summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjsing <>2018-04-07 16:35:34 +0000
committerjsing <>2018-04-07 16:35:34 +0000
commitfa406a4e78813492e56384a03893357a094f6793 (patch)
tree00255fc63c35caf51fe96345ab5612a005915c5f
parent769107a3cc2677b916ec7283d1b1c89df9fbb318 (diff)
downloadopenbsd-fa406a4e78813492e56384a03893357a094f6793.tar.gz
openbsd-fa406a4e78813492e56384a03893357a094f6793.tar.bz2
openbsd-fa406a4e78813492e56384a03893357a094f6793.zip
Correct tls_config_clear_keys() behaviour.
Previously this incorrectly called tls_keypair_clear(), which results in the private key being cleared, along with the certificate, OCSP staple and pubkey hash. This breaks OCSP stapling if tls_config_clear_keys() is called following tls_configure(), as is done by httpd. Fix this by calling tls_keypair_clear_key() so that only the private key is cleared, leaving the other public data untouched. While here, remove tls_keypair_clear() and fold the necessary parts into tls_keypair_free(). ok beck@
-rw-r--r--src/lib/libtls/tls_config.c7
-rw-r--r--src/lib/libtls/tls_internal.h4
-rw-r--r--src/lib/libtls/tls_keypair.c37
3 files changed, 18 insertions, 30 deletions
diff --git a/src/lib/libtls/tls_config.c b/src/lib/libtls/tls_config.c
index d32176fe6e..07019252a7 100644
--- a/src/lib/libtls/tls_config.c
+++ b/src/lib/libtls/tls_config.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_config.c,v 1.51 2018/03/20 15:40:10 jsing Exp $ */ 1/* $OpenBSD: tls_config.c,v 1.52 2018/04/07 16:35:34 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -189,10 +189,7 @@ tls_config_clear_keys(struct tls_config *config)
189 struct tls_keypair *kp; 189 struct tls_keypair *kp;
190 190
191 for (kp = config->keypair; kp != NULL; kp = kp->next) 191 for (kp = config->keypair; kp != NULL; kp = kp->next)
192 tls_keypair_clear(kp); 192 tls_keypair_clear_key(kp);
193
194 tls_config_set_ca_mem(config, NULL, 0);
195 tls_config_set_crl_mem(config, NULL, 0);
196} 193}
197 194
198int 195int
diff --git a/src/lib/libtls/tls_internal.h b/src/lib/libtls/tls_internal.h
index 0d7e2289d3..b236204e81 100644
--- a/src/lib/libtls/tls_internal.h
+++ b/src/lib/libtls/tls_internal.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_internal.h,v 1.71 2018/03/19 16:34:47 jsing Exp $ */ 1/* $OpenBSD: tls_internal.h,v 1.72 2018/04/07 16:35:34 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org> 3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org>
4 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 4 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
@@ -199,7 +199,7 @@ int tls_set_mem(char **_dest, size_t *_destlen, const void *_src,
199int tls_set_string(const char **_dest, const char *_src); 199int tls_set_string(const char **_dest, const char *_src);
200 200
201struct tls_keypair *tls_keypair_new(void); 201struct tls_keypair *tls_keypair_new(void);
202void tls_keypair_clear(struct tls_keypair *_keypair); 202void tls_keypair_clear_key(struct tls_keypair *_keypair);
203void tls_keypair_free(struct tls_keypair *_keypair); 203void tls_keypair_free(struct tls_keypair *_keypair);
204int tls_keypair_set_cert_file(struct tls_keypair *_keypair, 204int tls_keypair_set_cert_file(struct tls_keypair *_keypair,
205 struct tls_error *_error, const char *_cert_file); 205 struct tls_error *_error, const char *_cert_file);
diff --git a/src/lib/libtls/tls_keypair.c b/src/lib/libtls/tls_keypair.c
index 03e7f4ad76..a98e5c2e7e 100644
--- a/src/lib/libtls/tls_keypair.c
+++ b/src/lib/libtls/tls_keypair.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_keypair.c,v 1.5 2018/02/10 04:57:35 jsing Exp $ */ 1/* $OpenBSD: tls_keypair.c,v 1.6 2018/04/07 16:35:34 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -29,14 +29,6 @@ tls_keypair_new(void)
29 return calloc(1, sizeof(struct tls_keypair)); 29 return calloc(1, sizeof(struct tls_keypair));
30} 30}
31 31
32static void
33tls_keypair_clear_key(struct tls_keypair *keypair)
34{
35 freezero(keypair->key_mem, keypair->key_len);
36 keypair->key_mem = NULL;
37 keypair->key_len = 0;
38}
39
40static int 32static int
41tls_keypair_pubkey_hash(struct tls_keypair *keypair, struct tls_error *error) 33tls_keypair_pubkey_hash(struct tls_keypair *keypair, struct tls_error *error)
42{ 34{
@@ -64,6 +56,14 @@ tls_keypair_pubkey_hash(struct tls_keypair *keypair, struct tls_error *error)
64 return (rv); 56 return (rv);
65} 57}
66 58
59void
60tls_keypair_clear_key(struct tls_keypair *keypair)
61{
62 freezero(keypair->key_mem, keypair->key_len);
63 keypair->key_mem = NULL;
64 keypair->key_len = 0;
65}
66
67int 67int
68tls_keypair_set_cert_file(struct tls_keypair *keypair, struct tls_error *error, 68tls_keypair_set_cert_file(struct tls_keypair *keypair, struct tls_error *error,
69 const char *cert_file) 69 const char *cert_file)
@@ -117,25 +117,16 @@ tls_keypair_set_ocsp_staple_mem(struct tls_keypair *keypair,
117} 117}
118 118
119void 119void
120tls_keypair_clear(struct tls_keypair *keypair)
121{
122 struct tls_error error;
123
124 tls_keypair_set_cert_mem(keypair, &error, NULL, 0);
125 tls_keypair_set_key_mem(keypair, &error, NULL, 0);
126 tls_keypair_set_ocsp_staple_mem(keypair, &error, NULL, 0);
127
128 free(keypair->pubkey_hash);
129 keypair->pubkey_hash = NULL;
130}
131
132void
133tls_keypair_free(struct tls_keypair *keypair) 120tls_keypair_free(struct tls_keypair *keypair)
134{ 121{
135 if (keypair == NULL) 122 if (keypair == NULL)
136 return; 123 return;
137 124
138 tls_keypair_clear(keypair); 125 tls_keypair_clear_key(keypair);
126
127 free(keypair->cert_mem);
128 free(keypair->ocsp_staple);
129 free(keypair->pubkey_hash);
139 130
140 free(keypair); 131 free(keypair);
141} 132}