]> git.saurik.com Git - apple/security.git/blobdiff - OSX/sec/securityd/Regressions/secd-03-corrupted-items.c
Security-57336.1.9.tar.gz
[apple/security.git] / OSX / sec / securityd / Regressions / secd-03-corrupted-items.c
diff --git a/OSX/sec/securityd/Regressions/secd-03-corrupted-items.c b/OSX/sec/securityd/Regressions/secd-03-corrupted-items.c
new file mode 100644 (file)
index 0000000..a8b81f5
--- /dev/null
@@ -0,0 +1,171 @@
+/*
+ * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+
+#include "secd_regressions.h"
+
+#include <securityd/SecDbItem.h>
+#include <utilities/array_size.h>
+#include <utilities/SecCFWrappers.h>
+#include <utilities/SecFileLocations.h>
+#include <utilities/fileIo.h>
+
+#include <securityd/SOSCloudCircleServer.h>
+#include <securityd/SecItemServer.h>
+
+#include <Security/SecBasePriv.h>
+
+#include <AssertMacros.h>
+
+#include <stdio.h>
+#include <unistd.h>
+#include <sys/stat.h>
+#include <pthread.h>
+
+#include "SecdTestKeychainUtilities.h"
+
+static OSStatus do_query(void)
+{
+    /* querying a password */
+    const void *keys[] = {
+        kSecClass,
+        kSecAttrServer,
+        kSecReturnAttributes,
+    };
+    const void *values[] = {
+        kSecClassInternetPassword,
+        CFSTR("corrupt.spamcop.net"),
+        kCFBooleanTrue,
+    };
+    CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
+                                              array_size(keys), NULL, NULL);
+    CFTypeRef results = NULL;
+
+    OSStatus err = SecItemCopyMatching(query, &results);
+    CFReleaseNull(query);
+    return err;
+}
+
+static void *do_add(void *arg)
+{
+    int tid=(int)(arg);
+    
+    for(int i=0;i<20;i++) {
+        /* Creating a password */
+        SInt32 v_eighty = (tid+1)*1000+i;
+        CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
+        const char *v_data = "test";
+        CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
+        const void *keys[] = {
+            kSecClass,
+            kSecAttrServer,
+            kSecAttrAccount,
+            kSecAttrPort,
+            kSecAttrProtocol,
+            kSecAttrAuthenticationType,
+            kSecValueData
+        };
+        const void *values[] = {
+            kSecClassInternetPassword,
+            CFSTR("members.spamcop.net"),
+            CFSTR("smith"),
+            eighty,
+            CFSTR("http"),
+            CFSTR("dflt"),
+            pwdata
+        };
+
+        CFDictionaryRef item = CFDictionaryCreate(NULL, keys, values,
+                                                  array_size(keys), NULL, NULL);
+
+        ok_status(SecItemAdd(item, NULL), "add internet password");
+        CFReleaseNull(item);
+        CFReleaseNull(eighty);
+        CFReleaseNull(pwdata);
+    }
+
+    return NULL;
+}
+
+
+#define N_THREADS 10
+
+static const char *corrupt_item_sql = "UPDATE inet SET data=X'12345678' WHERE rowid=1";
+
+
+int secd_03_corrupted_items(int argc, char *const *argv)
+{
+    plan_tests(4 + N_THREADS*21 + kSecdTestSetupTestCount);
+    
+    /* custom keychain dir */
+    secd_test_setup_temp_keychain("secd_03_corrupted_items", NULL);
+
+    /* add a password */
+    int v_eighty = 80;
+    CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
+    const char *v_data = "test";
+    CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
+    CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
+    CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
+    CFDictionaryAddValue(query, kSecAttrServer, CFSTR("corrupt.spamcop.net"));
+    CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
+    CFDictionaryAddValue(query, kSecAttrPort, eighty);
+    CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
+    CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
+    CFDictionaryAddValue(query, kSecValueData, pwdata);
+    ok_status(SecItemAdd(query, NULL), "add internet password");
+
+    /* corrupt the password */
+    CFStringRef keychain_path_cf = __SecKeychainCopyPath();
+
+    CFStringPerformWithCString(keychain_path_cf, ^(const char *keychain_path) {
+        /* Create a new keychain sqlite db */
+        sqlite3 *db;
+        
+        is(sqlite3_open(keychain_path, &db), SQLITE_OK, "create keychain");
+        is(sqlite3_exec(db, corrupt_item_sql, NULL, NULL, NULL), SQLITE_OK,
+           "corrupting keychain item1");
+
+    });
+
+    pthread_t add_thread[N_THREADS];
+    void *add_err[N_THREADS] = {NULL,};
+
+    for(int i=0; i<N_THREADS; i++)
+        pthread_create(&add_thread[i], NULL, do_add, (void*)(intptr_t)i);
+
+    is_status(do_query(), errSecItemNotFound, "query");
+
+    for(int i=0; i<N_THREADS; i++)
+        pthread_join(add_thread[i], &add_err[i]);
+
+    for(int i=0; i<N_THREADS; i++)
+        ok(add_err[i]==NULL, "add thread");
+
+    CFReleaseNull(query);
+    CFReleaseNull(eighty);
+    CFReleaseNull(pwdata);
+    CFReleaseNull(keychain_path_cf);
+    
+    return 0;
+}