You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
643 lines
22 KiB
643 lines
22 KiB
From 15163e6212aaf6b2dd5d7b432e5b13ca39496110 Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Tue, 28 Feb 2017 16:12:31 +0100 |
|
Subject: [PATCH 1/3] Coverity fixes for: |
|
|
|
card-cac.c |
|
* CLANG_WARNING: The left operand of '<' is a garbage value |
|
card-coolkey.c |
|
* CLANG_WARNING: overwriting variable |
|
* CPPCHECK_WARNING: memory leak / overwrite variable |
|
* CLANG_WARNING: null pointer dereference |
|
* UNUSED_VALUE: unused return value |
|
card-gids.c |
|
* CLANG_WARNING: Branch condition evaluates to a garbage value |
|
* SIZEOF_MISMATCH: suspicious_sizeof |
|
card-myeid.c |
|
* RESOURCE_LEAK: Variable "buf" going out of scope leaks the storage it points to. |
|
* CLANG_WARNING: overwriting variable |
|
* (rewrite not to confuse coverity) |
|
pkcs15-cac.c |
|
* RESOURCE_LEAK: Variable "cert_out" going out of scope leaks the storage it points to. |
|
pkcs15-coolkey.c |
|
* UNUSED_VALUE: unused return value |
|
pkcs15-piv.c |
|
* RESOURCE_LEAK: Variable "cert_out" going out of scope leaks the storage it points to. |
|
pkcs15-sc-hsm.c |
|
* DEADCODE |
|
pkcs11/framework-pkcs15.c |
|
* RESOURCE_LEAK: Variable "p15_cert" going out of scope leaks the storage it points to. |
|
pkcs15init/pkcs15-lib.c |
|
* CLANG_WARNING: Assigned value is garbage or undefined |
|
pkcs15init/pkcs15-myeid.c |
|
* UNREACHABLE: Probably wrong placement of code block |
|
tests/p15dump.c |
|
* IDENTICAL_BRANCHES |
|
pkcs15-init.c |
|
* CLANG_WARNING: Potential leak of memory pointed to by 'args.der_encoded.value' |
|
pkcs15-tool.c |
|
* RESOURCE_LEAK: Variable "cert" going out of scope leaks the storage it points to. |
|
* MISSING_BREAK: The above case falls through to this one. |
|
sc-hsm-tool.c |
|
* CLANG_WARNING: Potential leak of memory pointed to by 'sp' |
|
westcos-tool.c |
|
* FORWARD_NULL: Passing null pointer "pin" to "unlock_pin", which dereferences it. |
|
* (rewrite not to confuse coverity) |
|
--- |
|
src/libopensc/card-cac.c | 2 +- |
|
src/libopensc/card-coolkey.c | 7 +++++-- |
|
src/libopensc/card-entersafe.c | 2 +- |
|
src/libopensc/card-gids.c | 7 ++++++- |
|
src/libopensc/card-myeid.c | 20 ++++++++++++-------- |
|
src/libopensc/iso7816.c | 1 + |
|
src/libopensc/pkcs15-cac.c | 5 ++++- |
|
src/libopensc/pkcs15-coolkey.c | 2 ++ |
|
src/libopensc/pkcs15-piv.c | 3 ++- |
|
src/libopensc/pkcs15-sc-hsm.c | 6 ++---- |
|
src/pkcs11/framework-pkcs15.c | 7 ++++++- |
|
src/pkcs15init/pkcs15-lib.c | 2 +- |
|
src/pkcs15init/pkcs15-myeid.c | 4 ++-- |
|
src/tests/p15dump.c | 3 +-- |
|
src/tools/pkcs15-init.c | 4 +++- |
|
src/tools/pkcs15-tool.c | 11 ++++++++--- |
|
src/tools/sc-hsm-tool.c | 2 ++ |
|
src/tools/westcos-tool.c | 6 +++--- |
|
18 files changed, 62 insertions(+), 32 deletions(-) |
|
|
|
diff --git a/src/libopensc/card-cac.c b/src/libopensc/card-cac.c |
|
index d5f8585..788fb52 100644 |
|
--- a/src/libopensc/card-cac.c |
|
+++ b/src/libopensc/card-cac.c |
|
