Pull in upstream fixes discovered in coverity and clang
This commit is contained in:
parent
37cd032951
commit
3103197f85
95
0009-Fix-memory-leak-in-util_internal_token_name.patch
Normal file
95
0009-Fix-memory-leak-in-util_internal_token_name.patch
Normal file
@ -0,0 +1,95 @@
|
||||
From 5d2554ed31fa6bc121d94efe533f9e4fea3900aa Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Thu, 4 Oct 2018 08:21:35 -0400
|
||||
Subject: [PATCH 09/16] Fix memory leak in util_internal_token_name()
|
||||
|
||||
Allocate memory using the talloc context instead of relying on
|
||||
the caller to call free().
|
||||
---
|
||||
src/certread-n.c | 2 +-
|
||||
src/certsave-n.c | 2 +-
|
||||
src/keygen-n.c | 2 +-
|
||||
src/keyiread-n.c | 2 +-
|
||||
src/submit-n.c | 2 +-
|
||||
src/util-n.c | 2 +-
|
||||
6 files changed, 6 insertions(+), 6 deletions(-)
|
||||
|
||||
diff --git a/src/certread-n.c b/src/certread-n.c
|
||||
index 1d9217c6..d535030b 100644
|
||||
--- a/src/certread-n.c
|
||||
+++ b/src/certread-n.c
|
||||
@@ -191,7 +191,7 @@ cm_certread_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
_exit(CM_SUB_STATUS_ERROR_AUTH);
|
||||
}
|
||||
if (entry->cm_cert_token == NULL) {
|
||||
- entry->cm_cert_token = util_internal_token_name();
|
||||
+ entry->cm_cert_token = talloc_strdup(entry, util_internal_token_name());
|
||||
}
|
||||
PK11_SetPasswordFunc(&cm_pin_read_for_cert_nss_cb);
|
||||
for (sle = slotlist->head;
|
||||
diff --git a/src/certsave-n.c b/src/certsave-n.c
|
||||
index fcb43148..49b28324 100644
|
||||
--- a/src/certsave-n.c
|
||||
+++ b/src/certsave-n.c
|
||||
@@ -215,7 +215,7 @@ cm_certsave_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
}
|
||||
PK11_SetPasswordFunc(&cm_pin_read_for_cert_nss_cb);
|
||||
if (entry->cm_cert_token == NULL) {
|
||||
- entry->cm_cert_token = util_internal_token_name();
|
||||
+ entry->cm_cert_token = talloc_strdup(entry, util_internal_token_name());
|
||||
}
|
||||
for (sle = slotlist->head;
|
||||
((sle != NULL) && (sle->slot != NULL));
|
||||
diff --git a/src/keygen-n.c b/src/keygen-n.c
|
||||
index f7fdf6c0..76a5c1d3 100644
|
||||
--- a/src/keygen-n.c
|
||||
+++ b/src/keygen-n.c
|
||||
@@ -273,7 +273,7 @@ cm_keygen_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
_exit(CM_SUB_STATUS_ERROR_NO_TOKEN);
|
||||
}
|
||||
if (entry->cm_cert_token == NULL) {
|
||||
- entry->cm_cert_token = util_internal_token_name();
|
||||
+ entry->cm_cert_token = talloc_strdup(entry, util_internal_token_name());
|
||||
}
|
||||
/* Walk the list looking for the requested slot, or the first one if
|
||||
* none was requested. */
|
||||
diff --git a/src/keyiread-n.c b/src/keyiread-n.c
|
||||
index b8408bf1..8f46ec0f 100644
|
||||
--- a/src/keyiread-n.c
|
||||
+++ b/src/keyiread-n.c
|
||||
@@ -153,7 +153,7 @@ cm_keyiread_n_get_keys(struct cm_store_entry *entry, int readwrite)
|
||||
}
|
||||
PK11_SetPasswordFunc(&cm_pin_read_for_cert_nss_cb);
|
||||
if (entry->cm_key_token == NULL) {
|
||||
- entry->cm_key_token = util_internal_token_name();
|
||||
+ entry->cm_key_token = talloc_strdup(entry, util_internal_token_name());
|
||||
}
|
||||
n_tokens = 0;
|
||||
pubkey = NULL;
|
||||
diff --git a/src/submit-n.c b/src/submit-n.c
|
||||
index da07d253..ee6f3105 100644
|
||||
--- a/src/submit-n.c
|
||||
+++ b/src/submit-n.c
|
||||
@@ -347,7 +347,7 @@ cm_submit_n_decrypt_envelope(const unsigned char *envelope,
|
||||
goto done;
|
||||
}
|
||||
if (args->entry->cm_key_token == NULL) {
|
||||
- args->entry->cm_key_token = util_internal_token_name();
|
||||
+ args->entry->cm_key_token = talloc_strdup(args->entry, util_internal_token_name());
|
||||
}
|
||||
PK11_SetPasswordFunc(&cm_pin_read_for_cert_nss_cb);
|
||||
n_tokens = 0;
|
||||
diff --git a/src/util-n.c b/src/util-n.c
|
||||
index 293e2583..4ab3d47b 100644
|
||||
--- a/src/util-n.c
|
||||
+++ b/src/util-n.c
|
||||
@@ -291,5 +291,5 @@ util_set_db_entry_cert_owner(const char *dbdir, struct cm_store_entry *entry)
|
||||
char *
|
||||
util_internal_token_name()
|
||||
{
|
||||
- return strdup(PK11_GetTokenName(PK11_GetInternalKeySlot()));
|
||||
+ return PK11_GetTokenName(PK11_GetInternalKeySlot());
|
||||
}
|
||||
--
|
||||
2.14.4
|
||||
|
266
0010-clang-Dead-assignment.patch
Normal file
266
0010-clang-Dead-assignment.patch
Normal file
@ -0,0 +1,266 @@
|
||||
From 648fe74986f2a84416805cfd73206e9e67166ae2 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Thu, 13 Sep 2018 15:40:23 -0400
|
||||
Subject: [PATCH 10/16] clang: Dead assignment
|
||||
|
||||
---
|
||||
src/casave.c | 4 +++-
|
||||
src/keygen-n.c | 1 -
|
||||
src/keyiread-n.c | 1 -
|
||||
src/store-files.c | 2 --
|
||||
src/store-gen.c | 3 ---
|
||||
src/submit-e.c | 54 ++++++++++++++++++++++++++------------------------
|
||||
src/submit-u.c | 2 --
|
