Add more assertions to keyring functions

This commit is contained in:
Andrew Bettison 2018-05-16 15:47:12 +09:30
parent 90e338f239
commit 1b2147074f
5 changed files with 122 additions and 94 deletions

192
keyring.c
View File

@ -127,6 +127,7 @@ static int keyring_initialise(keyring_file *k)
*/ */
static int keyring_load(keyring_file *k, const char *pin) static int keyring_load(keyring_file *k, const char *pin)
{ {
assert(k->bam == NULL);
/* Read BAMs for each slab in the file */ /* Read BAMs for each slab in the file */
keyring_bam **b=&k->bam; keyring_bam **b=&k->bam;
size_t offset = 0; size_t offset = 0;
@ -175,8 +176,8 @@ static unsigned is_slot_allocated(const keyring_file *k, unsigned slot)
assert(slot < KEYRING_BAM_BITS); assert(slot < KEYRING_BAM_BITS);
unsigned position = slot & (KEYRING_BAM_BITS - 1); unsigned position = slot & (KEYRING_BAM_BITS - 1);
unsigned byte = position >> 3; unsigned byte = position >> 3;
unsigned bit = position & 7; uint8_t mask = 1 << (position & 7);
return (k->bam->allocmap[byte] & (1 << bit)) ? 1 : 0; return (k->bam->allocmap[byte] & mask) ? 1 : 0;
} }
static unsigned is_slot_loadable(const keyring_file *k, unsigned slot) static unsigned is_slot_loadable(const keyring_file *k, unsigned slot)
@ -185,8 +186,8 @@ static unsigned is_slot_loadable(const keyring_file *k, unsigned slot)
assert(slot < KEYRING_BAM_BITS); assert(slot < KEYRING_BAM_BITS);
unsigned position = slot & (KEYRING_BAM_BITS - 1); unsigned position = slot & (KEYRING_BAM_BITS - 1);
unsigned byte = position >> 3; unsigned byte = position >> 3;
unsigned bit = position & 7; uint8_t mask = 1 << (position & 7);
return (k->bam->allocmap[byte] & (1 << bit)) && !(k->bam->loadmap[byte] & (1 << bit)); return (k->bam->allocmap[byte] & mask) && !(k->bam->loadmap[byte] & mask);
} }
static void mark_slot_allocated(keyring_file *k, unsigned slot, int allocated) static void mark_slot_allocated(keyring_file *k, unsigned slot, int allocated)
@ -195,11 +196,13 @@ static void mark_slot_allocated(keyring_file *k, unsigned slot, int allocated)
assert(slot < KEYRING_BAM_BITS); assert(slot < KEYRING_BAM_BITS);
unsigned position = slot & (KEYRING_BAM_BITS - 1); unsigned position = slot & (KEYRING_BAM_BITS - 1);
unsigned byte = position >> 3; unsigned byte = position >> 3;
unsigned bit = position & 7; uint8_t mask = 1 << (position & 7);
if (allocated) if (allocated) {
k->bam->allocmap[byte] |= (1 << bit); k->bam->allocmap[byte] |= mask;
else } else {
k->bam->allocmap[byte] &= ~(1 << bit); assert(k->bam->allocmap[byte] & mask); // already marked as allocated
k->bam->allocmap[byte] &= ~mask;
}
} }
static void mark_slot_loaded(keyring_file *k, unsigned slot, int loaded) static void mark_slot_loaded(keyring_file *k, unsigned slot, int loaded)
@ -208,11 +211,13 @@ static void mark_slot_loaded(keyring_file *k, unsigned slot, int loaded)
assert(slot < KEYRING_BAM_BITS); assert(slot < KEYRING_BAM_BITS);
unsigned position = slot & (KEYRING_BAM_BITS - 1); unsigned position = slot & (KEYRING_BAM_BITS - 1);
unsigned byte = position >> 3; unsigned byte = position >> 3;
unsigned bit = position & 7; uint8_t mask = 1 << (position & 7);
if (loaded) if (loaded) {
k->bam->loadmap[byte] |= (1 << bit); k->bam->loadmap[byte] |= mask;
else } else {
k->bam->loadmap[byte] &= ~(1 << bit); assert(k->bam->loadmap[byte] & mask); // already marked as loaded
k->bam->loadmap[byte] &= ~mask;
}
} }
void keyring_iterator_start(keyring_file *k, keyring_iterator *it) void keyring_iterator_start(keyring_file *k, keyring_iterator *it)
@ -319,23 +324,46 @@ static void wipestr(char *str)
*str++ = ' '; *str++ = ' ';
} }
/* Wipe any sensitive data from the given identity and release its allocated memory by calling
* free(3). The identity must not be linked into any keyring, but this function does not check
* that, so it is only for internal use within keyring.c.