@@ -467,7 +467,7 @@ static int cac_cac1_get_certificate(sc_card_t *card, u8 **out_buf, size_t *out_l |
|
size_t left = 0; |
|
size_t len, next_len; |
|
sc_apdu_t apdu; |
|
- int r; |
|
+ int r = SC_SUCCESS; |
|
|
|
|
|
/* get the size */ |
|
diff --git a/src/libopensc/card-coolkey.c b/src/libopensc/card-coolkey.c |
|
index c44febe..7672028 100644 |
|
--- a/src/libopensc/card-coolkey.c |
|
+++ b/src/libopensc/card-coolkey.c |
|
@@ -1369,7 +1369,7 @@ coolkey_fill_object(sc_card_t *card, sc_cardctl_coolkey_object_t *obj) |
|
{ |
|
int r; |
|
size_t buf_len = obj->length; |
|
- u8 *new_obj_data = malloc(buf_len); |
|
+ u8 *new_obj_data = NULL; |
|
sc_cardctl_coolkey_object_t *obj_entry; |
|
coolkey_private_data_t * priv = COOLKEY_DATA(card); |
|
|
|
@@ -1413,7 +1413,7 @@ coolkey_find_attribute(sc_card_t *card, sc_cardctl_coolkey_attribute_t *attribut |
|
const u8 *obj = attribute->object->data; |
|
const u8 *attr = NULL; |
|
size_t buf_len = attribute->object->length; |
|
- coolkey_object_header_t *object_head = (coolkey_object_header_t *)obj; |
|
+ coolkey_object_header_t *object_head; |
|
int attribute_count,i; |
|
attribute->attribute_data_type = SC_CARDCTL_COOLKEY_ATTR_TYPE_STRING; |
|
attribute->attribute_length = 0; |
|
@@ -1434,6 +1434,7 @@ coolkey_find_attribute(sc_card_t *card, sc_cardctl_coolkey_attribute_t *attribut |
|
if (buf_len <= sizeof(coolkey_v0_object_header_t)) { |
|
return SC_ERROR_CORRUPTED_DATA; |
|
} |
|
+ object_head = (coolkey_object_header_t *)obj; |
|
object_record_type = object_head->record_type; |
|
/* make sure it's a type we recognize */ |
|
if ((object_record_type != COOLKEY_V1_OBJECT) && (object_record_type != COOLKEY_V0_OBJECT)) { |
|
@@ -2183,6 +2184,8 @@ static int coolkey_initialize(sc_card_t *card) |
|
continue; |
|
} |
|
r = coolkey_add_object(priv, object_id, NULL, object_len, 0); |
|
+ if (r != SC_SUCCESS) |
|
+ sc_log(card->ctx, "coolkey_add_object() returned %d", r); |
|
|
|
} |
|
if (r != SC_ERROR_FILE_END_REACHED) { |
|
diff --git a/src/libopensc/card-entersafe.c b/src/libopensc/card-entersafe.c |
|
index 6e18252..1fe4102 100644 |
|
--- a/src/libopensc/card-entersafe.c |
|
+++ b/src/libopensc/card-entersafe.c |
|
@@ -487,7 +487,7 @@ static int entersafe_select_fid(sc_card_t *card, |
|
sc_file_t **file_out) |
|
{ |
|
int r; |
|
- sc_file_t *file=0; |
|
+ sc_file_t *file = NULL; |
|
sc_path_t path; |
|
|
|
memset(&path, 0, sizeof(sc_path_t)); |
|
diff --git a/src/libopensc/card-gids.c b/src/libopensc/card-gids.c |
|
index 51db9af..4db09f5 100644 |
|
--- a/src/libopensc/card-gids.c |
|
+++ b/src/libopensc/card-gids.c |
|
@@ -668,6 +668,7 @@ static int gids_get_crypto_identifier_from_key_ref(sc_card_t *card, const unsign |
|
if (index >= recordsnum) { |
|
SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL, SC_ERROR_INVALID_ARGUMENTS); |
|
} |
|
+ *cryptoidentifier = 0x00; /* initialize to zero */ |
|
if (records[index].wKeyExchangeKeySizeBits == 1024 || records[index].wSigKeySizeBits == 1024) { |
|
*cryptoidentifier = GIDS_RSA_1024_IDENTIFIER; |