||||
src/tdbush.c | 8 ++++++--
|
||||
tests/tools/addcinfo.c | 1 -
|
||||
tests/tools/certsave.c | 4 +++-
|
||||
10 files changed, 40 insertions(+), 40 deletions(-)
|
||||
|
||||
diff --git a/src/casave.c b/src/casave.c
|
||||
index 5fb31b8d..bde63f99 100644
|
||||
--- a/src/casave.c
|
||||
+++ b/src/casave.c
|
||||
@@ -163,7 +163,6 @@ cm_casave_main_n(int fd, struct cm_store_ca *ca, struct cm_store_entry *e,
|
||||
decoded = CERT_DecodeCertFromPackage(package,
|
||||
strlen(package));
|
||||
p = state->certs[i]->nickname;
|
||||
- ttrust = ",,";
|
||||
switch (state->certs[i]->level) {
|
||||
case root:
|
||||
case other_root:
|
||||
@@ -178,6 +177,9 @@ cm_casave_main_n(int fd, struct cm_store_ca *ca, struct cm_store_entry *e,
|
||||
ttrust = ",,";
|
||||
}
|
||||
break;
|
||||
+ default:
|
||||
+ ttrust = ",,";
|
||||
+ break;
|
||||
}
|
||||
memset(&trust, 0, sizeof(trust));
|
||||
CERT_DecodeTrustString(&trust, ttrust);
|
||||
diff --git a/src/keygen-n.c b/src/keygen-n.c
|
||||
index 76a5c1d3..061bd2af 100644
|
||||
--- a/src/keygen-n.c
|
||||
+++ b/src/keygen-n.c
|
||||
@@ -591,7 +591,6 @@ retry_gen:
|
||||
break;
|
||||
}
|
||||
}
|
||||
- generated_size = SECKEY_PublicKeyStrengthInBits(pubkey);
|
||||
cm_log(1, "Ended up with %d bit public key.\n",
|
||||
SECKEY_PublicKeyStrengthInBits(pubkey));
|
||||
/* Check for keys with the desired name, selecting a new name if
|
||||
diff --git a/src/keyiread-n.c b/src/keyiread-n.c
|
||||
index 8f46ec0f..91b1be41 100644
|
||||
--- a/src/keyiread-n.c
|
||||
+++ b/src/keyiread-n.c
|
||||
@@ -492,7 +492,6 @@ cm_keyiread_n_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
readwrite = settings->readwrite;
|
||||
keys = cm_keyiread_n_get_keys(entry, readwrite);
|
||||
alg = "";
|
||||
- size = 0;
|
||||
if (keys != NULL) {
|
||||
switch (SECKEY_GetPrivateKeyType(keys->privkey)) {
|
||||
case rsaKey:
|
||||
diff --git a/src/store-files.c b/src/store-files.c
|
||||
index 06a17485..df1fa336 100644
|
||||
--- a/src/store-files.c
|
||||
+++ b/src/store-files.c
|
||||
@@ -2182,7 +2182,6 @@ cm_store_entry_delete(struct cm_store_entry *entry)
|
||||
} else {
|
||||
cm_log(3, "No file to remove for \"%s\".\n",
|
||||
entry->cm_nickname);
|
||||
- ret = 0;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
@@ -2469,7 +2468,6 @@ cm_store_ca_delete(struct cm_store_ca *ca)
|
||||
}
|
||||
} else {
|
||||
cm_log(3, "No file to remove for \"%s\".\n", ca->cm_nickname);
|
||||
- ret = 0;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
diff --git a/src/store-gen.c b/src/store-gen.c
|
||||
index 5ce4ab84..da32afc8 100644
|
||||
--- a/src/store-gen.c
|
||||
+++ b/src/store-gen.c
|
||||
@@ -530,8 +530,6 @@ cm_store_hex_to_bin(const char *serial, unsigned char *buf, int length)
|
||||
const char *p, *q, *chars = "0123456789abcdef";
|
||||
unsigned char *b, u;
|
||||
|
||||
- p = serial;
|
||||
- b = buf;
|
||||
u = 0;
|
||||
for (p = serial, b = buf;
|
||||
((*p != '\0') && ((b - buf) < length));
|
||||
@@ -606,7 +604,6 @@ cm_store_canonicalize_path(void *parent, const char *path)
|
||||
for (p = tmp; *p != '\0'; p++) {
|
||||
if ((strncmp(p, "/.", 2) == 0) &&
|
||||
((p[2] == '/') || (p[2] == '\0'))) {
|
||||
- q = p - 1;
|
||||
memmove(p, p + 2, strlen(p + 2) + 1);
|
||||
}
|
||||
}
|
||||
diff --git a/src/submit-e.c b/src/submit-e.c
|
||||
index 8ba8e44c..d6158d7a 100644
|
||||
--- a/src/submit-e.c
|
||||
+++ b/src/submit-e.c
|
||||
@@ -587,32 +587,34 @@ cm_submit_e_postprocess_main(int fd, struct cm_store_ca *ca,
|
||||
estate->msg_length, NULL);
|
||||
msg = cm_json_new_object(estate);
|
||||
chain = cm_json_new_array(msg);
|
||||
- if (leaf != NULL) {
|
||||
- cert = cm_json_new_string(msg, leaf, -1);
|
||||
- cm_json_set(msg, CM_SUBMIT_E_CERTIFICATE, cert);
|
||||
- }
|
||||
- for (i = 0;
|
||||
- (others != NULL) && (others[i] != NULL);
|
||||
- i++) {
|
||||
- cert = cm_json_new_object(chain);
|
||||
- val = cm_json_new_string(cert, others[i], -1);
|
||||
- cm_json_set(cert, CM_SUBMIT_E_CERTIFICATE, val);
|
||||
- nthnick = talloc_asprintf(cert, "chain #%d", i + 1);
|
||||
- nick = cm_json_new_string(cert, nthnick, -1);
|
||||
- cm_json_set(cert, CM_SUBMIT_E_NICKNAME, nick);
|
||||
- cm_json_append(chain, cert);
|
||||
- }
|
||||
- if (top!= NULL) {
|
||||
- cert = cm_json_new_object(chain);
|
||||
- val = cm_json_new_string(cert, top, -1);
|
||||
- cm_json_set(cert, CM_SUBMIT_E_CERTIFICATE, val);
|
||||
- nthnick = talloc_asprintf(cert, "chain #%d", i + 1);
|
||||
- nick = cm_json_new_string(cert, nthnick, -1);
|
||||
- cm_json_set(cert, CM_SUBMIT_E_NICKNAME, nick);
|
||||
- cm_json_append(chain, cert);
|
||||
- }
|
||||
- if (cm_json_array_size(chain) > 0) {
|
||||
- cm_json_set(msg, CM_SUBMIT_E_CHAIN, chain);
|
||||
+ if (i == 0) {
|
||||
