let password = try keychain.get("password")
  708. XCTAssertEqual(password, "password_1234")
  709. } catch {
  710. XCTFail("error occurred")
  711. }
  712. }
  713. do {
  714. // Update Keychain items
  715. let keychain = Keychain(service: "Twitter")
  716. do {
  717. try keychain.set("katsumi_kishikawa", key: "username")
  718. XCTAssertTrue(true, "no error occurred")
  719. } catch {
  720. XCTFail("error occurred")
  721. }
  722. do {
  723. try keychain.set("1234_password", key: "password")
  724. XCTAssertTrue(true, "no error occurred")
  725. } catch {
  726. XCTFail("error occurred")
  727. }
  728. do {
  729. let username = try keychain.get("username")
  730. XCTAssertEqual(username, "katsumi_kishikawa")
  731. } catch {
  732. XCTFail("error occurred")
  733. }
  734. do {
  735. let password = try keychain.get("password")
  736. XCTAssertEqual(password, "1234_password")
  737. } catch {
  738. XCTFail("error occurred")
  739. }
  740. }
  741. do {
  742. // Remove Keychain items
  743. let keychain = Keychain(service: "Twitter")
  744. do {
  745. try keychain.remove("username")
  746. XCTAssertNil(try! keychain.get("username"))
  747. } catch {
  748. XCTFail("error occurred")
  749. }
  750. do {
  751. try keychain.remove("password")
  752. XCTAssertNil(try! keychain.get("username"))
  753. } catch {
  754. XCTFail("error occurred")
  755. }
  756. }
  757. }
  758. // MARK:
  759. func testSetStringWithCustomService() {
  760. let username_1 = "kishikawakatsumi"
  761. let password_1 = "password1234"
  762. let username_2 = "kishikawa_katsumi"
  763. let password_2 = "password_1234"
  764. let username_3 = "k_katsumi"
  765. let password_3 = "12341234"
  766. let service_1 = ""
  767. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  768. let service_3 = "example.com"
  769. do { try Keychain().removeAll() } catch {}
  770. do { try Keychain(service: service_1).removeAll() } catch {}
  771. do { try Keychain(service: service_2).removeAll() } catch {}
  772. do { try Keychain(service: service_3).removeAll() } catch {}
  773. XCTAssertNil(try! Keychain().get("username"), "not stored username")
  774. XCTAssertNil(try! Keychain().get("password"), "not stored password")
  775. XCTAssertNil(try! Keychain(service: service_1).get("username"), "not stored username")
  776. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  777. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  778. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  779. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  780. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  781. do { try Keychain().set(username_1, key: "username") } catch {}
  782. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  783. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  784. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  785. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  786. do { try Keychain(service: service_1).set(username_1, key: "username") } catch {}
  787. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  788. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  789. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  790. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  791. do { try Keychain(service: service_2).set(username_2, key: "username") } catch {}
  792. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  793. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  794. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  795. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  796. do { try Keychain(service: service_3).set(username_3, key: "username") } catch {}
  797. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  798. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  799. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  800. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "stored username")
  801. do { try Keychain().set(password_1, key: "password") } catch {}
  802. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  803. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  804. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  805. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  806. do { try Keychain(service: service_1).set(password_1, key: "password") } catch {}
  807. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  808. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  809. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  810. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  811. do { try Keychain(service: service_2).set(password_2, key: "password") } catch {}
  812. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  813. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  814. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  815. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  816. do { try Keychain(service: service_3).set(password_3, key: "password") } catch {}
  817. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  818. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  819. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  820. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "stored password")
  821. do { try Keychain().remove("username") } catch {}
  822. XCTAssertNil(try! Keychain().get("username"), "removed username")
  823. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "left username")
  824. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  825. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  826. do { try Keychain(service: service_1).remove("username") } catch {}
  827. XCTAssertNil(try! Keychain().get("username"), "removed username")
  828. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  829. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  830. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  831. do { try Keychain(service: service_2).remove("username") } catch {}
  832. XCTAssertNil(try! Keychain().get("username"), "removed username")
  833. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  834. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  835. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  836. do { try Keychain(service: service_3).remove("username") } catch {}
