2012-08-22 05:44:07 +08:00
|
|
|
// RUN: %clang_cc1 -analyze -analyzer-checker=osx.SecKeychainAPI %s -verify
|
2011-08-02 06:40:01 +08:00
|
|
|
|
|
|
|
// Fake typedefs.
|
|
|
|
typedef unsigned int OSStatus;
|
|
|
|
typedef unsigned int SecKeychainAttributeList;
|
|
|
|
typedef unsigned int SecKeychainItemRef;
|
|
|
|
typedef unsigned int SecItemClass;
|
|
|
|
typedef unsigned int UInt32;
|
|
|
|
typedef unsigned int CFTypeRef;
|
|
|
|
typedef unsigned int UInt16;
|
|
|
|
typedef unsigned int SecProtocolType;
|
|
|
|
typedef unsigned int SecAuthenticationType;
|
2011-08-05 06:40:38 +08:00
|
|
|
typedef unsigned int SecKeychainAttributeInfo;
|
2011-08-02 06:40:01 +08:00
|
|
|
enum {
|
|
|
|
noErr = 0,
|
|
|
|
GenericError = 1
|
|
|
|
};
|
|
|
|
|
|
|
|
// Functions that allocate data.
|
|
|
|
OSStatus SecKeychainItemCopyContent (
|
|
|
|
SecKeychainItemRef itemRef,
|
|
|
|
SecItemClass *itemClass,
|
|
|
|
SecKeychainAttributeList *attrList,
|
|
|
|
UInt32 *length,
|
|
|
|
void **outData
|
|
|
|
);
|
|
|
|
OSStatus SecKeychainFindGenericPassword (
|
|
|
|
CFTypeRef keychainOrArray,
|
|
|
|
UInt32 serviceNameLength,
|
|
|
|
const char *serviceName,
|
|
|
|
UInt32 accountNameLength,
|
|
|
|
const char *accountName,
|
|
|
|
UInt32 *passwordLength,
|
|
|
|
void **passwordData,
|
|
|
|
SecKeychainItemRef *itemRef
|
|
|
|
);
|
|
|
|
OSStatus SecKeychainFindInternetPassword (
|
|
|
|
CFTypeRef keychainOrArray,
|
|
|
|
UInt32 serverNameLength,
|
|
|
|
const char *serverName,
|
|
|
|
UInt32 securityDomainLength,
|
|
|
|
const char *securityDomain,
|
|
|
|
UInt32 accountNameLength,
|
|
|
|
const char *accountName,
|
|
|
|
UInt32 pathLength,
|
|
|
|
const char *path,
|
|
|
|
UInt16 port,
|
|
|
|
SecProtocolType protocol,
|
|
|
|
SecAuthenticationType authenticationType,
|
|
|
|
UInt32 *passwordLength,
|
|
|
|
void **passwordData,
|
|
|
|
SecKeychainItemRef *itemRef
|
|
|
|
);
|
2011-08-05 06:40:38 +08:00
|
|
|
OSStatus SecKeychainItemCopyAttributesAndData (
|
|
|
|
SecKeychainItemRef itemRef,
|
|
|
|
SecKeychainAttributeInfo *info,
|
|
|
|
SecItemClass *itemClass,
|
|
|
|
SecKeychainAttributeList **attrList,
|
|
|
|
UInt32 *length,
|
|
|
|
void **outData
|
|
|
|
);
|
2011-08-02 06:40:01 +08:00
|
|
|
|
2011-08-05 06:40:38 +08:00
|
|
|
// Functions which free data.