+ if (leaf != NULL) {
|
||||
+ cert = cm_json_new_string(msg, leaf, -1);
|
||||
+ cm_json_set(msg, CM_SUBMIT_E_CERTIFICATE, cert);
|
||||
+ }
|
||||
+ for (i = 0;
|
||||
+ (others != NULL) && (others[i] != NULL);
|
||||
+ i++) {
|
||||
+ cert = cm_json_new_object(chain);
|
||||
+ val = cm_json_new_string(cert, others[i], -1);
|
||||
+ cm_json_set(cert, CM_SUBMIT_E_CERTIFICATE, val);
|
||||
+ nthnick = talloc_asprintf(cert, "chain #%d", i + 1);
|
||||
+ nick = cm_json_new_string(cert, nthnick, -1);
|
||||
+ cm_json_set(cert, CM_SUBMIT_E_NICKNAME, nick);
|
||||
+ cm_json_append(chain, cert);
|
||||
+ }
|
||||
+ if (top!= NULL) {
|
||||
+ cert = cm_json_new_object(chain);
|
||||
+ val = cm_json_new_string(cert, top, -1);
|
||||
+ cm_json_set(cert, CM_SUBMIT_E_CERTIFICATE, val);
|
||||
+ nthnick = talloc_asprintf(cert, "chain #%d", i + 1);
|
||||
+ nick = cm_json_new_string(cert, nthnick, -1);
|
||||
+ cm_json_set(cert, CM_SUBMIT_E_NICKNAME, nick);
|
||||
+ cm_json_append(chain, cert);
|
||||
+ }
|
||||
+ if (cm_json_array_size(chain) > 0) {
|
||||
+ cm_json_set(msg, CM_SUBMIT_E_CHAIN, chain);
|
||||
+ }
|
||||
}
|
||||
}
|
||||
/* Get ready to build an output message. */
|
||||
diff --git a/src/submit-u.c b/src/submit-u.c
|
||||
index dda2edbc..b0b45baf 100644
|
||||
--- a/src/submit-u.c
|
||||
+++ b/src/submit-u.c
|
||||
@@ -120,14 +120,12 @@ cm_submit_u_from_file_single(const char *filename)
|
||||
if (csr == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
- p = csr;
|
||||
for (i = 0; i < sizeof(strip) / sizeof(strip[0]); i++) {
|
||||
while ((p = strstr(csr, strip[i])) != NULL) {
|
||||
q = p + strcspn(p, "\r\n");
|
||||
memmove(p, q, strlen(q) + 1);
|
||||
}
|
||||
}
|
||||
- p = csr;
|
||||
q = strdup(csr);
|
||||
for (p = csr, i = 0; *p != '\0'; p++) {
|
||||
if (strchr("\r\n\t ", *p) == NULL) {
|
||||
diff --git a/src/tdbush.c b/src/tdbush.c
|
||||
index 1d487222..3184e67a 100644
|
||||
--- a/src/tdbush.c
|
||||
+++ b/src/tdbush.c
|
||||
@@ -2911,7 +2911,6 @@ request_get_key_type_and_size(DBusConnection *conn, DBusMessage *msg,
|
||||
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
||||
}
|
||||
rep = dbus_message_new_method_return(msg);
|
||||
- type = "UNKNOWN";
|
||||
switch (entry->cm_key_type.cm_key_algorithm) {
|
||||
case cm_key_unspecified:
|
||||
type = "UNKNOWN";
|
||||
@@ -2929,6 +2928,9 @@ request_get_key_type_and_size(DBusConnection *conn, DBusMessage *msg,
|
||||
type = "EC";
|
||||
break;
|
||||
#endif
|
||||
+ default:
|
||||
+ type = "UNKNOWN";
|
||||
+ break;
|
||||
}
|
||||
if (rep != NULL) {
|
||||
size = entry->cm_key_type.cm_key_size;
|
||||
@@ -4790,7 +4792,6 @@ cm_tdbush_introspect_method(void *parent,
|
||||
method->cm_name);
|
||||
arg = method->cm_args;
|
||||
while (arg != NULL) {
|
||||
- direction = "unknown";
|
||||
switch (arg->cm_direction) {
|
||||
case cm_tdbush_method_arg_in:
|
||||
direction = "in";
|
||||
@@ -4798,6 +4799,9 @@ cm_tdbush_introspect_method(void *parent,
|
||||
case cm_tdbush_method_arg_out:
|
||||
direction = "out";
|
||||
break;
|
||||
+ default:
|
||||
+ direction = "unknown";
|
||||
+ break;
|
||||
}
|
||||
ret = talloc_asprintf(parent,
|
||||
"%s\n <arg name=\"%s\" type=\"%s\" "
|
||||
diff --git a/tests/tools/addcinfo.c b/tests/tools/addcinfo.c
|
||||
index d3cea2ca..f016acb4 100644
|
||||
--- a/tests/tools/addcinfo.c
|
||||
+++ b/tests/tools/addcinfo.c
|
||||
@@ -98,7 +98,6 @@ main(int argc, char **argv)
|
||||
PR_ErrorToName(PORT_GetError()));
|
||||
return 1;
|
||||
}
|
||||
- n = encoded.len;
|
||||
j = 0;
|
||||
while ((i = write(STDOUT_FILENO, encoded.data + j, encoded.len - j)) > 0) {
|
||||
j += i;
|
||||
diff --git a/tests/tools/certsave.c b/tests/tools/certsave.c
|
||||
index fd86a4c1..8ec60ddd 100644
|
||||
--- a/tests/tools/certsave.c
|
||||
+++ b/tests/tools/certsave.c
|
||||
@@ -83,7 +83,6 @@ main(int argc, char **argv)
|
||||
if (cm_certsave_saved(state) == 0) {
|
||||
ret = 0;
|
||||
} else {
|
||||
- ctype = "unknown";
|
||||
switch (entry->cm_cert_storage_type) {
|
||||
case cm_cert_storage_file:
|
||||
ctype = "FILE";
|
||||
@@ -91,6 +90,9 @@ main(int argc, char **argv)
|
||||
case cm_cert_storage_nssdb:
|
||||
ctype = "NSS";
|
||||
break;
|
||||
+ default:
|
||||
+ ctype = "unknown";
|
||||
+ break;
|
||||
}
|
||||
if (cm_certsave_conflict_subject(state) == 0) {
|
||||
printf("Failed to save (%s:%s), "
|
||||
--
|
||||
2.14.4
|
||||
|
437
0011-clang-Memory-leak.patch
Normal file
437
0011-clang-Memory-leak.patch
Normal file
@ -0,0 +1,437 @@
|
||||
From 3310a25181e94f5e05e671acc12d008cbac339ab Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Thu, 13 Sep 2018 15:50:53 -0400
|
||||
Subject: [PATCH 11/16] clang: Memory leak
|
||||
|
||||
---
|
||||
src/certmaster.c | 3 +++
|
||||