*/
static void free_identity(keyring_identity *id)
{
if (id->PKRPin) {
wipestr(id->PKRPin);
free(id->PKRPin);
id->PKRPin = NULL;
}
while(id->keypairs){
keypair *kp=id->keypairs;
id->keypairs=kp->next;
keyring_free_keypair(kp);
}
if (id->challenge)
free(id->challenge);
if (id->subscriber)
link_stop_routing(id->subscriber);
bzero(id,sizeof(keyring_identity));
free(id);
}
void keyring_free(keyring_file *k) void keyring_free(keyring_file *k)
{ {
if (!k) return; if (!k) return;
/* Close keyring file handle */ /* Close keyring file handle */
if (k->file) fclose(k->file); if (k->file) {
k->file=NULL; fclose(k->file);
k->file = NULL;
}
/* Free BAMs (no substructure, so easy) */ /* Free BAMs (no substructure, so easy) */
keyring_bam *b=k->bam; while (k->bam) {
while(b) { keyring_bam *b = k->bam;
keyring_bam *last_bam=b; k->bam = b->next;
b=b->next; bzero(b, sizeof(keyring_bam));
/* Clear out any private data */ free(b);
bzero(last_bam,sizeof(keyring_bam));
/* release structure */
free(last_bam);
} }
/* Free dynamically allocated salt strings. /* Free dynamically allocated salt strings.
@ -357,7 +385,7 @@ void keyring_free(keyring_file *k)
while(k->identities){ while(k->identities){
keyring_identity *i = k->identities; keyring_identity *i = k->identities;
k->identities=i->next; k->identities=i->next;
keyring_free_identity(i); free_identity(i);
} }
/* Wipe everything, just to be sure. */ /* Wipe everything, just to be sure. */
@ -368,8 +396,8 @@ void keyring_free(keyring_file *k)
} }
/* Release ("lock") all the identities that have a given PIN, by unlinking them from the in-memory /* Release ("lock") all the identities that have a given PIN, by unlinking them from the in-memory
* cache list. DOES call keyring_free_identity(id) on each released identity. When this function * cache list. DOES call free_identity(id) on each released identity. When this function returns,
* returns, there are no unlocked identities with the given PIN. * there are no unlocked identities with the given PIN.
