diff options
| author | Michael Brown | 2012-04-24 17:10:22 +0200 |
|---|---|---|
| committer | Michael Brown | 2012-04-24 17:28:15 +0200 |
| commit | bd16deaa873b67eef9238635f57906f1340861c9 (patch) | |
| tree | 7b98e2e1bc4242167823956828c296fe3f2a0e2d /src/crypto/clientcert.c | |
| parent | [crypto] Allow client certificate to be changed without a rebuild (diff) | |
| download | ipxe-bd16deaa873b67eef9238635f57906f1340861c9.tar.gz ipxe-bd16deaa873b67eef9238635f57906f1340861c9.tar.xz ipxe-bd16deaa873b67eef9238635f57906f1340861c9.zip | |
[crypto] Do not allow build-time cryptography settings to be overridden
If a root certificate has been explicitly specified at build time
using TRUST=/path/to/cert then do not allow this to be overridden even
from a trustworthy settings source (such as VMware GuestInfo).
Similarly, if a client certificate (and private key) has been
explicitly specified at build time, then do not allow it to be
overridden at runtime.
Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/crypto/clientcert.c')
| -rw-r--r-- | src/crypto/clientcert.c | 99 |
1 files changed, 59 insertions, 40 deletions
diff --git a/src/crypto/clientcert.c b/src/crypto/clientcert.c index 692aafb46..159a3f4e5 100644 --- a/src/crypto/clientcert.c +++ b/src/crypto/clientcert.c @@ -47,6 +47,13 @@ FILE_LICENCE ( GPL2_OR_LATER ); #warning "Attempting to embed private key with no corresponding certificate" #endif +/* Allow client certificates to be overridden if not explicitly specified */ +#ifdef CERTIFICATE +#define ALLOW_CERT_OVERRIDE 0 +#else +#define ALLOW_CERT_OVERRIDE 1 +#endif + /* Raw client certificate data */ extern char client_certificate_data[]; extern char client_certificate_len[]; @@ -72,13 +79,19 @@ __asm__ ( ".section \".rodata\", \"a\", @progbits\n\t" ".previous\n\t" ); /** Client certificate */ -struct client_certificate client_certificate; +struct client_certificate client_certificate = { + .data = client_certificate_data, + .len = ( ( size_t ) client_certificate_len ), +}; /** Client private key */ -struct client_private_key client_private_key; +struct client_private_key client_private_key = { + .data = client_private_key_data, + .len = ( ( size_t ) client_private_key_len ), +}; /** Client certificate setting */ -struct setting cert_setting __setting ( SETTING_CRYPTO ) = { +static struct setting cert_setting __setting ( SETTING_CRYPTO ) = { .name = "cert", .description = "Client certificate", .tag = DHCP_EB_CERT, @@ -86,7 +99,7 @@ struct setting cert_setting __setting ( SETTING_CRYPTO ) = { }; /** Client private key setting */ -struct setting key_setting __setting ( SETTING_CRYPTO ) = { +static struct setting key_setting __setting ( SETTING_CRYPTO ) = { .name = "key", .description = "Client private key", .tag = DHCP_EB_KEY, @@ -99,45 +112,51 @@ struct setting key_setting __setting ( SETTING_CRYPTO ) = { * @ret rc Return status code */ static int clientcert_apply_settings ( void ) { - static void *cert; - static void *key; + static void *cert = NULL; + static void *key = NULL; int len; int rc; - /* Restore default client certificate */ - client_certificate.data = client_certificate_data; - client_certificate.len = ( ( size_t ) client_certificate_len ); - - /* Fetch new client certificate, if any */ - free ( cert ); - len = fetch_setting_copy ( NULL, &cert_setting, &cert ); - if ( len < 0 ) { - rc = len; - DBGC ( &client_certificate, "CLIENTCERT cannot fetch client " - "certificate: %s\n", strerror ( rc ) ); - return rc; - } - if ( cert ) { - client_certificate.data = cert; - client_certificate.len = len; - } - - /* Restore default client private key */ - client_private_key.data = client_private_key_data; - client_private_key.len = ( ( size_t ) client_private_key_len ); - - /* Fetch new client private key, if any */ - free ( key ); - len = fetch_setting_copy ( NULL, &key_setting, &key ); - if ( len < 0 ) { - rc = len; - DBGC ( &client_certificate, "CLIENTCERT cannot fetch client " - "private key: %s\n", strerror ( rc ) ); - return rc; - } - if ( key ) { - client_private_key.data = key; - client_private_key.len = len; + /* Allow client certificate to be overridden only if + * not explicitly specified at build time. + */ + if ( ALLOW_CERT_OVERRIDE ) { + + /* Restore default client certificate */ + client_certificate.data = client_certificate_data; + client_certificate.len = ( ( size_t ) client_certificate_len ); + + /* Fetch new client certificate, if any */ + free ( cert ); + len = fetch_setting_copy ( NULL, &cert_setting, &cert ); + if ( len < 0 ) { + rc = len; + DBGC ( &client_certificate, "CLIENTCERT cannot fetch " + "client certificate: %s\n", strerror ( rc ) ); + return rc; + } + if ( cert ) { + client_certificate.data = cert; + client_certificate.len = len; + } + + /* Restore default client private key */ + client_private_key.data = client_private_key_data; + client_private_key.len = ( ( size_t ) client_private_key_len ); + + /* Fetch new client private key, if any */ + free ( key ); + len = fetch_setting_copy ( NULL, &key_setting, &key ); + if ( len < 0 ) { + rc = len; + DBGC ( &client_certificate, "CLIENTCERT cannot fetch " + "client private key: %s\n", strerror ( rc ) ); + return rc; + } + if ( key ) { + client_private_key.data = key; + client_private_key.len = len; + } } /* Debug */ |