src/certsave-o.c | 1 +
|
||||
src/dogtag.c | 3 +++
|
||||
src/ipa.c | 9 ++++++++-
|
||||
src/local.c | 5 +++++
|
||||
src/scep.c | 5 +++++
|
||||
src/srvloc.c | 1 +
|
||||
src/store-files.c | 2 +-
|
||||
src/submit-x.c | 22 ++++++++++++++++++++++
|
||||
src/util.c | 8 +++++++-
|
||||
tests/tools/addcinfo.c | 3 +++
|
||||
tests/tools/base2pem.c | 1 +
|
||||
tests/tools/pem2base.c | 1 +
|
||||
13 files changed, 61 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/src/certmaster.c b/src/certmaster.c
|
||||
index 7e0bed90..4a5cf6af 100644
|
||||
--- a/src/certmaster.c
|
||||
+++ b/src/certmaster.c
|
||||
@@ -160,6 +160,7 @@ main(int argc, const char **argv)
|
||||
CM_SUBMIT_CSR_ENV);
|
||||
}
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
|
||||
@@ -185,11 +186,13 @@ main(int argc, const char **argv)
|
||||
if (ctx == NULL) {
|
||||
fprintf(stderr, "Error setting up for XMLRPC.\n");
|
||||
printf(_("Error setting up for XMLRPC.\n"));
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
|
||||
/* Add the CSR as the sole argument. */
|
||||
cm_submit_x_add_arg_s(ctx, csr);
|
||||
+ free(csr);
|
||||
|
||||
/* Submit the request. */
|
||||
fprintf(stderr, "Submitting request to \"%s\".\n", uri);
|
||||
diff --git a/src/certsave-o.c b/src/certsave-o.c
|
||||
index 77f54d7e..3d4018d8 100644
|
||||
--- a/src/certsave-o.c
|
||||
+++ b/src/certsave-o.c
|
||||
@@ -258,6 +258,7 @@ cm_certsave_o_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
if (bin != NULL) {
|
||||
BN_bn2bin(bn, bin);
|
||||
serial = cm_store_hex_from_bin(NULL, bin, BN_num_bytes(bn));
|
||||
+ free(bin);
|
||||
}
|
||||
}
|
||||
if (serial != NULL) {
|
||||
diff --git a/src/dogtag.c b/src/dogtag.c
|
||||
index cd0b38b7..55607f3d 100644
|
||||
--- a/src/dogtag.c
|
||||
+++ b/src/dogtag.c
|
||||
@@ -536,6 +536,7 @@ main(int argc, const char **argv)
|
||||
CM_SUBMIT_CSR_ENV);
|
||||
}
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
csr = cm_submit_u_url_encode(csr);
|
||||
@@ -588,6 +589,8 @@ main(int argc, const char **argv)
|
||||
params = talloc_asprintf(ctx,
|
||||
"%s&%s=%s",
|
||||
params, p, q);
|
||||
+ free(p);
|
||||
+ free(q);
|
||||
}
|
||||
use_agent_approval = FALSE;
|
||||
break;
|
||||
diff --git a/src/ipa.c b/src/ipa.c
|
||||
index 67a0c651..acd1a4e2 100644
|
||||
--- a/src/ipa.c
|
||||
+++ b/src/ipa.c
|
||||
@@ -226,6 +226,7 @@ cm_locate_xmlrpc_service(const char *server,
|
||||
if (basedn == NULL) {
|
||||
i = cm_find_default_naming_context(ld, &basedn);
|
||||
if (i != 0) {
|
||||
+ free(basedn);
|
||||
return i;
|
||||
}
|
||||
}
|
||||
@@ -526,6 +527,7 @@ fetch_roots(const char *server, int ldap_uri_cmd, const char *ldap_uri,
|
||||
if (basedn == NULL) {
|
||||
i = cm_find_default_naming_context(ld, &basedn);
|
||||
if (i != 0) {
|
||||
+ free(basedn);
|
||||
return i;
|
||||
}
|
||||
}
|
||||
@@ -802,6 +804,7 @@ main(int argc, const char **argv)
|
||||
printf(_("Unable to read signing request from environment variable \"%s\".\n"),
|
||||
CM_SUBMIT_CSR_ENV);
|
||||
}
|
||||
+ free(csr);
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
@@ -903,12 +906,16 @@ main(int argc, const char **argv)
|
||||
|
||||
if ((strcasecmp(mode, CM_OP_SUBMIT) == 0) ||
|
||||
(strcasecmp(mode, CM_OP_POLL) == 0)) {
|
||||
- return submit_or_poll(uri, cainfo, capath, server,
|
||||
+ int ret;
|
||||
+ ret = submit_or_poll(uri, cainfo, capath, server,
|
||||
ldap_uri_cmd, ldap_uri, host, domain,
|
||||
basedn, uid, pwd, csr, reqprinc, profile,
|
||||
issuer);
|
||||
+ free(csr);
|
||||
+ return ret;
|
||||
} else
|
||||
if (strcasecmp(mode, CM_OP_FETCH_ROOTS) == 0) {
|
||||
+ free(csr);
|
||||
return fetch_roots(server, ldap_uri_cmd, ldap_uri, host,
|
||||
uid, pwd, domain, basedn);
|
||||
}
|
||||
diff --git a/src/local.c b/src/local.c
|
||||
index f437d62e..92bea144 100644
|
||||
--- a/src/local.c
|
||||
+++ b/src/local.c
|
||||
@@ -559,6 +559,7 @@ main(int argc, const char **argv)
|
||||
printf(_("Unable to read signing request.\n"));
|
||||
cm_log(1, "Unable to read signing request.\n");
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
/* Take the lock. */
|
||||
@@ -568,6 +569,7 @@ main(int argc, const char **argv)
|
||||
&signer, &key);
|
||||
if ((i != 0) || (signer == NULL)) {
|
||||
cm_log(1, "Error reading signer info.\n");
|
||||
+ free(csr);
|
||||
/* Try again sometime later. */
|
||||
return CM_SUBMIT_STATUS_UNREACHABLE;
|
||||
}
|
||||
@@ -577,11 +579,13 @@ main(int argc, const char **argv)
|
||||
if ((fp == NULL) && (errno != ENOENT)) {
|
||||
cm_log(1, "Error reading '%s': %s.\n", serial,
|
||||
strerror(errno));
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNREACHABLE;
|
||||
}
|
||||
if (fp != NULL) {
|
||||
if (fgets(buf, sizeof(buf), fp) == NULL) {
|
||||
fclose(fp);
|
||||