|
return SC_SUCCESS; |
|
@@ -878,12 +879,16 @@ static int gids_read_public_key (struct sc_card *card , unsigned int algorithm, |
|
if (keydata != NULL) { |
|
rsa_key.modulus.data = (u8*) keydata; |
|
rsa_key.modulus.len = len; |
|
+ } else { |
|
+ rsa_key.modulus.len = 0; |
|
} |
|
|
|
keydata = sc_asn1_find_tag(card->ctx, keytemplate, tlen, GIDS_PUBKEY_TAG_EXPONENT, &len); |
|
if (keydata != NULL) { |
|
rsa_key.exponent.data = (u8*) keydata; |
|
rsa_key.exponent.len = len; |
|
+ } else { |
|
+ rsa_key.exponent.len = 0; |
|
} |
|
|
|
if (rsa_key.exponent.len && rsa_key.modulus.len) { |
|
@@ -1453,7 +1458,7 @@ static int gids_import_key(sc_card_t *card, sc_pkcs15_object_t *object, sc_pkcs1 |
|
SC_TEST_GOTO_ERR(card->ctx, SC_LOG_DEBUG_NORMAL, r, "unable to put the private key - key greater than 2048 bits ?"); |
|
r = SC_SUCCESS; |
|
err: |
|
- sc_mem_clear(buffer, sizeof(buffer)); |
|
+ sc_mem_clear(buffer, buflen); |
|
LOG_FUNC_RETURN(card->ctx, r); |
|
} |
|
|
|
diff --git a/src/libopensc/card-myeid.c b/src/libopensc/card-myeid.c |
|
index 0e75486..65c108f 100644 |
|
--- a/src/libopensc/card-myeid.c |
|
+++ b/src/libopensc/card-myeid.c |
|
@@ -846,20 +846,24 @@ myeid_convert_ec_signature(struct sc_context *ctx, size_t s_len, unsigned char * |
|
if (sig_len != (datalen - len_size - 1)) /* validate size of the DER structure */ |
|
return SC_ERROR_INVALID_DATA; |
|
|
|
- buf = calloc(1, (s_len + 7)/8*2); |
|
+ /* test&fail early */ |
|
+ buflen = (s_len + 7)/8*2; |
|
+ if (buflen > datalen) |
|
+ LOG_FUNC_RETURN(ctx, SC_ERROR_INVALID_DATA); |
|
+ |
|
+ buf = calloc(1, buflen); |
|
if (!buf) |
|
LOG_FUNC_RETURN(ctx, SC_ERROR_OUT_OF_MEMORY); |
|
- buflen = (s_len + 7)/8*2; |
|
|
|
r = sc_asn1_sig_value_sequence_to_rs(ctx, data, datalen, buf, buflen); |
|
- if (r < 0) |
|
+ if (r < 0) { |
|
free(buf); |
|
- LOG_TEST_RET(ctx, r, "Failed to cenvert Sig-Value to the raw RS format"); |
|
- |
|
- if (buflen > datalen) |
|
- LOG_FUNC_RETURN(ctx, SC_ERROR_INVALID_DATA); |
|
+ sc_log(ctx, "Failed to convert Sig-Value to the raw RS format"); |
|
+ return r; |
|
+ } |
|
|
|
memmove(data, buf, buflen); |
|
+ free(buf); |
|
return buflen; |
|
} |
|
|
|
@@ -868,7 +872,7 @@ static int |
|
myeid_compute_signature(struct sc_card *card, const u8 * data, size_t datalen, |
|
u8 * out, size_t outlen) |
|
{ |
|
- struct sc_context *ctx = card->ctx; |
|
+ struct sc_context *ctx; |
|
struct sc_apdu apdu; |
|
u8 rbuf[SC_MAX_APDU_BUFFER_SIZE]; |
|
u8 sbuf[SC_MAX_APDU_BUFFER_SIZE]; |
|
diff --git a/src/libopensc/iso7816.c b/src/libopensc/iso7816.c |
|
index 296cf69..2539d1c 100644 |
|
--- a/src/libopensc/iso7816.c |
|
+++ b/src/libopensc/iso7816.c |
|
@@ -392,6 +392,7 @@ iso7816_process_fci(struct sc_card *card, struct sc_file *file, |
|
sc_log(ctx, " type: %s", type); |
|
sc_log(ctx, " EF structure: %d", byte & 0x07); |
|
sc_log(ctx, " tag 0x82: 0x%02x", byte); |
|
+ /* FIXME: check return value? */ |
|
sc_file_set_type_attr(file, &byte, 1); |
|
} |
|
} |
|