|
2011-08-02 06:40:01 +08:00
|
|
|
OSStatus SecKeychainItemFreeContent (
|
|
|
|
SecKeychainAttributeList *attrList,
|
|
|
|
void *data
|
|
|
|
);
|
2011-08-05 06:40:38 +08:00
|
|
|
OSStatus SecKeychainItemFreeAttributesAndData (
|
|
|
|
SecKeychainAttributeList *attrList,
|
|
|
|
void *data
|
|
|
|
);
|
2011-08-02 06:40:01 +08:00
|
|
|
|
2011-08-04 08:26:57 +08:00
|
|
|
void errRetVal() {
|
2011-08-13 05:56:43 +08:00
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
2012-11-16 03:11:43 +08:00
|
|
|
if (st == GenericError)
|
2011-12-02 00:41:58 +08:00
|
|
|
SecKeychainItemFreeContent(ptr, outData); // expected-warning{{Only call free if a valid (non-NULL) buffer was returned}}
|
2012-11-16 03:11:43 +08:00
|
|
|
} // expected-warning{{Allocated data is not released: missing a call to 'SecKeychainItemFreeContent'}}
|
2011-08-04 08:26:57 +08:00
|
|
|
|
|
|
|
// If null is passed in, the data is not allocated, so no need for the matching free.
|
|
|
|
void fooDoNotReportNull() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 *length = 0;
|
|
|
|
void **outData = 0;
|
|
|
|
SecKeychainItemCopyContent(2, ptr, ptr, 0, 0);
|
|
|
|
SecKeychainItemCopyContent(2, ptr, ptr, length, outData);
|
|
|
|
}// no-warning
|
|
|
|
|
2011-08-05 06:40:38 +08:00
|
|
|
void doubleAlloc() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
2011-08-05 08:37:00 +08:00
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData); // expected-warning {{Allocated data should be released before another call to the allocator:}}
|
|
|
|
if (st == noErr)
|
|
|
|
SecKeychainItemFreeContent(ptr, outData);
|
|
|
|
}
|
2011-08-05 06:40:38 +08:00
|
|
|
|
2011-08-04 08:26:57 +08:00
|
|
|
void fooOnlyFree() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData = &length;
|
|
|
|
SecKeychainItemFreeContent(ptr, outData);// expected-warning{{Trying to free data which has not been allocated}}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do not warn if undefined value is passed to a function.
|
|
|
|
void fooOnlyFreeUndef() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
SecKeychainItemFreeContent(ptr, outData);
|
|
|
|
}// no-warning
|
|
|
|
|
|
|
|
// Do not warn if the address is a parameter in the enclosing function.
|
2011-08-05 06:40:38 +08:00
|
|
|
void fooOnlyFreeParam(void *attrList, void* X) {
|
|
|
|
SecKeychainItemFreeContent(attrList, X);
|
2011-08-04 08:26:57 +08:00
|
|
|
}// no-warning
|
|
|
|
|
2011-08-13 05:56:43 +08:00
|
|
|
// If we are returning the value, do not report.
|
2011-08-04 08:26:57 +08:00
|
|
|
void* returnContent() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
return outData;
|
|
|
|
} // no-warning
|
|
|
|
|
2012-02-21 08:00:44 +08:00
|
|
|
// Password was passed in as an argument and does not have to be deleted.
|
2011-08-13 06:47:22 +08:00
|
|
|
OSStatus getPasswordAndItem(void** password, UInt32* passwordLength) {
|
2011-08-13 10:10:15 +08:00
|
|
|
OSStatus err;
|
|
|
|
SecKeychainItemRef item;
|
|
|
|
err = SecKeychainFindGenericPassword(0, 3, "xx", 3, "xx",
|
|
|
|
passwordLength, password, &item);
|
|
|
|
return err;
|
2011-08-13 06:47:22 +08:00
|
|
|
} // no-warning
|
|
|
|
|
2011-08-13 10:10:15 +08:00
|
|
|
// Make sure we do not report an error if we call free only if password != 0.
|
2011-08-17 00:30:24 +08:00
|
|
|
// Also, do not report double allocation if first allocation returned an error.