+ free(csr);
|
||||
return CM_SUBMIT_STATUS_UNREACHABLE;
|
||||
}
|
||||
buf[strcspn(buf, "\r\n")] = '\0';
|
||||
@@ -601,6 +605,7 @@ main(int argc, const char **argv)
|
||||
/* Actually sign the request. */
|
||||
i = cm_submit_o_sign(parent, csr, signer, key, hexserial,
|
||||
now, 0, &cert);
|
||||
+ free(csr);
|
||||
if ((i == 0) && (cert != NULL)) {
|
||||
/* Roll the serial number up. */
|
||||
hexserial = cm_store_increment_serial(parent,
|
||||
diff --git a/src/scep.c b/src/scep.c
|
||||
index 72dff3d5..68eae788 100644
|
||||
--- a/src/scep.c
|
||||
+++ b/src/scep.c
|
||||
@@ -338,6 +338,7 @@ main(int argc, const char **argv)
|
||||
}
|
||||
if (c != -1) {
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
+ free(cainfo);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
|
||||
@@ -386,6 +387,7 @@ main(int argc, const char **argv)
|
||||
}
|
||||
if ((message == NULL) || (strlen(message) == 0)) {
|
||||
printf(_("Error reading request. Expected PKCS7 data containing a GetInitialCert pkiMessage, got nothing.\n"));
|
||||
+ free(cainfo);
|
||||
return CM_SUBMIT_STATUS_NEED_SCEP_MESSAGES;
|
||||
}
|
||||
/* First step: read capabilities for our use. */
|
||||
@@ -405,6 +407,7 @@ main(int argc, const char **argv)
|
||||
}
|
||||
if ((message == NULL) || (strlen(message) == 0)) {
|
||||
printf(_("Error reading request. Expected PKCS7 data containing a PKCSReq pkiMessage, got nothing.\n"));
|
||||
+ free(cainfo);
|
||||
return CM_SUBMIT_STATUS_NEED_SCEP_MESSAGES;
|
||||
}
|
||||
/* First step: read capabilities for our use. */
|
||||
@@ -416,6 +419,7 @@ main(int argc, const char **argv)
|
||||
/* Supply help output, if it's needed. */
|
||||
if (missing_args) {
|
||||
poptPrintUsage(pctx, stdout, 0);
|
||||
+ free(cainfo);
|
||||
return CM_SUBMIT_STATUS_UNCONFIGURED;
|
||||
}
|
||||
|
||||
@@ -492,6 +496,7 @@ main(int argc, const char **argv)
|
||||
verbose > 1 ?
|
||||
cm_submit_h_curl_verbose_on :
|
||||
cm_submit_h_curl_verbose_off);
|
||||
+ free(cainfo);
|
||||
cm_submit_h_run(hctx);
|
||||
content_type = cm_submit_h_result_type(hctx);
|
||||
if (content_type == NULL) {
|
||||
diff --git a/src/srvloc.c b/src/srvloc.c
|
||||
index acab55bf..e8f3f5a5 100644
|
||||
--- a/src/srvloc.c
|
||||
+++ b/src/srvloc.c
|
||||
@@ -189,6 +189,7 @@ cm_srvloc_resolve(void *parent, const char *name, const char *udomain,
|
||||
domain = strdup(udomain);
|
||||
#endif
|
||||
i = res_querydomain(name, domain, C_IN, T_SRV, answer, answer_len);
|
||||
+ free(domain);
|
||||
if (i == -1) {
|
||||
return -1;
|
||||
}
|
||||
diff --git a/src/store-files.c b/src/store-files.c
|
||||
index df1fa336..b97ba5ff 100644
|
||||
--- a/src/store-files.c
|
||||
+++ b/src/store-files.c
|
||||
@@ -558,8 +558,8 @@ cm_store_file_read_lines(void *parent, FILE *fp)
|
||||
case ';':
|
||||
break;
|
||||
}
|
||||
+ free(buf);
|
||||
}
|
||||
- free(buf);
|
||||
/* If we were reading a line, append it to the list. */
|
||||
if (s != NULL) {
|
||||
tlines = talloc_realloc(parent, lines, char *, n_lines + 2);
|
||||
diff --git a/src/submit-x.c b/src/submit-x.c
|
||||
index 60bcf78a..fa81e9aa 100644
|
||||
--- a/src/submit-x.c
|
||||
+++ b/src/submit-x.c
|
||||
@@ -75,6 +75,8 @@ cm_submit_x_ccache_realm(char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
@@ -84,6 +86,8 @@ cm_submit_x_ccache_realm(char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
@@ -93,6 +97,8 @@ cm_submit_x_ccache_realm(char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
@@ -139,6 +145,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
fprintf(stderr, "Error initializing Kerberos: %s.\n", ret);
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -152,6 +160,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -163,6 +173,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
principal, ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -174,6 +186,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -195,6 +209,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -213,6 +229,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -227,6 +245,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
@@ -237,6 +257,8 @@ cm_submit_x_make_ccache(const char *ktname, const char *principal, char **msg)
|
||||
ret = get_error_message(ctx, kret));
|
||||
if (msg != NULL) {
|
||||
*msg = ret;
|
||||
+ } else {
|
||||
+ free(ret);
|
||||
}
|
||||
return kret;
|
||||
}
|
||||
diff --git a/src/util.c b/src/util.c
|
||||
index 67143d52..373bb533 100644
|
||||
--- a/src/util.c
|
||||
+++ b/src/util.c
|
||||
@@ -98,7 +98,7 @@ read_config_file(const char *filename)
|
||||
char *
|
||||
get_config_entry(char * in_data, const char *section, const char *key)
|
||||
{
|
||||
- char *ptr = NULL, *p, *tmp;
|
||||
+ char *ptr = NULL, *p, *tmp = NULL;