  837. XCTAssertNil(try! Keychain().get("username"), "removed username")
  838. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  839. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  840. XCTAssertNil(try! Keychain(service: service_3).get("username"), "removed username")
  841. do { try Keychain().remove("password") } catch {}
  842. XCTAssertNil(try! Keychain().get("password"), "removed password")
  843. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "left password")
  844. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  845. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  846. do { try Keychain(service: service_1).remove("password") } catch {}
  847. XCTAssertNil(try! Keychain().get("password"), "removed password")
  848. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  849. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  850. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  851. do { try Keychain(service: service_2).remove("password") } catch {}
  852. XCTAssertNil(try! Keychain().get("password"), "removed password")
  853. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  854. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  855. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  856. do { try Keychain(service: service_3).remove("password") } catch {}
  857. XCTAssertNil(try! Keychain().get("password"), "removed password")
  858. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  859. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  860. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  861. }
  862. // MARK:
  863. func testProperties() {
  864. guard #available(OSX 10.10, *) else {
  865. return
  866. }
  867. let keychain = Keychain()
  868. XCTAssertEqual(keychain.synchronizable, false)
  869. XCTAssertEqual(keychain.synchronizable(true).synchronizable, true)
  870. XCTAssertEqual(keychain.synchronizable(false).synchronizable, false)
  871. XCTAssertEqual(keychain.accessibility(.afterFirstUnlock).accessibility, Accessibility.afterFirstUnlock)
  872. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).accessibility, Accessibility.whenPasscodeSetThisDeviceOnly)
  873. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).authenticationPolicy, AuthenticationPolicy.userPresence)
  874. XCTAssertNil(keychain.label)
  875. XCTAssertEqual(keychain.label("Label").label, "Label")
  876. XCTAssertNil(keychain.comment)
  877. XCTAssertEqual(keychain.comment("Comment").comment, "Comment")
  878. XCTAssertEqual(keychain.authenticationPrompt("Prompt").authenticationPrompt, "Prompt")
  879. }
  880. // MARK:
  881. func testAllKeys() {
  882. do {
  883. let keychain = Keychain()
  884. keychain["key1"] = "value1"
  885. keychain["key2"] = "value2"
  886. keychain["key3"] = "value3"
  887. let allKeys = keychain.allKeys()
  888. XCTAssertEqual(allKeys.count, 3)
  889. XCTAssertEqual(allKeys.sorted(), ["key1", "key2", "key3"])
  890. let allItems = keychain.allItems()
  891. XCTAssertEqual(allItems.count, 3)
  892. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  893. let key1 = item1["key"] as! String
  894. let key2 = item2["key"] as! String
  895. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  896. }
  897. #if !os(OSX)
  898. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  899. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  900. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  901. XCTAssertEqual(sortedItems[0]["value"] as? String, "value1")
  902. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  903. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  904. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AfterFirstUnlock")
  905. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  906. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  907. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  908. XCTAssertEqual(sortedItems[1]["value"] as? String, "value2")
  909. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  910. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  911. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlock")
  912. XCTAssertEqual(sortedItems[2]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  913. XCTAssertEqual(sortedItems[2]["synchronizable"] as? String, "false")
  914. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  915. XCTAssertEqual(sortedItems[2]["value"] as? String, "value3")
  916. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  917. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  918. XCTAssertEqual(sortedItems[2]["accessibility"] as? String, "AfterFirstUnlock")
  919. #else
  920. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  921. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  922. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  923. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  924. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  925. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  926. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  927. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  928. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  929. #endif
  930. }
  931. do {
  932. let keychain = Keychain(service: "service1")
  933. try! keychain
  934. .synchronizable(true)
  935. .accessibility(.whenUnlockedThisDeviceOnly)
  936. .set("service1_value1", key: "service1_key1")
  937. try! keychain
  938. .synchronizable(false)
  939. .accessibility(.afterFirstUnlockThisDeviceOnly)
  940. .set("service1_value2", key: "service1_key2")
  941. let allKeys = keychain.allKeys()
  942. XCTAssertEqual(allKeys.count, 2)
  943. XCTAssertEqual(allKeys.sorted(), ["service1_key1", "service1_key2"])
  944. let allItems = keychain.allItems()
  945. XCTAssertEqual(allItems.count, 2)
  946. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  947. let key1 = item1["key"] as! String
  948. let key2 = item2["key"] as! String
  949. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  950. }
  951. #if !os(OSX)
  952. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  953. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "true")
  954. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  955. XCTAssertEqual(sortedItems[0]["value"] as? String, "service1_value1")
