1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
use core_foundation::base::TCFType;
use core_foundation::string::CFString;
use security_framework_sys::item::*;
use ItemSearchOptionsInternals;
use keychain::SecKeychain;
use os::macos::PrivKeyType;
use item::ItemSearchOptions;
#[allow(missing_docs)]
#[derive(Debug, Copy, Clone)]
pub enum KeyType {
Rsa,
Dsa,
Aes,
Des,
TripleDes,
Rc4,
Cast,
#[cfg(feature = "OSX_10_9")]
Ec,
}
impl PrivKeyType for KeyType {
fn to_str(&self) -> CFString {
unsafe {
let raw = match *self {
KeyType::Rsa => kSecAttrKeyTypeRSA,
KeyType::Dsa => kSecAttrKeyTypeDSA,
KeyType::Aes => kSecAttrKeyTypeAES,
KeyType::Des => kSecAttrKeyTypeDES,
KeyType::TripleDes => kSecAttrKeyType3DES,
KeyType::Rc4 => kSecAttrKeyTypeRC4,
KeyType::Cast => kSecAttrKeyTypeCAST,
#[cfg(feature = "OSX_10_9")]
KeyType::Ec => kSecAttrKeyTypeEC,
};
CFString::wrap_under_get_rule(raw)
}
}
}
pub trait ItemSearchOptionsExt {
fn keychains(&mut self, keychains: &[SecKeychain]) -> &mut Self;
}
impl ItemSearchOptionsExt for ItemSearchOptions {
fn keychains(&mut self, keychains: &[SecKeychain]) -> &mut ItemSearchOptions {
ItemSearchOptionsInternals::keychains(self, keychains)
}
}
#[cfg(test)]
mod test {
use tempdir::TempDir;
use item::*;
use os::macos::certificate::SecCertificateExt;
use os::macos::test::keychain;
#[test]
fn find_certificate() {
let dir = p!(TempDir::new("find_certificate"));
let keychain = keychain(dir.path());
let results = p!(ItemSearchOptions::new()
.keychains(&[keychain])
.class(ItemClass::Certificate)
.search());
assert_eq!(1, results.len());
let certificate = match results[0].reference {
Some(Reference::Certificate(ref cert)) => cert,
_ => panic!("expected certificate"),
};
assert_eq!("foobar.com", p!(certificate.common_name()).to_string());
}
}