--- /dev/null
+/*
+ * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+
+#include "secd_regressions.h"
+
+#include <securityd/SecDbItem.h>
+#include <utilities/array_size.h>
+#include <utilities/SecCFWrappers.h>
+#include <utilities/SecFileLocations.h>
+#include <utilities/fileIo.h>
+
+#include <securityd/SOSCloudCircleServer.h>
+#include <securityd/SecItemServer.h>
+
+#include <Security/SecBasePriv.h>
+
+#include <AssertMacros.h>
+
+#include <stdio.h>
+#include <unistd.h>
+#include <sys/stat.h>
+#include <pthread.h>
+
+#include "SecdTestKeychainUtilities.h"
+
+static OSStatus do_query(void)
+{
+ /* querying a password */
+ const void *keys[] = {
+ kSecClass,
+ kSecAttrServer,
+ kSecReturnAttributes,
+ };
+ const void *values[] = {
+ kSecClassInternetPassword,
+ CFSTR("corrupt.spamcop.net"),
+ kCFBooleanTrue,
+ };
+ CFDictionaryRef query = CFDictionaryCreate(NULL, keys, values,
+ array_size(keys), NULL, NULL);
+ CFTypeRef results = NULL;
+
+ OSStatus err = SecItemCopyMatching(query, &results);
+ CFReleaseNull(query);
+ return err;
+}
+
+static void *do_add(void *arg)
+{
+ int tid=(int)(arg);
+
+ for(int i=0;i<20;i++) {
+ /* Creating a password */
+ SInt32 v_eighty = (tid+1)*1000+i;
+ CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
+ const char *v_data = "test";
+ CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
+ const void *keys[] = {
+ kSecClass,
+ kSecAttrServer,
+ kSecAttrAccount,
+ kSecAttrPort,
+ kSecAttrProtocol,
+ kSecAttrAuthenticationType,
+ kSecValueData
+ };
+ const void *values[] = {
+ kSecClassInternetPassword,
+ CFSTR("members.spamcop.net"),
+ CFSTR("smith"),
+ eighty,
+ CFSTR("http"),
+ CFSTR("dflt"),
+ pwdata
+ };
+
+ CFDictionaryRef item = CFDictionaryCreate(NULL, keys, values,
+ array_size(keys), NULL, NULL);
+
+ ok_status(SecItemAdd(item, NULL), "add internet password");
+ CFReleaseNull(item);
+ CFReleaseNull(eighty);
+ CFReleaseNull(pwdata);
+ }
+
+ return NULL;
+}
+
+
+#define N_THREADS 10
+
+static const char *corrupt_item_sql = "UPDATE inet SET data=X'12345678' WHERE rowid=1";
+
+
+int secd_03_corrupted_items(int argc, char *const *argv)
+{
+ plan_tests(4 + N_THREADS*21 + kSecdTestSetupTestCount);
+
+ /* custom keychain dir */
+ secd_test_setup_temp_keychain("secd_03_corrupted_items", NULL);
+
+ /* add a password */
+ int v_eighty = 80;
+ CFNumberRef eighty = CFNumberCreate(NULL, kCFNumberSInt32Type, &v_eighty);
+ const char *v_data = "test";
+ CFDataRef pwdata = CFDataCreate(NULL, (UInt8 *)v_data, strlen(v_data));
+ CFMutableDictionaryRef query = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
+ CFDictionaryAddValue(query, kSecClass, kSecClassInternetPassword);
+ CFDictionaryAddValue(query, kSecAttrServer, CFSTR("corrupt.spamcop.net"));
+ CFDictionaryAddValue(query, kSecAttrAccount, CFSTR("smith"));
+ CFDictionaryAddValue(query, kSecAttrPort, eighty);
+ CFDictionaryAddValue(query, kSecAttrProtocol, kSecAttrProtocolHTTP);
+ CFDictionaryAddValue(query, kSecAttrAuthenticationType, kSecAttrAuthenticationTypeDefault);
+ CFDictionaryAddValue(query, kSecValueData, pwdata);
+ ok_status(SecItemAdd(query, NULL), "add internet password");
+
+ /* corrupt the password */
+ CFStringRef keychain_path_cf = __SecKeychainCopyPath();
+
+ CFStringPerformWithCString(keychain_path_cf, ^(const char *keychain_path) {
+ /* Create a new keychain sqlite db */
+ sqlite3 *db;
+
+ is(sqlite3_open(keychain_path, &db), SQLITE_OK, "create keychain");
+ is(sqlite3_exec(db, corrupt_item_sql, NULL, NULL, NULL), SQLITE_OK,
+ "corrupting keychain item1");
+
+ });
+
+ pthread_t add_thread[N_THREADS];
+ void *add_err[N_THREADS] = {NULL,};
+
+ for(int i=0; i<N_THREADS; i++)
+ pthread_create(&add_thread[i], NULL, do_add, (void*)(intptr_t)i);
+
+ is_status(do_query(), errSecItemNotFound, "query");
+
+ for(int i=0; i<N_THREADS; i++)
+ pthread_join(add_thread[i], &add_err[i]);
+
+ for(int i=0; i<N_THREADS; i++)
+ ok(add_err[i]==NULL, "add thread");
+
+ CFReleaseNull(query);
+ CFReleaseNull(eighty);
+ CFReleaseNull(pwdata);
+ CFReleaseNull(keychain_path_cf);
+
+ return 0;
+}