*/ */
void keyring_release_identities_by_pin(keyring_file *k, const char *pin) void keyring_release_identities_by_pin(keyring_file *k, const char *pin)
{ {
@ -377,12 +405,12 @@ void keyring_release_identities_by_pin(keyring_file *k, const char *pin)
DEBUGF(keyring, "release identity PIN=%s", alloca_str_toprint(pin)); DEBUGF(keyring, "release identity PIN=%s", alloca_str_toprint(pin));
keyring_identity **i=&k->identities; keyring_identity **i=&k->identities;
while(*i){ while(*i){
keyring_identity *id = (*i); keyring_identity *id = *i;
if (id->PKRPin && strcmp(id->PKRPin, pin) == 0) { if (id->PKRPin && strcmp(id->PKRPin, pin) == 0) {
INFOF("release identity slot=%u SID=%s", id->slot, alloca_tohex_sid_t(*id->box_pk)); INFOF("release identity slot=%u SID=%s", id->slot, alloca_tohex_sid_t(*id->box_pk));
(*i) = id->next; *i = id->next;
mark_slot_loaded(k, id->slot, 0); mark_slot_loaded(k, id->slot, 0);
keyring_free_identity(id); free_identity(id);
}else{ }else{
i=&id->next; i=&id->next;
} }
@ -392,8 +420,8 @@ void keyring_release_identities_by_pin(keyring_file *k, const char *pin)
/* Release the given single identity by unlinking it from the in-memory cache list. To ensure that /* Release the given single identity by unlinking it from the in-memory cache list. To ensure that
* re-entering the identity's PIN will unlock it again, mark any other unlocked identities that have * re-entering the identity's PIN will unlock it again, mark any other unlocked identities that have
* the same PIN as no longer "fully" unlocked, so that keyring_enter_pin() will re-try the * the same PIN as no longer "fully" unlocked, so that keyring_enter_pin() will re-try the
* decryption. Does NOT call keyring_free_identity(id), so the identity's in-memory structure * decryption. Does NOT call free_identity(id), so the identity's in-memory structure remain
* remain intact; the caller is responsible for freeing the identity. * intact; the caller is responsible for freeing the identity.
*/ */
void keyring_release_identity(keyring_file *k, keyring_identity *id) void keyring_release_identity(keyring_file *k, keyring_identity *id)
{ {
@ -411,14 +439,15 @@ void keyring_release_identity(keyring_file *k, keyring_identity *id)
} }
assert(prev); // the identity being released must be in the keyring assert(prev); // the identity being released must be in the keyring
(*prev) = id->next; (*prev) = id->next;
id->next = NULL;
mark_slot_loaded(k, id->slot, 0); mark_slot_loaded(k, id->slot, 0);
} }
/* Release the single identity with the given SID, by unlinking it from the in-memory cache list. /* Release the single identity with the given SID, by unlinking it from the in-memory cache list.
* See the comment on keyring_release_identity() regarding PIN management. Returns zero if an * See the comment on keyring_release_identity() regarding PIN management. Returns zero if an
* identity was found and released, -1 if no such identity was found. Unlike * identity was found and released, -1 if no such identity was found. Unlike
* keyring_release_identity(), this function DOES call keyring_free_identity(id) on any released * keyring_release_identity(), this function DOES call free_identity(id) on any released identity
* identity before returning. * before returning.
*/ */
int keyring_release_subscriber(keyring_file *k, const sid_t *sid) int keyring_release_subscriber(keyring_file *k, const sid_t *sid)
{ {
@ -428,32 +457,22 @@ int keyring_release_subscriber(keyring_file *k, const sid_t *sid)
keyring_identity *iid = *i; keyring_identity *iid = *i;
if (cmp_sid_t(iid->box_pk, sid) == 0) { if (cmp_sid_t(iid->box_pk, sid) == 0) {
keyring_release_identity(k, iid); keyring_release_identity(k, iid);
keyring_free_identity(iid); free_identity(iid);
return 0; return 0;
} }
} }
return WHYF("cannot release non-existent keyring entry SID=%s", alloca_tohex_sid_t(*sid)); return WHYF("cannot release non-existent keyring entry SID=%s", alloca_tohex_sid_t(*sid));
} }
void keyring_free_identity(keyring_identity *id) /* Free the given identity after ensuring that it is not linked into the given keyring.