diff --git a/src/libopensc/pkcs15-cac.c b/src/libopensc/pkcs15-cac.c |
|
index 4894fe4..e0fa50b 100644 |
|
--- a/src/libopensc/pkcs15-cac.c |
|
+++ b/src/libopensc/pkcs15-cac.c |
|
@@ -292,7 +292,7 @@ static int sc_pkcs15emu_cac_init(sc_pkcs15_card_t *p15card) |
|
struct sc_pkcs15_object pubkey_obj; |
|
struct sc_pkcs15_object prkey_obj; |
|
sc_pkcs15_der_t cert_der; |
|
- sc_pkcs15_cert_t *cert_out; |
|
+ sc_pkcs15_cert_t *cert_out = NULL; |
|
|
|
r = (card->ops->card_ctl)(card, SC_CARDCTL_CAC_GET_NEXT_CERT_OBJECT, &obj_info); |
|
|
|
@@ -352,12 +352,14 @@ static int sc_pkcs15emu_cac_init(sc_pkcs15_card_t *p15card) |
|
r = sc_pkcs15_read_certificate(p15card, &cert_info, &cert_out); |
|
if (r < 0 || cert_out->key == NULL) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "Failed to read/parse the certificate r=%d",r); |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} |
|
|
|
r = sc_pkcs15emu_add_x509_cert(p15card, &cert_obj, &cert_info); |
|
if (r < 0) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, " Failed to add cert obj r=%d",r); |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} |
|
/* set the token name to the name of the CN of the first certificate */ |
|
@@ -393,6 +395,7 @@ static int sc_pkcs15emu_cac_init(sc_pkcs15_card_t *p15card) |
|
usage, pubkey_info.usage, prkey_info.usage); |
|
if (cert_out->key->algorithm != SC_ALGORITHM_RSA) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL,"unsupported key.algorithm %d", cert_out->key->algorithm); |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} else { |
|
pubkey_info.modulus_length = cert_out->key->u.rsa.modulus.len * 8; |
|
diff --git a/src/libopensc/pkcs15-coolkey.c b/src/libopensc/pkcs15-coolkey.c |
|
index 487be19..de4920b 100644 |
|
--- a/src/libopensc/pkcs15-coolkey.c |
|
+++ b/src/libopensc/pkcs15-coolkey.c |
|
@@ -667,6 +667,8 @@ static int sc_pkcs15emu_coolkey_init(sc_pkcs15_card_t *p15card) |
|
} |
|
|
|
r = sc_pkcs15emu_object_add(p15card, obj_type, &obj_obj, obj_info); |
|
+ if (r != SC_SUCCESS) |
|
+ sc_log(card->ctx, "sc_pkcs15emu_object_add() returned %d", r); |
|
fail: |
|
if (key) { sc_pkcs15_free_pubkey(key); } |
|
|
|
diff --git a/src/libopensc/pkcs15-piv.c b/src/libopensc/pkcs15-piv.c |
|
index bf72df0..5bd0fdf 100644 |
|
--- a/src/libopensc/pkcs15-piv.c |
|
+++ b/src/libopensc/pkcs15-piv.c |
|
@@ -710,7 +710,7 @@ static int sc_pkcs15emu_piv_init(sc_pkcs15_card_t *p15card) |
|
struct sc_pkcs15_cert_info cert_info; |
|
struct sc_pkcs15_object cert_obj; |
|
sc_pkcs15_der_t cert_der; |
|
- sc_pkcs15_cert_t *cert_out; |
|
+ sc_pkcs15_cert_t *cert_out = NULL; |
|
|
|
ckis[i].cert_found = 0; |
|
ckis[i].key_alg = -1; |
|
@@ -761,6 +761,7 @@ static int sc_pkcs15emu_piv_init(sc_pkcs15_card_t *p15card) |
|
r = sc_pkcs15_read_certificate(p15card, &cert_info, &cert_out); |
|
if (r < 0 || cert_out->key == NULL) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "Failed to read/parse the certificate r=%d",r); |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} |
|
/* |
|