|
|
|
|
OSStatus testSecKeychainFindGenericPassword(UInt32* passwordLength,
|
|
|
|
CFTypeRef keychainOrArray, SecProtocolType protocol,
|
|
|
|
SecAuthenticationType authenticationType) {
|
2011-08-13 10:10:15 +08:00
|
|
|
OSStatus err;
|
|
|
|
SecKeychainItemRef item;
|
|
|
|
void *password;
|
|
|
|
err = SecKeychainFindGenericPassword(0, 3, "xx", 3, "xx",
|
|
|
|
passwordLength, &password, &item);
|
2011-08-17 00:30:24 +08:00
|
|
|
if( err == GenericError ) {
|
|
|
|
err = SecKeychainFindInternetPassword(keychainOrArray,
|
|
|
|
16, "server", 16, "domain", 16, "account",
|
|
|
|
16, "path", 222, protocol, authenticationType,
|
|
|
|
passwordLength, &(password), 0);
|
|
|
|
}
|
|
|
|
|
2011-08-13 10:10:15 +08:00
|
|
|
if (err == noErr && password) {
|
|
|
|
SecKeychainItemFreeContent(0, password);
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2011-08-05 06:40:38 +08:00
|
|
|
int apiMismatch(SecKeychainItemRef itemRef,
|
|
|
|
SecKeychainAttributeInfo *info,
|
|
|
|
SecItemClass *itemClass) {
|
|
|
|
OSStatus st = 0;
|
|
|
|
SecKeychainAttributeList *attrList;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
|
|
|
|
st = SecKeychainItemCopyAttributesAndData(itemRef, info, itemClass,
|
|
|
|
&attrList, &length, &outData);
|
|
|
|
if (st == noErr)
|
2011-08-23 07:18:12 +08:00
|
|
|
SecKeychainItemFreeContent(attrList, outData); // expected-warning{{Deallocator doesn't match the allocator}}
|
2011-08-05 06:40:38 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ErrorCodesFromDifferentAPISDoNotInterfere(SecKeychainItemRef itemRef,
|
|
|
|
SecKeychainAttributeInfo *info,
|
|
|
|
SecItemClass *itemClass) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
OSStatus st2 = 0;
|
|
|
|
SecKeychainAttributeList *attrList;
|
|
|
|
UInt32 length2;
|
|
|
|
void *outData2;
|
|
|
|
|
|
|
|
st2 = SecKeychainItemCopyAttributesAndData(itemRef, info, itemClass,
|
|
|
|
&attrList, &length2, &outData2);
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
if (st == noErr) {
|
|
|
|
SecKeychainItemFreeContent(ptr, outData);
|
|
|
|
if (st2 == noErr) {
|
|
|
|
SecKeychainItemFreeAttributesAndData(attrList, outData2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0; // expected-warning{{Allocated data is not released: missing a call to 'SecKeychainItemFreeAttributesAndData'}}
|
|
|
|
}
|
|
|
|
|
2011-08-13 10:10:15 +08:00
|
|
|
int foo(CFTypeRef keychainOrArray, SecProtocolType protocol,
|
|
|
|
SecAuthenticationType authenticationType, SecKeychainItemRef *itemRef) {
|
2011-08-02 06:40:01 +08:00
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
|
|
|
|
UInt32 length;
|
2011-08-13 05:56:43 +08:00
|
|
|
void *outData[5];
|
2011-08-02 06:40:01 +08:00
|
|
|
|
2011-08-13 10:10:15 +08:00
|
|
|
st = SecKeychainFindInternetPassword(keychainOrArray,
|
|
|
|
16, "server", 16, "domain", 16, "account",
|
|
|
|
16, "path", 222, protocol, authenticationType,
|
|
|
|
&length, &(outData[3]), itemRef);
|
2011-08-13 05:56:43 +08:00
|
|
|
if (length == 5) {
|
|
|
|
if (st == noErr)
|
|
|
|
SecKeychainItemFreeContent(ptr, outData[3]);
|
|
|
|
}
|
Allow multiple PathDiagnosticConsumers to be used with a BugReporter at the same time.
This fixes several issues:
- removes egregious hack where PlistDiagnosticConsumer would forward to HTMLDiagnosticConsumer,
but diagnostics wouldn't be generated consistently in the same way if PlistDiagnosticConsumer
was used by itself.