*/
void keyring_free_identity(keyring_file *k, keyring_identity *id)
{ {
if (id->PKRPin) { keyring_identity *i;
/* Wipe pin from local memory before freeing. */ for (i = k->identities; i; i = i->next)
wipestr(id->PKRPin); assert(i != id);
free(id->PKRPin); assert(id->next == NULL);
id->PKRPin = NULL; free_identity(id);
}
while(id->keypairs){
keypair *kp=id->keypairs;
id->keypairs=kp->next;
keyring_free_keypair(kp);
}
if (id->challenge)
free(id->challenge);
if (id->subscriber)
link_stop_routing(id->subscriber);
bzero(id,sizeof(keyring_identity));
free(id);
} }
/* /*
@ -1189,14 +1208,14 @@ static keyring_identity *keyring_unpack_identity(unsigned char *slot_data, const
} }
if (keypair_len > rotbuf_remain(&rbuf)) { if (keypair_len > rotbuf_remain(&rbuf)) {
DEBUGF(keyring, "invalid keypair length %zu", keypair_len); DEBUGF(keyring, "invalid keypair length %zu", keypair_len);
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
// Create keyring entry to hold the key pair. Even entries of unknown type are stored, // Create keyring entry to hold the key pair. Even entries of unknown type are stored,
// so they can be dumped. // so they can be dumped.
keypair *kp = keyring_alloc_keypair(ktype, keypair_len); keypair *kp = keyring_alloc_keypair(ktype, keypair_len);
if (kp == NULL) { if (kp == NULL) {
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
struct rotbuf rbstart = rbuf; struct rotbuf rbstart = rbuf;
@ -1211,7 +1230,7 @@ static keyring_identity *keyring_unpack_identity(unsigned char *slot_data, const
// If there is an error, it is probably an empty slot. // If there is an error, it is probably an empty slot.
DEBUGF(keyring, "key type 0x%02x does not unpack", ktype); DEBUGF(keyring, "key type 0x%02x does not unpack", ktype);
keyring_free_keypair(kp); keyring_free_keypair(kp);
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
// Ensure that the correct number of bytes was consumed. // Ensure that the correct number of bytes was consumed.
@ -1221,7 +1240,7 @@ static keyring_identity *keyring_unpack_identity(unsigned char *slot_data, const
// empty slot. // empty slot.
DEBUGF(keyring, "key type 0x%02x unpacked wrong length (unpacked %u, expecting %u)", ktype, (int)unpacked, (int)keypair_len); DEBUGF(keyring, "key type 0x%02x unpacked wrong length (unpacked %u, expecting %u)", ktype, (int)unpacked, (int)keypair_len);
keyring_free_keypair(kp); keyring_free_keypair(kp);
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
// Got a valid key pair! Sort the key pairs by (key type, public key, private key) and weed // Got a valid key pair! Sort the key pairs by (key type, public key, private key) and weed
@ -1232,7 +1251,7 @@ static keyring_identity *keyring_unpack_identity(unsigned char *slot_data, const
// If the buffer offset overshot, we got an invalid keypair code and length combination. // If the buffer offset overshot, we got an invalid keypair code and length combination.
if (rbuf.wrap > 1) { if (rbuf.wrap > 1) {
DEBUGF(keyring, "slot overrun by %u bytes", rbuf.wrap - 1); DEBUGF(keyring, "slot overrun by %u bytes", rbuf.wrap - 1);
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
DEBUGF(keyring, "unpacked key pairs"); DEBUGF(keyring, "unpacked key pairs");
@ -1368,7 +1387,7 @@ static int keyring_decrypt_pkr(keyring_file *k, const char *pin, int slot)
bzero(slot_data,KEYRING_PAGE_SIZE); bzero(slot_data,KEYRING_PAGE_SIZE);
bzero(hash,crypto_hash_sha512_BYTES); bzero(hash,crypto_hash_sha512_BYTES);
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return -1; return -1;
} }
@ -1458,6 +1477,8 @@ static unsigned find_free_slot(const keyring_file *k)
*/ */