diff --git a/src/libopensc/pkcs15-sc-hsm.c b/src/libopensc/pkcs15-sc-hsm.c |
|
index 938ea9d..3f6b6e4 100644 |
|
--- a/src/libopensc/pkcs15-sc-hsm.c |
|
+++ b/src/libopensc/pkcs15-sc-hsm.c |
|
@@ -460,6 +460,7 @@ static int sc_pkcs15emu_sc_hsm_get_ec_public_key(struct sc_context *ctx, sc_cvc_ |
|
memcpy(pubkey->u.ec.params.der.value, ecp->der.value, ecp->der.len); |
|
pubkey->u.ec.params.der.len = ecp->der.len; |
|
|
|
+ /* FIXME: check return value? */ |
|
sc_pkcs15_fix_ec_parameters(ctx, &pubkey->u.ec.params); |
|
|
|
return SC_SUCCESS; |
|
@@ -627,11 +628,8 @@ static int sc_pkcs15emu_sc_hsm_add_prkd(sc_pkcs15_card_t * p15card, u8 keyid) { |
|
|
|
len = sizeof efbin; |
|
r = read_file(p15card, fid, efbin, &len); |
|
- LOG_TEST_RET(card->ctx, r, "Could not read EF"); |
|
|
|
- if (r < 0) { |
|
- return SC_SUCCESS; |
|
- } |
|
+ LOG_TEST_RET(card->ctx, r, "Could not read EF"); |
|
|
|
if (efbin[0] == 0x67) { /* Decode CSR and create public key object */ |
|
sc_pkcs15emu_sc_hsm_add_pubkey(p15card, efbin, len, key_info, prkd.label); |
|
diff --git a/src/pkcs11/framework-pkcs15.c b/src/pkcs11/framework-pkcs15.c |
|
index 0c89d47..732e1e5 100644 |
|
--- a/src/pkcs11/framework-pkcs15.c |
|
+++ b/src/pkcs11/framework-pkcs15.c |
|
@@ -571,8 +571,11 @@ __pkcs15_create_cert_object(struct pkcs15_fw_data *fw_data, struct sc_pkcs15_obj |
|
/* Certificate object */ |
|
rv = __pkcs15_create_object(fw_data, (struct pkcs15_any_object **) &object, |
|
cert, &pkcs15_cert_ops, sizeof(struct pkcs15_cert_object)); |
|
- if (rv < 0) |
|
+ if (rv < 0) { |
|
+ if (p15_cert != NULL) |
|
+ sc_pkcs15_free_certificate(p15_cert); |
|
return rv; |
|
+ } |
|
|
|
object->cert_info = p15_info; |
|
object->cert_data = p15_cert; |
|
@@ -643,6 +646,8 @@ __pkcs15_create_pubkey_object(struct pkcs15_fw_data *fw_data, |
|
object->pub_data = p15_key; |
|
if (p15_key && object->pub_info->modulus_length == 0 && p15_key->algorithm == SC_ALGORITHM_RSA) |
|
object->pub_info->modulus_length = 8 * p15_key->u.rsa.modulus.len; |
|
+ } else if (pubkey->emulated && (fw_data->p15_card->flags & SC_PKCS15_CARD_FLAG_EMULATED)) { |
|
+ sc_pkcs15_free_pubkey(p15_key); |
|
} |
|
|
|
if (pubkey_object != NULL) |
|
diff --git a/src/pkcs15init/pkcs15-lib.c b/src/pkcs15init/pkcs15-lib.c |
|
index c2fc2df..d1558e2 100644 |
|
--- a/src/pkcs15init/pkcs15-lib.c |
|
+++ b/src/pkcs15init/pkcs15-lib.c |
|
@@ -760,7 +760,7 @@ sc_pkcs15init_add_app(struct sc_card *card, struct sc_profile *profile, |
|
struct sc_pkcs15_object *pin_obj = NULL; |
|
struct sc_app_info *app; |
|
struct sc_file *df = profile->df_info->file; |
|
- int r; |
|
+ int r = SC_SUCCESS; |
|
|
|
LOG_FUNC_CALLED(ctx); |
|
p15card->card = card; |
|
diff --git a/src/pkcs15init/pkcs15-myeid.c b/src/pkcs15init/pkcs15-myeid.c |
|
index 9ed515d..6c93545 100644 |
|
--- a/src/pkcs15init/pkcs15-myeid.c |
|
+++ b/src/pkcs15init/pkcs15-myeid.c |
|
@@ -510,10 +510,10 @@ myeid_store_key(struct sc_profile *profile, struct sc_pkcs15_card *p15card, |
|
keybits = key_info->field_length; |
|
else |