  956. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  957. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  958. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "WhenUnlockedThisDeviceOnly")
  959. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  960. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  961. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  962. XCTAssertEqual(sortedItems[1]["value"] as? String, "service1_value2")
  963. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  964. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  965. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlockThisDeviceOnly")
  966. #else
  967. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  968. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  969. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  970. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  971. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  972. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  973. #endif
  974. }
  975. do {
  976. let keychain = Keychain(server: "https://google.com", protocolType: .https)
  977. try! keychain
  978. .synchronizable(false)
  979. .accessibility(.alwaysThisDeviceOnly)
  980. .set("google.com_value1", key: "google.com_key1")
  981. try! keychain
  982. .synchronizable(true)
  983. .accessibility(.always)
  984. .set("google.com_value2", key: "google.com_key2")
  985. let allKeys = keychain.allKeys()
  986. XCTAssertEqual(allKeys.count, 2)
  987. XCTAssertEqual(allKeys.sorted(), ["google.com_key1", "google.com_key2"])
  988. let allItems = keychain.allItems()
  989. XCTAssertEqual(allItems.count, 2)
  990. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  991. let key1 = item1["key"] as! String
  992. let key2 = item2["key"] as! String
  993. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  994. }
  995. #if !os(OSX)
  996. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  997. XCTAssertEqual(sortedItems[0]["value"] as? String, "google.com_value1")
  998. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  999. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1000. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1001. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1002. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1003. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AlwaysThisDeviceOnly")
  1004. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "true")
  1005. XCTAssertEqual(sortedItems[1]["value"] as? String, "google.com_value2")
  1006. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1007. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1008. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1009. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1010. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1011. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "Always")
  1012. #else
  1013. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  1014. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1015. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1016. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1017. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1018. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1019. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1020. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1021. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1022. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1023. #endif
  1024. }
  1025. #if !os(OSX)
  1026. do {
  1027. let allKeys = Keychain.allKeys(.genericPassword)
  1028. XCTAssertEqual(allKeys.count, 5)
  1029. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1030. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1031. }
  1032. XCTAssertEqual(sortedKeys[0].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1033. XCTAssertEqual(sortedKeys[0].1, "key1")
  1034. XCTAssertEqual(sortedKeys[1].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1035. XCTAssertEqual(sortedKeys[1].1, "key2")
  1036. XCTAssertEqual(sortedKeys[2].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1037. XCTAssertEqual(sortedKeys[2].1, "key3")
  1038. XCTAssertEqual(sortedKeys[3].0, "service1")
  1039. XCTAssertEqual(sortedKeys[3].1, "service1_key1")
  1040. XCTAssertEqual(sortedKeys[4].0, "service1")
  1041. XCTAssertEqual(sortedKeys[4].1, "service1_key2")
  1042. }
  1043. do {
  1044. let allKeys = Keychain.allKeys(.internetPassword)
  1045. XCTAssertEqual(allKeys.count, 2)
  1046. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1047. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1048. }
  1049. XCTAssertEqual(sortedKeys[0].0, "google.com")
  1050. XCTAssertEqual(sortedKeys[0].1, "google.com_key1")
  1051. XCTAssertEqual(sortedKeys[1].0, "google.com")
  1052. XCTAssertEqual(sortedKeys[1].1, "google.com_key2")
  1053. }
  1054. #endif
  1055. }
  1056. func testDescription() {
  1057. do {
  1058. let keychain = Keychain()
  1059. XCTAssertEqual(keychain.description, "[]")
  1060. XCTAssertEqual(keychain.debugDescription, "[]")
  1061. }
  1062. }
  1063. // MARK:
  1064. func testAuthenticationPolicy() {
  1065. guard #available(iOS 9.0, OSX 10.11, *) else {
  1066. return
  1067. }
  1068. do {
  1069. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1070. let policy: AuthenticationPolicy = [.userPresence]
  1071. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1072. var error: Unmanaged<CFError>?
  1073. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1074. XCTAssertNil(error)
  1075. XCTAssertNotNil(accessControl)
  1076. }
  1077. #if os(iOS)
  1078. do {
  1079. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1080. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword]
  1081. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1082. var error: Unmanaged<CFError>?
  1083. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1084. XCTAssertNil(error)
  1085. XCTAssertNotNil(accessControl)
  1086. }
  1087. do {
  1088. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1089. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword, .privateKeyUsage]
  1090. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1091. var error: Unmanaged<CFError>?