static int keyring_commit_identity(keyring_file *k, keyring_identity *id) static int keyring_commit_identity(keyring_file *k, keyring_identity *id)
{ {
assert(id->next == NULL); // not already linked into keyring
keyring_finalise_identity(&k->dirty, id); keyring_finalise_identity(&k->dirty, id);
// Do nothing if an identity with this sid already exists // Do nothing if an identity with this sid already exists
if (keyring_find_identity_sid(k, id->box_pk)) { if (keyring_find_identity_sid(k, id->box_pk)) {
@ -1468,8 +1489,10 @@ static int keyring_commit_identity(keyring_file *k, keyring_identity *id)
mark_slot_loaded(k, id->slot, 1); mark_slot_loaded(k, id->slot, 1);
keyring_identity **i=&k->identities; keyring_identity **i=&k->identities;
while(*i) while (*i) {
i=&(*i)->next; assert(*i != id); // not already linked into keyring
i = &(*i)->next;
}
*i=id; *i=id;
add_subscriber(id); add_subscriber(id);
@ -1489,7 +1512,7 @@ static keyring_identity *keyring_new_identity()
if (key_types[ktype].creator) { if (key_types[ktype].creator) {
keypair *kp = keyring_alloc_keypair(ktype, 0); keypair *kp = keyring_alloc_keypair(ktype, 0);
if (kp == NULL){ if (kp == NULL){
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
key_types[ktype].creator(kp); key_types[ktype].creator(kp);
@ -1518,8 +1541,10 @@ keyring_identity *keyring_inmemory_identity(){
keyring_identity *keyring_create_identity(keyring_file *k, const char *pin) keyring_identity *keyring_create_identity(keyring_file *k, const char *pin)
{ {
DEBUGF(keyring, "k=%p", k); DEBUGF(keyring, "k=%p", k);
/* Check obvious abort conditions early */ if (!k->bam) {
if (!k->bam) { WHY("keyring lacks BAM"); return NULL; } WHY("keyring is not loaded");
return NULL;
}
if (!pin) pin=""; if (!pin) pin="";
@ -1549,7 +1574,7 @@ keyring_identity *keyring_create_identity(keyring_file *k, const char *pin)
kci_safeexit: kci_safeexit:
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return NULL; return NULL;
} }
@ -1577,18 +1602,22 @@ static int write_random_slot(keyring_file *k, unsigned slot)
/* Remove the given identity from the keyring by overwriting it's slot in the keyring file with /* Remove the given identity from the keyring by overwriting it's slot in the keyring file with
* random data, and unlinking it from the in-memory cache list. Does NOT call * random data, and unlinking it from the in-memory cache list. Does NOT call
* keyring_free_identity(id), so the identity's contents remain intact; the caller must free the * free_identity(id), so the identity's contents remain intact; the caller must free the identity if
* identity if desired. * desired.
*/ */
void keyring_destroy_identity(keyring_file *k, keyring_identity *id) void keyring_destroy_identity(keyring_file *k, keyring_identity *id)
{ {
DEBUGF(keyring, "k=%p, id=%p", k, id); DEBUGF(keyring, "k=%p, id=%p, id->slot=%u", k, id, id->slot);
if (!k->bam) { if (!k->bam) {
WHY("keyring lacks BAM"); WHY("keyring is not loaded");
return; return;
} }
assert(id->slot != 0); assert(id->slot != 0);
DEBUGF(keyring, "Destroy identity in slot %u", id->slot);
keyring_identity **i = &k->identities;
while (*i && *i != id)
i = &(*i)->next;
assert(*i); // the identity being released must be in the keyring
// Mark the slot as unallocated in the BAM and un-loaded in memory. // Mark the slot as unallocated in the BAM and un-loaded in memory.
mark_slot_allocated(k, id->slot, 0); mark_slot_allocated(k, id->slot, 0);
@ -1598,11 +1627,8 @@ void keyring_destroy_identity(keyring_file *k, keyring_identity *id)
write_random_slot(k, id->slot); write_random_slot(k, id->slot);
// Unlink the identity from the in-memory cache. // Unlink the identity from the in-memory cache.