- emitting diagnostics to the terminal (using clang's diagnostic machinery) is no longer a special
case, just another PathDiagnosticConsumer. This also magically resolved some duplicate warnings,
as we now use PathDiagnosticConsumer's diagnostic pruning, which has scope for the entire translation
unit, not just the scope of a BugReporter (which is limited to a particular ExprEngine).
As an interesting side-effect, diagnostics emitted to the terminal also have their trailing "." stripped,
just like with diagnostics emitted to plists and HTML. This required some tests to be updated, but now
the tests have higher fidelity with what users will see.
There are some inefficiencies in this patch. We currently generate the report graph (from the ExplodedGraph)
once per PathDiagnosticConsumer, which is a bit wasteful, but that could be pulled up higher in the
logic stack. There is some intended duplication, however, as we now generate different PathDiagnostics (for the same issue)
for different PathDiagnosticConsumers. This is necessary to produce the diagnostics that a particular
consumer expects.
llvm-svn: 162028
2012-08-17 01:45:23 +08:00
|
|
|
if (length) { // expected-warning{{Allocated data is not released: missing a call to 'SecKeychainItemFreeContent'}}
|
2011-08-13 05:56:43 +08:00
|
|
|
length++;
|
|
|
|
}
|
2011-08-02 06:40:01 +08:00
|
|
|
return 0;
|
2011-08-04 08:26:57 +08:00
|
|
|
}// no-warning
|
2011-08-23 07:18:12 +08:00
|
|
|
|
|
|
|
void free(void *ptr);
|
|
|
|
void deallocateWithFree() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
if (st == noErr)
|
|
|
|
free(outData); // expected-warning{{Deallocator doesn't match the allocator: 'SecKeychainItemFreeContent' should be used}}
|
|
|
|
}
|
|
|
|
|
2011-08-24 08:06:27 +08:00
|
|
|
// Typesdefs for CFStringCreateWithBytesNoCopy.
|
|
|
|
typedef char uint8_t;
|
|
|
|
typedef signed long CFIndex;
|
|
|
|
typedef UInt32 CFStringEncoding;
|
|
|
|
typedef unsigned Boolean;
|
|
|
|
typedef const struct __CFString * CFStringRef;
|
|
|
|
typedef const struct __CFAllocator * CFAllocatorRef;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorDefault;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorSystemDefault;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorMalloc;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorMallocZone;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorNull;
|
|
|
|
extern const CFAllocatorRef kCFAllocatorUseContext;
|
|
|
|
CFStringRef CFStringCreateWithBytesNoCopy(CFAllocatorRef alloc, const uint8_t *bytes, CFIndex numBytes, CFStringEncoding encoding, Boolean externalFormat, CFAllocatorRef contentsDeallocator);
|
|
|
|
extern void CFRelease(CFStringRef cf);
|
|
|
|
|
|
|
|
void DellocWithCFStringCreate1(CFAllocatorRef alloc) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *bytes;
|
|
|
|
char * x;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &bytes);
|
|
|
|
if (st == noErr) {
|
|
|
|
CFStringRef userStr = CFStringCreateWithBytesNoCopy(alloc, bytes, length, 5, 0, kCFAllocatorDefault); // expected-warning{{Deallocator doesn't match the allocator:}}
|
|
|
|
CFRelease(userStr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void DellocWithCFStringCreate2(CFAllocatorRef alloc) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *bytes;
|
|
|
|
char * x;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &bytes);
|
|
|
|
if (st == noErr) {
|
2012-02-28 09:54:22 +08:00
|
|
|
CFStringRef userStr = CFStringCreateWithBytesNoCopy(alloc, bytes, length, 5, 0, kCFAllocatorNull); // expected-warning{{Allocated data is not released}}
|
|
|
|
CFRelease(userStr);
|