|
key_info->field_length = keybits; |
|
- break; |
|
- |
|
+ |
|
if (sc_card_find_ec_alg(p15card->card, keybits, &prkey->u.ec.params.id) == NULL) |
|
LOG_TEST_RET(ctx, SC_ERROR_INVALID_ARGUMENTS, "Unsupported algorithm or key size"); |
|
+ break; |
|
default: |
|
LOG_TEST_RET(ctx, SC_ERROR_INVALID_ARGUMENTS, "Store key failed: Unsupported key type"); |
|
break; |
|
diff --git a/src/tests/p15dump.c b/src/tests/p15dump.c |
|
index 17ab86b..da8b4a3 100644 |
|
--- a/src/tests/p15dump.c |
|
+++ b/src/tests/p15dump.c |
|
@@ -30,8 +30,7 @@ static int dump_objects(const char *what, int type) |
|
printf("failed.\n"); |
|
fprintf(stderr, "Error enumerating %s: %s\n", |
|
what, sc_strerror(count)); |
|
- if (SC_SUCCESS != sc_unlock(card)) |
|
- return 1; |
|
+ sc_unlock(card); |
|
return 1; |
|
} |
|
if (count == 0) { |
|
diff --git a/src/tools/pkcs15-init.c b/src/tools/pkcs15-init.c |
|
index a1b183d..a4fb1a9 100644 |
|
--- a/src/tools/pkcs15-init.c |
|
+++ b/src/tools/pkcs15-init.c |
|
@@ -1318,8 +1318,10 @@ do_store_data_object(struct sc_profile *profile) |
|
args.der_encoded.value = data; |
|
args.der_encoded.len = datalen; |
|
r = sc_lock(p15card->card); |
|
- if (r < 0) |
|
+ if (r < 0) { |
|
+ free(data); |
|
return r; |
|
+ } |
|
r = sc_pkcs15init_store_data_object(p15card, profile, &args, NULL); |
|
sc_unlock(p15card->card); |
|
} |
|
diff --git a/src/tools/pkcs15-tool.c b/src/tools/pkcs15-tool.c |
|
index 092b9d9..e146753 100644 |
|
--- a/src/tools/pkcs15-tool.c |
|
+++ b/src/tools/pkcs15-tool.c |
|
@@ -793,15 +793,18 @@ static int read_public_key(void) |
|
|
|
if (r == SC_ERROR_OBJECT_NOT_FOUND) { |
|
fprintf(stderr, "Public key with ID '%s' not found.\n", opt_pubkey); |
|
- return 2; |
|
+ r = 2; |
|
+ goto out; |
|
} |
|
if (r < 0) { |
|
fprintf(stderr, "Public key enumeration failed: %s\n", sc_strerror(r)); |
|
- return 1; |
|
+ r = 1; |
|
+ goto out; |
|
} |
|
if (!pubkey) { |
|
fprintf(stderr, "Public key not available\n"); |
|
- return 1; |
|
+ r = 1; |
|
+ goto out; |
|
} |
|
|
|
r = sc_pkcs15_encode_pubkey_as_spki(ctx, pubkey, &pem_key.value, &pem_key.len); |
|
@@ -813,6 +816,7 @@ static int read_public_key(void) |
|
free(pem_key.value); |
|
} |
|
|
|
+out: |
|
if (cert) |
|
sc_pkcs15_free_certificate(cert); |
|
else if (pubkey) |
|
@@ -2097,6 +2101,7 @@ int main(int argc, char * const argv[]) |
|
break; |
|
case OPT_USE_PINPAD_DEPRECATED: |
|
fprintf(stderr, "'--no-prompt' is deprecated , use '--use-pinpad' instead.\n"); |
|
+ /* fallthrough */ |
|
case OPT_USE_PINPAD: |
|
opt_use_pinpad = 1; |
|
break; |
|
diff --git a/src/tools/sc-hsm-tool.c b/src/tools/sc-hsm-tool.c |
|
index cce855f..029d991 100644 |
|
--- a/src/tools/sc-hsm-tool.c |
|
+++ b/src/tools/sc-hsm-tool.c |
|
@@ -697,6 +697,7 @@ static int recreate_password_from_shares(char **pwd, int *pwdlen, int num_of_pas |
|
memset(inbuf, 0, sizeof(inbuf)); |
|
if (fgets(inbuf, sizeof(inbuf), stdin) == NULL) { |
|
fprintf(stderr, "Input aborted\n"); |
|
+ free(shares); |
|
return -1; |
|
} |
|
