]> git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_keychain/regressions/kc-20-identity-find-stress.c
Security-58286.1.32.tar.gz
[apple/security.git] / OSX / libsecurity_keychain / regressions / kc-20-identity-find-stress.c
1 /*
2 * Copyright (c) 2016 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the xLicense.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 #import <Security/Security.h>
25 #import <Security/SecCertificatePriv.h>
26
27 #include "keychain_regressions.h"
28 #include "kc-helpers.h"
29 #include "kc-identity-helpers.h"
30
31 #include <Security/Security.h>
32 #include <stdlib.h>
33
34 #define BLOCKS 7000
35
36 static long concurrentBlocks = 64;
37
38 static void tests() {
39
40 SecKeychainRef kc = getPopulatedTestKeychain();
41
42 SecIdentityRef identity = NULL;
43 SecCertificateRef certRef = NULL;
44 SecKeyRef keyRef = NULL;
45
46 identity = copyFirstIdentity(kc);
47 ok_status(SecIdentityCopyCertificate(identity, &certRef), "%s: SecIdentityCopyCertificate", testName);
48 ok_status(SecIdentityCopyPrivateKey(identity, &keyRef), "%s: SecIdentityCopyPrivateKey", testName);
49
50 CFReleaseNull(identity);
51 CFReleaseNull(keyRef);
52
53 static dispatch_once_t onceToken = 0;
54 static dispatch_queue_t release_queue = NULL;
55 dispatch_once(&onceToken, ^{
56 release_queue = dispatch_queue_create("com.apple.security.identity-search-queue", DISPATCH_QUEUE_CONCURRENT);
57 });
58 dispatch_group_t g = dispatch_group_create();
59
60 __block int iteration = 0;
61 dispatch_semaphore_t semaphore = dispatch_semaphore_create(concurrentBlocks);
62
63 dispatch_block_t identityBlock = ^() {
64 SecIdentityRef blockId = NULL;
65 SecKeyRef blockKeyRef = NULL;
66
67 ok_status(SecIdentityCreateWithCertificate(kc, certRef, &blockId), "%s: SecIdentityCreateWithCertificate", testName);
68 ok_status(SecIdentityCopyPrivateKey(blockId, &blockKeyRef), "%s: SecIdentityCopyPrivateKey", testName);
69
70 CFReleaseNull(blockKeyRef);
71 CFReleaseNull(blockId);
72
73 dispatch_semaphore_signal(semaphore);
74 };
75
76 // Send this to background queue, so that when we wait, it doesn't block main queue
77
78 dispatch_group_async(g, dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
79 for (iteration = 0; iteration < BLOCKS; iteration++) {
80 // Wait until one of our concurrentBlocks "slots" are available
81 dispatch_semaphore_wait(semaphore, DISPATCH_TIME_FOREVER);
82
83 dispatch_group_async(g, release_queue, identityBlock);
84 }
85 });
86
87 dispatch_group_wait(g, DISPATCH_TIME_FOREVER);
88
89 ok_status(SecKeychainDelete(kc), "%s: SecKeychainDelete", testName);
90 CFReleaseNull(kc);
91 }
92
93 int kc_20_identity_find_stress(int argc, char *const *argv)
94 {
95 plan_tests(2*BLOCKS + 6);
96 initializeKeychainTests(__FUNCTION__);
97
98 tests();
99
100 deleteTestFiles();
101 return 0;
102 }