2011-08-24 08:06:27 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void DellocWithCFStringCreate3(CFAllocatorRef alloc) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *bytes;
|
|
|
|
char * x;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &bytes);
|
|
|
|
if (st == noErr) {
|
|
|
|
CFStringRef userStr = CFStringCreateWithBytesNoCopy(alloc, bytes, length, 5, 0, kCFAllocatorUseContext);
|
|
|
|
CFRelease(userStr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void DellocWithCFStringCreate4(CFAllocatorRef alloc) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *bytes;
|
|
|
|
char * x;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &bytes);
|
|
|
|
if (st == noErr) {
|
|
|
|
CFStringRef userStr = CFStringCreateWithBytesNoCopy(alloc, bytes, length, 5, 0, 0); // expected-warning{{Deallocator doesn't match the allocator:}}
|
|
|
|
CFRelease(userStr);
|
|
|
|
}
|
|
|
|
}
|
2011-08-30 04:05:54 +08:00
|
|
|
|
2013-01-08 03:13:00 +08:00
|
|
|
static CFAllocatorRef gKeychainDeallocator = 0;
|
|
|
|
|
|
|
|
static CFAllocatorRef GetKeychainDeallocator() {
|
|
|
|
return gKeychainDeallocator;
|
|
|
|
}
|
|
|
|
|
|
|
|
CFStringRef DellocWithCFStringCreate5(CFAllocatorRef alloc) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *bytes;
|
|
|
|
char * x;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &bytes);
|
|
|
|
if (st == noErr) {
|
|
|
|
return CFStringCreateWithBytesNoCopy(alloc, bytes, length, 5, 0, GetKeychainDeallocator()); // no-warning
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-12-02 00:41:58 +08:00
|
|
|
void radar10508828() {
|
|
|
|
UInt32 pwdLen = 0;
|
|
|
|
void* pwdBytes = 0;
|
|
|
|
OSStatus rc = SecKeychainFindGenericPassword(0, 3, "foo", 3, "bar", &pwdLen, &pwdBytes, 0);
|
|
|
|
#pragma unused(rc)
|
|
|
|
if (pwdBytes)
|
|
|
|
SecKeychainItemFreeContent(0, pwdBytes);
|
|
|
|
}
|
|
|
|
|
|
|
|
void radar10508828_2() {
|
|
|
|
UInt32 pwdLen = 0;
|
|
|
|
void* pwdBytes = 0;
|
|
|
|
OSStatus rc = SecKeychainFindGenericPassword(0, 3, "foo", 3, "bar", &pwdLen, &pwdBytes, 0);
|
Allow multiple PathDiagnosticConsumers to be used with a BugReporter at the same time.
This fixes several issues:
- removes egregious hack where PlistDiagnosticConsumer would forward to HTMLDiagnosticConsumer,
but diagnostics wouldn't be generated consistently in the same way if PlistDiagnosticConsumer
was used by itself.
- emitting diagnostics to the terminal (using clang's diagnostic machinery) is no longer a special
case, just another PathDiagnosticConsumer. This also magically resolved some duplicate warnings,
as we now use PathDiagnosticConsumer's diagnostic pruning, which has scope for the entire translation
unit, not just the scope of a BugReporter (which is limited to a particular ExprEngine).
As an interesting side-effect, diagnostics emitted to the terminal also have their trailing "." stripped,
just like with diagnostics emitted to plists and HTML. This required some tests to be updated, but now
the tests have higher fidelity with what users will see.
There are some inefficiencies in this patch. We currently generate the report graph (from the ExplodedGraph)
once per PathDiagnosticConsumer, which is a bit wasteful, but that could be pulled up higher in the
logic stack. There is some intended duplication, however, as we now generate different PathDiagnostics (for the same issue)
for different PathDiagnosticConsumers. This is necessary to produce the diagnostics that a particular
consumer expects.
llvm-svn: 162028
2012-08-17 01:45:23 +08:00
|
|
|
SecKeychainItemFreeContent(0, pwdBytes); // expected-warning {{Only call free if a valid (non-NULL) buffer was returned}}
|
2011-12-02 00:41:58 +08:00
|
|
|
}
|
|
|
|
|
2011-08-30 04:05:54 +08:00
|
|
|
//Example from bug 10797.