p = (sp->x); |
|
@@ -706,6 +707,7 @@ static int recreate_password_from_shares(char **pwd, int *pwdlen, int num_of_pas |
|
memset(inbuf, 0, sizeof(inbuf)); |
|
if (fgets(inbuf, sizeof(inbuf), stdin) == NULL) { |
|
fprintf(stderr, "Input aborted\n"); |
|
+ free(shares); |
|
return -1; |
|
} |
|
binlen = 64; |
|
diff --git a/src/tools/westcos-tool.c b/src/tools/westcos-tool.c |
|
index 29b75dd..ff3d5e6 100644 |
|
--- a/src/tools/westcos-tool.c |
|
+++ b/src/tools/westcos-tool.c |
|
@@ -91,8 +91,6 @@ static int finalize = 0; |
|
static int install_pin = 0; |
|
static int overwrite = 0; |
|
|
|
-static const char *pin = NULL; |
|
-static const char *puk = NULL; |
|
static char *cert = NULL; |
|
|
|
static int keylen = 0; |
|
@@ -260,7 +258,7 @@ static int unlock_pin(sc_card_t *card, |
|
} |
|
else |
|
{ |
|
- if(pin == NULL || puk == NULL) |
|
+ if(pin_value == NULL || puk_value == NULL) |
|
{ |
|
return SC_ERROR_INVALID_ARGUMENTS; |
|
} |
|
@@ -372,6 +370,8 @@ int main(int argc, char *argv[]) |
|
RSA *rsa = NULL; |
|
BIGNUM *bn = NULL; |
|
BIO *mem = NULL; |
|
+ static const char *pin = NULL; |
|
+ static const char *puk = NULL; |
|
|
|
while (1) |
|
{ |
|
|
|
From e73b2ad2e01cbcc3fdee471ce9692ab95a83b8a0 Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Wed, 1 Mar 2017 09:45:17 +0100 |
|
Subject: [PATCH 2/3] Sanitize call to sc_pkcs15_free_certificate() |
|
|
|
--- |
|
src/libopensc/pkcs15-cac.c | 3 ++- |
|
1 file changed, 2 insertions(+), 1 deletion(-) |
|
|
|
diff --git a/src/libopensc/pkcs15-cac.c b/src/libopensc/pkcs15-cac.c |
|
index e0fa50b..61c6430 100644 |
|
--- a/src/libopensc/pkcs15-cac.c |
|
+++ b/src/libopensc/pkcs15-cac.c |
|
@@ -352,7 +352,8 @@ static int sc_pkcs15emu_cac_init(sc_pkcs15_card_t *p15card) |
|
r = sc_pkcs15_read_certificate(p15card, &cert_info, &cert_out); |
|
if (r < 0 || cert_out->key == NULL) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "Failed to read/parse the certificate r=%d",r); |
|
- sc_pkcs15_free_certificate(cert_out); |
|
+ if (cert_out != NULL) |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} |
|
|
|
|
|
From bdf452210f7fdbefe91df910025142b2e48b8ebc Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Wed, 1 Mar 2017 15:23:17 +0100 |
|
Subject: [PATCH 3/3] Sanitize call to sc_pkcs15_free_certificate() in PIV too |
|
|
|
--- |
|
src/libopensc/pkcs15-piv.c | 3 ++- |
|
1 file changed, 2 insertions(+), 1 deletion(-) |
|
|
|
diff --git a/src/libopensc/pkcs15-piv.c b/src/libopensc/pkcs15-piv.c |
|
index 5bd0fdf..f6b6742 100644 |
|
--- a/src/libopensc/pkcs15-piv.c |
|
+++ b/src/libopensc/pkcs15-piv.c |
|
@@ -761,7 +761,8 @@ static int sc_pkcs15emu_piv_init(sc_pkcs15_card_t *p15card) |
|
r = sc_pkcs15_read_certificate(p15card, &cert_info, &cert_out); |
|
if (r < 0 || cert_out->key == NULL) { |
|
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "Failed to read/parse the certificate r=%d",r); |
|
- sc_pkcs15_free_certificate(cert_out); |
|
+ if (cert_out != NULL) |
|
+ sc_pkcs15_free_certificate(cert_out); |
|
continue; |