  1092. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1093. XCTAssertNil(error)
  1094. XCTAssertNotNil(accessControl)
  1095. }
  1096. do {
  1097. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1098. let policy: AuthenticationPolicy = [.applicationPassword]
  1099. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1100. var error: Unmanaged<CFError>?
  1101. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1102. XCTAssertNil(error)
  1103. XCTAssertNotNil(accessControl)
  1104. }
  1105. do {
  1106. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1107. let policy: AuthenticationPolicy = [.applicationPassword, .privateKeyUsage]
  1108. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1109. var error: Unmanaged<CFError>?
  1110. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1111. XCTAssertNil(error)
  1112. XCTAssertNotNil(accessControl)
  1113. }
  1114. do {
  1115. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1116. let policy: AuthenticationPolicy = [.privateKeyUsage]
  1117. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1118. var error: Unmanaged<CFError>?
  1119. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1120. XCTAssertNil(error)
  1121. XCTAssertNotNil(accessControl)
  1122. }
  1123. do {
  1124. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1125. let policy: AuthenticationPolicy = [.touchIDAny]
  1126. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1127. var error: Unmanaged<CFError>?
  1128. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1129. XCTAssertNil(error)
  1130. XCTAssertNotNil(accessControl)
  1131. }
  1132. do {
  1133. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1134. let policy: AuthenticationPolicy = [.touchIDAny, .devicePasscode]
  1135. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1136. var error: Unmanaged<CFError>?
  1137. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1138. XCTAssertNil(error)
  1139. XCTAssertNotNil(accessControl)
  1140. }
  1141. do {
  1142. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1143. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword]
  1144. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1145. var error: Unmanaged<CFError>?
  1146. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1147. XCTAssertNil(error)
  1148. XCTAssertNotNil(accessControl)
  1149. }
  1150. do {
  1151. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1152. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword, .privateKeyUsage]
  1153. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1154. var error: Unmanaged<CFError>?
  1155. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1156. XCTAssertNil(error)
  1157. XCTAssertNotNil(accessControl)
  1158. }
  1159. do {
  1160. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1161. let policy: AuthenticationPolicy = [.touchIDCurrentSet]
  1162. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1163. var error: Unmanaged<CFError>?
  1164. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1165. XCTAssertNil(error)
  1166. XCTAssertNotNil(accessControl)
  1167. }
  1168. do {
  1169. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1170. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .devicePasscode]
  1171. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1172. var error: Unmanaged<CFError>?
  1173. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1174. XCTAssertNil(error)
  1175. XCTAssertNotNil(accessControl)
  1176. }
  1177. do {
  1178. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1179. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword]
  1180. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1181. var error: Unmanaged<CFError>?
  1182. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1183. XCTAssertNil(error)
  1184. XCTAssertNotNil(accessControl)
  1185. }
  1186. do {
  1187. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1188. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword, .privateKeyUsage]
  1189. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1190. var error: Unmanaged<CFError>?
  1191. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1192. XCTAssertNil(error)
  1193. XCTAssertNotNil(accessControl)
  1194. }
  1195. do {
  1196. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1197. let policy: AuthenticationPolicy = [.touchIDAny, .or, .devicePasscode]
  1198. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1199. var error: Unmanaged<CFError>?
  1200. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1201. XCTAssertNil(error)
  1202. XCTAssertNotNil(accessControl)
  1203. }
  1204. do {
  1205. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1206. let policy: AuthenticationPolicy = [.touchIDAny, .and, .devicePasscode]
  1207. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1208. var error: Unmanaged<CFError>?
  1209. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1210. XCTAssertNil(error)
  1211. XCTAssertNotNil(accessControl)
  1212. }
  1213. #endif
  1214. #if os(OSX)
  1215. do {
  1216. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1217. let policy: AuthenticationPolicy = [.userPresence]
  1218. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1219. var error: Unmanaged<CFError>?
  1220. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1221. XCTAssertNil(error)
  1222. XCTAssertNotNil(accessControl)
  1223. }
  1224. do {
  1225. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1226. let policy: AuthenticationPolicy = [.devicePasscode]
  1227. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1228. var error: Unmanaged<CFError>?
  1229. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1230. XCTAssertNil(error)
  1231. XCTAssertNotNil(accessControl)
  1232. }
  1233. #endif
  1234. }
  1235. }