|
||||
char *line;
|
||||
int in_section = 0;
|
||||
char * data = strdup(in_data);
|
||||
@@ -129,9 +129,12 @@ get_config_entry(char * in_data, const char *section, const char *key)
|
||||
}
|
||||
if (strcmp(section, tmp) == 0) {
|
||||
free(tmp);
|
||||
+ tmp = NULL;
|
||||
in_section = 1;
|
||||
continue;
|
||||
}
|
||||
+ free(tmp);
|
||||
+ tmp = NULL;
|
||||
}
|
||||
} /* [ */
|
||||
|
||||
@@ -145,8 +148,10 @@ get_config_entry(char * in_data, const char *section, const char *key)
|
||||
tmp = strndup(line, p - line);
|
||||
if (strcmp(key, tmp) != 0) {
|
||||
free(tmp);
|
||||
+ tmp = NULL;
|
||||
} else {
|
||||
free(tmp);
|
||||
+ tmp = NULL;
|
||||
|
||||
/* Skip over any whitespace after the equal sign. */
|
||||
line = strchr(line, '=');
|
||||
@@ -168,5 +173,6 @@ get_config_entry(char * in_data, const char *section, const char *key)
|
||||
}
|
||||
}
|
||||
free(data);
|
||||
+ free(tmp);
|
||||
return NULL;
|
||||
}
|
||||
diff --git a/tests/tools/addcinfo.c b/tests/tools/addcinfo.c
|
||||
index f016acb4..939005c2 100644
|
||||
--- a/tests/tools/addcinfo.c
|
||||
+++ b/tests/tools/addcinfo.c
|
||||
@@ -86,6 +86,7 @@ main(int argc, char **argv)
|
||||
if (enveloped == NULL) {
|
||||
cm_log(0, "Internal error: %s.\n",
|
||||
PR_ErrorToName(PORT_GetError()));
|
||||
+ free(buffer);
|
||||
return 1;
|
||||
}
|
||||
ci.content_type = enveloped->oid;
|
||||
@@ -96,6 +97,7 @@ main(int argc, char **argv)
|
||||
content_info_template) != &encoded) {
|
||||
cm_log(0, "Encoding error: %s.\n",
|
||||
PR_ErrorToName(PORT_GetError()));
|
||||
+ free(buffer);
|
||||
return 1;
|
||||
}
|
||||
j = 0;
|
||||
@@ -105,5 +107,6 @@ main(int argc, char **argv)
|
||||
break;
|
||||
}
|
||||
}
|
||||
+ free(buffer);
|
||||
return 0;
|
||||
}
|
||||
diff --git a/tests/tools/base2pem.c b/tests/tools/base2pem.c
|
||||
index 40e74201..31359684 100644
|
||||
--- a/tests/tools/base2pem.c
|
||||
+++ b/tests/tools/base2pem.c
|
||||
@@ -76,5 +76,6 @@ main(int argc, const char **argv)
|
||||
}
|
||||
}
|
||||
printf("%s", cm_submit_u_pem_from_base64(type, dos, p));
|
||||
+ free(p);
|
||||
return 0;
|
||||
}
|
||||
diff --git a/tests/tools/pem2base.c b/tests/tools/pem2base.c
|
||||
index 0607c162..bb686c0e 100644
|
||||
--- a/tests/tools/pem2base.c
|
||||
+++ b/tests/tools/pem2base.c
|
||||
@@ -46,5 +46,6 @@ main(int argc, char **argv)
|
||||
}
|
||||
}
|
||||
printf("%s\n", cm_submit_u_base64_from_text(p));
|
||||
+ free(p);
|
||||
return 0;
|
||||
}
|
||||
--
|
||||
2.14.4
|
||||
|
25
0012-clang-Uninitialized-initial-value.patch
Normal file
25
0012-clang-Uninitialized-initial-value.patch
Normal file
@ -0,0 +1,25 @@
|
||||
From db0f835829b739cf843d44b08c22407194aadd71 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Thu, 13 Sep 2018 17:57:21 -0400
|
||||
Subject: [PATCH 12/16] clang: Uninitialized initial value
|
||||
|
||||
---
|
||||
src/submit-n.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/src/submit-n.c b/src/submit-n.c
|
||||
index ee6f3105..b07ea23a 100644
|
||||
--- a/src/submit-n.c
|
||||
+++ b/src/submit-n.c
|
||||
@@ -281,7 +281,7 @@ cm_submit_n_decrypt_envelope(const unsigned char *envelope,
|
||||
PLArenaPool *arena = NULL;
|
||||
SECStatus error;
|
||||
NSSInitContext *ctx = NULL;
|
||||
- PK11SlotInfo *slot;
|
||||
+ PK11SlotInfo *slot = NULL;
|
||||
PK11SlotList *slotlist = NULL;
|
||||
PK11SlotListElement *sle;
|
||||
SECKEYPrivateKeyList *keylist = NULL;
|
||||
--
|
||||
2.14.4
|
||||
|
@ -0,0 +1,99 @@
|
||||
From 753d98b3e70f34a52caabbe8db30bf06fc917f38 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Thu, 13 Sep 2018 11:46:51 -0400
|
||||
Subject: [PATCH 13/16] clang: Null pointer passed as an argument to a
|
||||
'nonnull' parameter
|
||||
|
||||
---
|
||||
src/certsave-n.c | 3 ++-
|
||||
src/getcert.c | 7 ++++---
|
||||
src/scep.c | 8 ++++----
|
||||
src/submit-sn.c | 7 +++++--
|
||||
4 files changed, 15 insertions(+), 10 deletions(-)
|
||||
|
||||
diff --git a/src/certsave-n.c b/src/certsave-n.c
|
||||
index 49b28324..972a1dfa 100644
|
||||
--- a/src/certsave-n.c
|
||||
+++ b/src/certsave-n.c
|
||||
@@ -72,7 +72,8 @@ add_privkey_to_list(SECKEYPrivateKey **list, SECKEYPrivateKey *key)
|
||||
if ((list == NULL) || (list[i] == NULL)) {
|
||||
newlist = malloc(sizeof(newlist[0]) * (i + 2));
|
||||
if (newlist != NULL) {
|
||||
- memcpy(newlist, list, sizeof(newlist[0]) * i);
|
||||
+ if (list != NULL)
|
||||
+ memcpy(newlist, list, sizeof(newlist[0]) * i);
|
||||
newlist[i] = key;
|
||||
newlist[i + 1] = NULL;
|
||||
list = newlist;
|
||||
diff --git a/src/getcert.c b/src/getcert.c
|
||||
index 6417cd44..ddb28de2 100644
|
||||
--- a/src/getcert.c
|
||||
+++ b/src/getcert.c
|
||||
@@ -291,7 +291,8 @@ add_string(void *parent, char ***dest, const char *value)
|