|
|
|
|
__inline__ static
|
|
|
|
const char *__WBASLLevelString(int level) {
|
|
|
|
return "foo";
|
|
|
|
}
|
2011-08-30 04:43:37 +08:00
|
|
|
|
|
|
|
static int *bug10798(int *p, int columns, int prevRow) {
|
|
|
|
int *row = 0;
|
|
|
|
row = p + prevRow * columns;
|
|
|
|
prevRow += 2;
|
|
|
|
do {
|
|
|
|
++prevRow;
|
|
|
|
row+=columns;
|
|
|
|
} while(10 >= row[1]);
|
|
|
|
return row;
|
|
|
|
}
|
2012-02-21 08:00:44 +08:00
|
|
|
|
|
|
|
// Test inter-procedural behaviour.
|
|
|
|
|
|
|
|
void my_FreeParam(void *attrList, void* X) {
|
|
|
|
SecKeychainItemFreeContent(attrList, X);
|
|
|
|
}
|
|
|
|
|
|
|
|
void *my_AllocateReturn(OSStatus *st) {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
*st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
return outData;
|
|
|
|
}
|
|
|
|
|
|
|
|
OSStatus my_Allocate_Param(void** password, UInt32* passwordLength) {
|
|
|
|
OSStatus err;
|
|
|
|
SecKeychainItemRef item;
|
|
|
|
err = SecKeychainFindGenericPassword(0, 3, "xx", 3, "xx",
|
|
|
|
passwordLength, password, &item);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
void allocAndFree1() {
|
|
|
|
unsigned int *ptr = 0;
|
|
|
|
OSStatus st = 0;
|
|
|
|
UInt32 length;
|
|
|
|
void *outData;
|
|
|
|
st = SecKeychainItemCopyContent(2, ptr, ptr, &length, &outData);
|
|
|
|
if (st == noErr)
|
|
|
|
my_FreeParam(ptr, outData);
|
|
|
|
}
|
|
|
|
|
2012-02-24 06:53:29 +08:00
|
|
|
void consumeChar(char);
|
|
|
|
|
|
|
|
void allocNoFree2(int x) {
|
2012-02-21 08:00:44 +08:00
|
|
|
OSStatus st = 0;
|
2012-02-24 06:53:29 +08:00
|
|
|
void *outData = my_AllocateReturn(&st);
|
|
|
|
if (x) {
|
|
|
|
consumeChar(*(char*)outData); // expected-warning{{Allocated data is not released:}}
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
consumeChar(*(char*)outData);
|
|
|
|
}
|
|
|
|
return;
|
2012-02-21 08:00:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void allocAndFree2(void *attrList) {
|
|
|
|
OSStatus st = 0;
|
|
|
|
void *outData = my_AllocateReturn(&st);
|
|
|
|
if (st == noErr)
|
|
|
|
my_FreeParam(attrList, outData);
|
|
|
|
}
|
|
|
|
|
|
|
|
void allocNoFree3() {
|
|
|
|
UInt32 length = 32;
|
2012-02-28 11:07:06 +08:00
|
|
|
void *outData;
|
|
|
|
void *outData2;
|
2012-02-21 08:00:44 +08:00
|
|
|
OSStatus st = my_Allocate_Param(&outData, &length); // expected-warning{{Allocated data is not released}}
|
2012-02-28 11:07:06 +08:00
|
|
|
st = my_Allocate_Param(&outData2, &length); // expected-warning{{Allocated data is not released}}
|
2012-02-21 08:00:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void allocAndFree3(void *attrList) {
|
|
|
|
UInt32 length = 32;
|
|
|
|
void *outData;
|
|
|
|
OSStatus st = my_Allocate_Param(&outData, &length);
|
|
|
|
if (st == noErr)
|
|
|
|
SecKeychainItemFreeContent(attrList, outData);
|
|
|
|
}
|
|
|
|
|