keyring_identity **i = &k->identities;
while (*i && *i != id)
i = &(*i)->next;
if (*i == id)
*i = id->next; *i = id->next;
id->next = NULL;
} }
int keyring_commit(keyring_file *k) int keyring_commit(keyring_file *k)
@ -2160,7 +2186,7 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
line[--linelen] = '\0'; line[--linelen] = '\0';
} else { } else {
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return WHY("line too long"); return WHY("line too long");
} }
unsigned idn; unsigned idn;
@ -2171,12 +2197,12 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
break; break;
if (n != 2){ if (n != 2){
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return WHYF("malformed input n=%u", n); return WHYF("malformed input n=%u", n);
} }
if (ktype == KEYTYPE_INVALID){ if (ktype == KEYTYPE_INVALID){
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return WHY("invalid input: ktype=0"); return WHY("invalid input: ktype=0");
} }
const char *ktypestr = &line[i]; const char *ktypestr = &line[i];
@ -2186,7 +2212,7 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
keypair *kp = keyring_alloc_keypair(ktype, 0); keypair *kp = keyring_alloc_keypair(ktype, 0);
if (kp == NULL){ if (kp == NULL){
if (id) if (id)
keyring_free_identity(id); free_identity(id);
return -1; return -1;
} }
int (*loader)(keypair *, const char *) = load_unknown; int (*loader)(keypair *, const char *) = load_unknown;
@ -2194,7 +2220,7 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
loader = key_types[ktype].loader; loader = key_types[ktype].loader;
if (loader(kp, content) == -1) { if (loader(kp, content) == -1) {
if (id) if (id)
keyring_free_identity(id); free_identity(id);
keyring_free_keypair(kp); keyring_free_keypair(kp);
return -1; return -1;
} }
@ -2202,7 +2228,7 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
last_idn = idn; last_idn = idn;
if (id){ if (id){
if (!keyring_commit_identity(k, id)) if (!keyring_commit_identity(k, id))
keyring_free_identity(id); free_identity(id);
else else
k->dirty=1; k->dirty=1;
} }
@ -2212,12 +2238,12 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
} }
if (pini < entry_pinc && (id->PKRPin = str_edup(entry_pinv[pini++])) == NULL) { if (pini < entry_pinc && (id->PKRPin = str_edup(entry_pinv[pini++])) == NULL) {
keyring_free_keypair(kp); keyring_free_keypair(kp);
keyring_free_identity(id); free_identity(id);
return -1; return -1;
} }
if ((id->slot = find_free_slot(k)) == 0) { if ((id->slot = find_free_slot(k)) == 0) {
keyring_free_keypair(kp); keyring_free_keypair(kp);
keyring_free_identity(id); free_identity(id);
return WHY("no free slot"); return WHY("no free slot");
} }
DEBUGF(keyring, "Allocate identity into slot %u", id->slot); DEBUGF(keyring, "Allocate identity into slot %u", id->slot);
@ -2227,7 +2253,7 @@ int keyring_load_from_dump(keyring_file *k, unsigned entry_pinc, const char **en
} }
if (id){ if (id){
if (!keyring_commit_identity(k, id)) if (!keyring_commit_identity(k, id))
keyring_free_identity(id); free_identity(id);
else else
k->dirty=1; k->dirty=1;
} }

View File

@ -96,8 +96,8 @@ typedef struct keyring_identity {
typedef struct keyring_bam { typedef struct keyring_bam {
size_t file_offset; size_t file_offset;
unsigned char allocmap[KEYRING_BAM_BYTES]; uint8_t allocmap[KEYRING_BAM_BYTES];
unsigned char loadmap[KEYRING_BAM_BYTES]; uint8_t loadmap[KEYRING_BAM_BYTES];
struct keyring_bam *next; struct keyring_bam *next;
} keyring_bam; } keyring_bam;
@ -147,7 +147,7 @@ int keyring_send_identity_request(struct subscriber *subscriber);
int keyring_commit(keyring_file *k); int keyring_commit(keyring_file *k);
keyring_identity *keyring_inmemory_identity(); keyring_identity *keyring_inmemory_identity();