||||
printf(_("Out of memory.\n"));
|
||||
exit(1);
|
||||
}
|
||||
- memcpy(tmp, *dest, sizeof(tmp[0]) * i);
|
||||
+ if (*dest)
|
||||
+ memcpy(tmp, *dest, sizeof(tmp[0]) * i);
|
||||
tmp[i] = talloc_strdup(tmp, value);
|
||||
i++;
|
||||
tmp[i] = NULL;
|
||||
@@ -1582,8 +1583,8 @@ add_basic_request(enum cm_tdbus_type bus, char *id,
|
||||
{
|
||||
DBusMessage *req, *rep;
|
||||
int i;
|
||||
- struct cm_tdbusm_dict param[28];
|
||||
- const struct cm_tdbusm_dict *params[29];
|
||||
+ struct cm_tdbusm_dict param[30];
|
||||
+ const struct cm_tdbusm_dict *params[30];
|
||||
dbus_bool_t b;
|
||||
const char *capath;
|
||||
char *p;
|
||||
diff --git a/src/scep.c b/src/scep.c
|
||||
index 68eae788..b0bd214b 100644
|
||||
--- a/src/scep.c
|
||||
+++ b/src/scep.c
|
||||
@@ -793,8 +793,8 @@ main(int argc, const char **argv)
|
||||
fprintf(stderr, "code_text = \"%s\"\n", cm_submit_h_result_code_text(hctx));
|
||||
syslog(LOG_DEBUG, "%s %s?%s\n", "GET", url, params2);
|
||||
}
|
||||
- if (strcasecmp(content_type2,
|
||||
- "application/x-x509-ca-cert") != 0) {
|
||||
+ if ((content_type2 != NULL) && (strcasecmp(content_type2,
|
||||
+ "application/x-x509-ca-cert") != 0)) {
|
||||
if (verbose > 0) {
|
||||
fprintf(stderr, "Content is not "
|
||||
"\"application/x-x509-ca-cert\""
|
||||
@@ -882,8 +882,8 @@ main(int argc, const char **argv)
|
||||
break;
|
||||
case op_get_cert_initial:
|
||||
case op_pkcsreq:
|
||||
- if (strcasecmp(content_type2,
|
||||
- "application/x-pki-message") == 0) {
|
||||
+ if ((content_type2 != NULL) && (strcasecmp(content_type2,
|
||||
+ "application/x-pki-message") == 0)) {
|
||||
memset(&cacerts, 0, sizeof(cacerts));
|
||||
cacerts[0] = cacert ? cacert : racert;
|
||||
cacerts[1] = cacert ? racert : NULL;
|
||||
diff --git a/src/submit-sn.c b/src/submit-sn.c
|
||||
index e9c62b22..ecd78dc0 100644
|
||||
--- a/src/submit-sn.c
|
||||
+++ b/src/submit-sn.c
|
||||
@@ -258,8 +258,11 @@ cm_submit_sn_main(int fd, struct cm_store_ca *ca, struct cm_store_entry *entry,
|
||||
/* Allocate space for one more extension. */
|
||||
extensions = PORT_ArenaZAlloc(arena, (i + 2) * sizeof(extensions[0]));
|
||||
if (extensions != NULL) {
|
||||
- memcpy(extensions, ucert->extensions,
|
||||
- i * sizeof(extensions[0]));
|
||||
+ if (i != 0) {
|
||||
+ /* Note that C99 says copy of 0 items is ok, quieting clang */
|
||||
+ memcpy(extensions, ucert->extensions,
|
||||
+ i * sizeof(extensions[0]));
|
||||
+ }
|
||||
if (found_basic) {
|
||||
extensions[i] = NULL;
|
||||
} else {
|
||||
--
|
||||
2.14.4
|
||||
|
24
0014-clang-Dead-increment.patch
Normal file
24
0014-clang-Dead-increment.patch
Normal file
@ -0,0 +1,24 @@
|
||||
From 9e44680dbd207cef48beb7598114ea59aa457055 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Fri, 14 Sep 2018 16:15:23 -0400
|
||||
Subject: [PATCH 14/16] clang: Dead increment
|
||||
|
||||
---
|
||||
src/store-gen.c | 1 -
|
||||
1 file changed, 1 deletion(-)
|
||||
|
||||
diff --git a/src/store-gen.c b/src/store-gen.c
|
||||
index da32afc8..653767a1 100644
|
||||
--- a/src/store-gen.c
|
||||
+++ b/src/store-gen.c
|
||||
@@ -363,7 +363,6 @@ cm_store_time_from_timestamp(const char *timestamp)
|
||||
buf[2] = '\0';
|
||||
stamp.tm_min = atoi(buf);
|
||||
memcpy(buf, timestamp + i, 2);
|
||||
- i += 2;
|
||||
buf[2] = '\0';
|
||||
stamp.tm_sec = atoi(buf);
|
||||
t = timegm(&stamp);
|
||||
--
|
||||
2.14.4
|
||||
|
83
0015-clang-Dereference-of-null-pointer.patch
Normal file
83
0015-clang-Dereference-of-null-pointer.patch
Normal file
@ -0,0 +1,83 @@
|
||||
From 319858127df42c1a95b9b3282705c90ecd6754a5 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Fri, 14 Sep 2018 16:16:55 -0400
|
||||
Subject: [PATCH 15/16] clang: Dereference of null pointer
|
||||
|
||||
---
|
||||
src/tdbush.c | 56 +++++++++++++++++++++++++++++---------------------------
|
||||
1 file changed, 29 insertions(+), 27 deletions(-)
|
||||
|
||||
diff --git a/src/tdbush.c b/src/tdbush.c
|
||||
index 3184e67a..d1bbe4da 100644
|
||||
--- a/src/tdbush.c
|
||||
+++ b/src/tdbush.c
|
||||
@@ -3655,37 +3655,39 @@ request_modify(DBusConnection *conn, DBusMessage *msg,
|
||||
break;
|
||||
}
|
||||
}
|
||||
- if (d[i] == NULL) {
|
||||
- new_request_path = talloc_asprintf(parent, "%s/%s",
|
||||
- CM_DBUS_REQUEST_PATH,
|
||||
- entry->cm_busname);
|
||||
- if ((n_propname > 0) &&
|
||||
- (n_propname + 1 < sizeof(propname) / sizeof(propname[0]))) {
|
||||
- propname[n_propname] = NULL;
|
||||
- cm_tdbush_property_emit_changed(ctx, new_request_path,
|
||||
- CM_DBUS_REQUEST_INTERFACE,
|
||||
- propname);
|
||||
- }
|
||||
- cm_tdbusm_set_bp(rep,
|
||||
- cm_restart_entry(ctx,
|
||||
- entry->cm_nickname),
|
||||
- new_request_path);
|
||||
- dbus_connection_send(conn, rep, NULL);
|
||||