|
} |
|
/* |
|
From 389ffe590986c6ed42fa810874a52a51bac3ca26 Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Thu, 23 Mar 2017 12:16:46 +0100 |
|
Subject: [PATCH 1/3] Coverity: FORWARD_NULL -- copy&paste error |
|
|
|
--- |
|
src/tools/gids-tool.c | 2 +- |
|
1 file changed, 1 insertion(+), 1 deletion(-) |
|
|
|
diff --git a/src/tools/gids-tool.c b/src/tools/gids-tool.c |
|
index 029c53f..84073b6 100644 |
|
--- a/src/tools/gids-tool.c |
|
+++ b/src/tools/gids-tool.c |
|
@@ -277,7 +277,7 @@ static int changeAdminKey(sc_card_t* card, const char *so_pin, const char* new_k |
|
|
|
if (new_key == NULL) { |
|
printf("Enter new admin key (48 hexadecimal characters) : "); |
|
- util_getpass(&_so_pin, NULL, stdin); |
|
+ util_getpass(&_new_key, NULL, stdin); |
|
printf("\n"); |
|
} else { |
|
_new_key = (char *)new_key; |
|
-- |
|
2.9.3 |
|
|
|
|
|
From 1133efa4fe4d9a0267486cadbd3f6d144c584645 Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Thu, 23 Mar 2017 15:14:35 +0100 |
|
Subject: [PATCH 2/3] CLANG_WARNING: Call to 'malloc' has an allocation size of |
|
0 bytes |
|
|
|
--- |
|
src/scconf/scconf.c | 2 ++ |
|
1 file changed, 2 insertions(+) |
|
|
|
diff --git a/src/scconf/scconf.c b/src/scconf/scconf.c |
|
index 7fcc301..678df3e 100644 |
|
--- a/src/scconf/scconf.c |
|
+++ b/src/scconf/scconf.c |
|
@@ -411,6 +411,8 @@ char *scconf_list_strdup(const scconf_list * list, const char *filler) |
|
if (filler) { |
|
len += scconf_list_array_length(list) * (strlen(filler) + 1); |
|
} |
|
+ if (len == 0) |
|
+ return NULL; |
|
buf = malloc(len); |
|
if (!buf) { |
|
return NULL; |
|
-- |
|
2.9.3 |
|
|
|
|
|
From f82bc2008d58348cafcbba30623fcb55dab5cb3a Mon Sep 17 00:00:00 2001 |
|
From: Jakub Jelen <jjelen@redhat.com> |
|
Date: Thu, 23 Mar 2017 15:46:42 +0100 |
|
Subject: [PATCH 3/3] Avoid malloc with 0 argument |
|
|
|
--- |
|
src/libopensc/card-cac.c | 7 +++++-- |
|
1 file changed, 5 insertions(+), 2 deletions(-) |
|
|
|
diff --git a/src/libopensc/card-cac.c b/src/libopensc/card-cac.c |
|
index 788fb52..6a5b5af 100644 |
|
--- a/src/libopensc/card-cac.c |
|
+++ b/src/libopensc/card-cac.c |
|
@@ -670,12 +670,12 @@ static int cac_read_binary(sc_card_t *card, unsigned int idx, |
|
r = sc_decompress_alloc(&priv->cache_buf, &priv->cache_buf_len, |
|
cert_ptr, cert_len, COMPRESSION_AUTO); |
|
#else |
|
- sc_log(card->ctx, "PIV compression not supported, no zlib"); |
|
+ sc_log(card->ctx, "CAC compression not supported, no zlib"); |
|
r = SC_ERROR_NOT_SUPPORTED; |
|
#endif |
|
if (r) |
|
goto done; |
|
- } else { |
|
+ } else if (cert_len > 0) { |
|
priv->cache_buf = malloc(cert_len); |
|
if (priv->cache_buf == NULL) { |
|
r = SC_ERROR_OUT_OF_MEMORY; |
|
@@ -683,6 +683,9 @@ static int cac_read_binary(sc_card_t *card, unsigned int idx, |
|
} |
|
priv->cache_buf_len = cert_len; |
|
memcpy(priv->cache_buf, cert_ptr, cert_len); |
|
+ } else { |
|
+ sc_log(card->ctx, "Can't read zero-length certificate"); |
|
+ goto done; |
|
} |
|
break; |
|
default: |
|
-- |
|
2.9.3 |
|
|
|
|
|
|