void keyring_free_identity(keyring_identity *id); void keyring_free_identity(keyring_file *k, keyring_identity *id);
keyring_identity *keyring_create_identity(keyring_file *k, const char *pin); keyring_identity *keyring_create_identity(keyring_file *k, const char *pin);
void keyring_destroy_identity(keyring_file *k, keyring_identity *id); void keyring_destroy_identity(keyring_file *k, keyring_identity *id);
void keyring_identity_extract(const keyring_identity *id, const char **didp, const char **namep); void keyring_identity_extract(const keyring_identity *id, const char **didp, const char **namep);

View File

@ -270,7 +270,7 @@ static int app_keyring_remove(const struct cli_parsed *parsed, struct cli_contex
if (keyring_commit(keyring) == -1) if (keyring_commit(keyring) == -1)
return WHY("Could not destroy identity"); return WHY("Could not destroy identity");
cli_output_identity(context, id); cli_output_identity(context, id);
keyring_free_identity(id); keyring_free_identity(keyring, id);
return 0; return 0;
} }

View File

@ -228,11 +228,11 @@ static int restful_keyring_add(httpd_request *r, const char *remainder)
if (id == NULL) if (id == NULL)
return http_request_keyring_response(r, 500, "Could not create identity"); return http_request_keyring_response(r, 500, "Could not create identity");
if ((did || name) && keyring_set_did_name(id, did ? did : "", name ? name : "") == -1) { if ((did || name) && keyring_set_did_name(id, did ? did : "", name ? name : "") == -1) {
keyring_free_identity(id); keyring_free_identity(keyring, id);
return http_request_keyring_response(r, 500, "Could not set identity DID/Name"); return http_request_keyring_response(r, 500, "Could not set identity DID/Name");
} }
if (keyring_commit(keyring) == -1) { if (keyring_commit(keyring) == -1) {
keyring_free_identity(id); keyring_free_identity(keyring, id);
return http_request_keyring_response(r, 500, "Could not store new identity"); return http_request_keyring_response(r, 500, "Could not store new identity");
} }
return http_request_keyring_response_identity(r, 201, id); return http_request_keyring_response_identity(r, 201, id);
@ -265,7 +265,7 @@ static int restful_keyring_remove(httpd_request *r, const char *remainder)
if (keyring_commit(keyring) == -1) if (keyring_commit(keyring) == -1)
return http_request_keyring_response(r, 500, "Could not erase removed identity"); return http_request_keyring_response(r, 500, "Could not erase removed identity");
int ret = http_request_keyring_response_identity(r, 200, id); int ret = http_request_keyring_response_identity(r, 200, id);
keyring_free_identity(id); keyring_free_identity(keyring, id);
return ret; return ret;
} }
@ -300,6 +300,6 @@ static int restful_keyring_lock(httpd_request *r, const char *remainder)
if (!id) if (!id)
return http_request_keyring_response(r, 404, "Identity not found"); return http_request_keyring_response(r, 404, "Identity not found");
keyring_release_identity(keyring, id); keyring_release_identity(keyring, id);
keyring_free_identity(id); keyring_free_identity(keyring, id);
return http_request_keyring_response(r, 200, "Identity locked"); return http_request_keyring_response(r, 200, "Identity locked");
} }

View File

@ -108,8 +108,10 @@ struct subscriber *get_my_subscriber(bool_t create)
void release_my_subscriber() void release_my_subscriber()
{ {
if (my_subscriber && my_subscriber->identity->slot==0) if (my_subscriber && my_subscriber->identity->slot==0) {
keyring_free_identity(my_subscriber->identity); assert(keyring != NULL);
keyring_free_identity(keyring, my_subscriber->identity);
}
server_unlink_proc_state("primary_sid"); server_unlink_proc_state("primary_sid");
my_subscriber = NULL; my_subscriber = NULL;
primary_sid = NULL; primary_sid = NULL;