- dbus_message_unref(rep);
|
||||
- talloc_free(new_request_path);
|
||||
- return DBUS_HANDLER_RESULT_HANDLED;
|
||||
- } else {
|
||||
- dbus_message_unref(rep);
|
||||
- rep = dbus_message_new_error(msg,
|
||||
- CM_DBUS_ERROR_REQUEST_BAD_ARG,
|
||||
- _("Unrecognized parameter or wrong value type."));
|
||||
- if (rep != NULL) {
|
||||
- cm_tdbusm_set_s(rep, d[i]->key);
|
||||
+ if (d != NULL) {
|
||||
+ if (d[i] == NULL) {
|
||||
+ new_request_path = talloc_asprintf(parent, "%s/%s",
|
||||
+ CM_DBUS_REQUEST_PATH,
|
||||
+ entry->cm_busname);
|
||||
+ if ((n_propname > 0) &&
|
||||
+ (n_propname + 1 < sizeof(propname) / sizeof(propname[0]))) {
|
||||
+ propname[n_propname] = NULL;
|
||||
+ cm_tdbush_property_emit_changed(ctx, new_request_path,
|
||||
+ CM_DBUS_REQUEST_INTERFACE,
|
||||
+ propname);
|
||||
+ }
|
||||
+ cm_tdbusm_set_bp(rep,
|
||||
+ cm_restart_entry(ctx,
|
||||
+ entry->cm_nickname),
|
||||
+ new_request_path);
|
||||
dbus_connection_send(conn, rep, NULL);
|
||||
dbus_message_unref(rep);
|
||||
+ talloc_free(new_request_path);
|
||||
return DBUS_HANDLER_RESULT_HANDLED;
|
||||
+ } else {
|
||||
+ dbus_message_unref(rep);
|
||||
+ rep = dbus_message_new_error(msg,
|
||||
+ CM_DBUS_ERROR_REQUEST_BAD_ARG,
|
||||
+ _("Unrecognized parameter or wrong value type."));
|
||||
+ if (rep != NULL) {
|
||||
+ cm_tdbusm_set_s(rep, d[i]->key);
|
||||
+ dbus_connection_send(conn, rep, NULL);
|
||||
+ dbus_message_unref(rep);
|
||||
+ return DBUS_HANDLER_RESULT_HANDLED;
|
||||
+ }
|
||||
+ return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
||||
}
|
||||
- return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
||||
}
|
||||
} else {
|
||||
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
||||
--
|
||||
2.14.4
|
||||
|
26
0016-Add-missing-case-for-cm_prefs_aes192.patch
Normal file
26
0016-Add-missing-case-for-cm_prefs_aes192.patch
Normal file
@ -0,0 +1,26 @@
|
||||
From f17b7c0a22f4d49dca001d984673046e133577d1 Mon Sep 17 00:00:00 2001
|
||||
From: Rob Crittenden <rcritten@redhat.com>
|
||||
Date: Fri, 14 Sep 2018 16:41:19 -0400
|
||||
Subject: [PATCH 16/16] Add missing case for cm_prefs_aes192
|
||||
|
||||
---
|
||||
src/prefs-o.c | 3 +++
|
||||
1 file changed, 3 insertions(+)
|
||||
|
||||
diff --git a/src/prefs-o.c b/src/prefs-o.c
|
||||
index 64542f85..ac68164d 100644
|
||||
--- a/src/prefs-o.c
|
||||
+++ b/src/prefs-o.c
|
||||
@@ -75,6 +75,9 @@ cm_prefs_ossl_cipher_by_pref(enum cm_prefs_cipher cipher)
|
||||
case cm_prefs_aes128:
|
||||
return EVP_aes_128_cbc();
|
||||
break;
|
||||
+ case cm_prefs_aes192:
|
||||
+ return EVP_aes_192_cbc();
|
||||
+ break;
|
||||
case cm_prefs_aes256:
|
||||
return EVP_aes_256_cbc();
|
||||
break;
|
||||
--
|
||||
2.14.4
|
||||
|
@ -26,7 +26,7 @@
|
||||
|
||||
Name: certmonger
|
||||
Version: 0.79.6
|
||||
Release: 3%{?dist}
|
||||
Release: 4%{?dist}
|
||||
Summary: Certificate status monitor and PKI enrollment client
|
||||
|
||||
Group: System Environment/Daemons
|
||||
@ -119,6 +119,14 @@ Patch5: 0005-Only-de-duplicate-certificates-within-the-same-token.patch
|
||||
Patch6: 0006-Ensure-that-an-OpenSSL-random-seed-file-exists-when-.patch
|
||||
Patch7: 0007-Log-test-failures-of-bad-pin.patch
|
||||
Patch8: 0008-Use-only-PK11_ImportCert-to-import-certs-not-CERT_Im.patch
|
||||
Patch9: 0009-Fix-memory-leak-in-util_internal_token_name.patch
|
||||
Patch10: 0010-clang-Dead-assignment.patch
|
||||
Patch11: 0011-clang-Memory-leak.patch
|
||||
Patch12: 0012-clang-Uninitialized-initial-value.patch
|
||||
Patch13: 0013-clang-Null-pointer-passed-as-an-argument-to-a-nonnul.patch
|
||||
Patch14: 0014-clang-Dead-increment.patch
|
||||
Patch15: 0015-clang-Dereference-of-null-pointer.patch
|
||||
Patch16: 0016-Add-missing-case-for-cm_prefs_aes192.patch
|
||||
|
||||
%description
|
||||
Certmonger is a service which is primarily concerned with getting your
|
||||
@ -134,6 +142,14 @@ system enrolled with a certificate authority (CA) and keeping it enrolled.
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10 -p1
|
||||
%patch11 -p1
|
||||
%patch12 -p1
|
||||
%patch13 -p1
|
||||
%patch14 -p1
|
||||
%patch15 -p1
|
||||
%patch16 -p1
|
||||
|
||||
%if 0%{?rhel} > 0
|
||||
# Enabled by default for RHEL for bug #765600, still disabled by default for
|
||||
@ -261,6 +277,9 @@ exit 0
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Oct 4 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-4
|
||||
- Pull in upstream fixes discovered in coverity and clang.
|
||||
|
||||
* Mon Oct 1 2018 Rob Crittenden <rcritten@redhat.com> - 0.79.6-3
|
||||
- Improve NSS token handling. The updated NSS crypto-policy enables all
|
||||
tokens which broke requesting certificates due to the way that tokens
|
||||
|
Loading…
Reference in New Issue
Block a user