Blame SOURCES/0004-dhparams-don-t-fail-if-default-file-can-t-be-created.patch

813ad5
From 282f819bc39c9557ee34f73c6f6623182f680792 Mon Sep 17 00:00:00 2001
813ad5
From: Stephen Gallagher <sgallagh@redhat.com>
813ad5
Date: Wed, 16 Nov 2022 15:27:58 -0500
813ad5
Subject: [PATCH] dhparams: don't fail if default file can't be created
813ad5
813ad5
Resolves: rhbz#2143206
813ad5
813ad5
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
813ad5
---
813ad5
 src/arguments.c |  1 -
813ad5
 src/io_utils.c  | 12 +++++++++++
813ad5
 src/sscg.c      | 55 +++++++++++++++++++++++++++++++++----------------
813ad5
 3 files changed, 49 insertions(+), 19 deletions(-)
813ad5
813ad5
diff --git a/src/arguments.c b/src/arguments.c
813ad5
index 7b9da14a732875b0f33a12e22a97d51a78216839..770d834aacc05d6d92cc0c855852eadb88f8c9bc 100644
813ad5
--- a/src/arguments.c
813ad5
+++ b/src/arguments.c
813ad5
@@ -69,7 +69,6 @@ set_default_options (struct sscg_options *opts)
813ad5
 
813ad5
   opts->lifetime = 398;
813ad5
 
813ad5
-  opts->dhparams_file = talloc_strdup (opts, "dhparams.pem");
813ad5
   opts->dhparams_group = talloc_strdup (opts, "ffdhe4096");
813ad5
   opts->dhparams_generator = 2;
813ad5
 
813ad5
diff --git a/src/io_utils.c b/src/io_utils.c
813ad5
index 1b8bc41c3849acbe4657ae14dfe55e3010957129..5d34327bdbe450add5326ac20c337c9399b471dc 100644
813ad5
--- a/src/io_utils.c
813ad5
+++ b/src/io_utils.c
813ad5
@@ -544,6 +544,18 @@ sscg_io_utils_open_output_files (struct sscg_stream **streams, bool overwrite)
813ad5
     {
813ad5
       SSCG_LOG (SSCG_DEBUG, "Opening %s\n", stream->path);
813ad5
       stream->bio = BIO_new_file (stream->path, create_mode);
813ad5
+      if (!stream->bio)
813ad5
+        {
813ad5
+          fprintf (stderr,
813ad5
+                   "Could not write to %s. Check directory permissions.\n",
813ad5
+                   stream->path);
813ad5
+
813ad5
+          /* The dhparams file is special, it will be handled later */
813ad5
+          if (i != SSCG_FILE_TYPE_DHPARAMS)
813ad5
+            {
813ad5
+              continue;
813ad5
+            }
813ad5
+        }
813ad5
       CHECK_BIO (stream->bio, stream->path);
813ad5
     }
813ad5
 
813ad5
diff --git a/src/sscg.c b/src/sscg.c
813ad5
index 1bf8019c2dda136abe56acd101dfe8ad0b3d725d..dcff4cd2b8dfd2e11c8612d36ecc94b175e9dc26 100644
813ad5
--- a/src/sscg.c
813ad5
+++ b/src/sscg.c
813ad5
@@ -93,6 +93,7 @@ main (int argc, const char **argv)
813ad5
   int ret, sret;
813ad5
   struct sscg_options *options;
813ad5
   bool build_client_cert = false;
813ad5
+  char *dhparams_file = NULL;
813ad5
 
813ad5
   struct sscg_x509_cert *cacert;
813ad5
   struct sscg_evp_pkey *cakey;
813ad5
@@ -182,9 +183,19 @@ main (int argc, const char **argv)
813ad5
                                        options->crl_mode);
813ad5
   CHECK_OK (ret);
813ad5
 
813ad5
+  if (options->dhparams_file)
813ad5
+    {
813ad5
+      dhparams_file = talloc_strdup (main_ctx, options->dhparams_file);
813ad5
+    }
813ad5
+  else
813ad5
+    {
813ad5
+      dhparams_file = talloc_strdup (main_ctx, "./dhparams.pem");
813ad5
+    }
813ad5
+  CHECK_MEM (dhparams_file);
813ad5
+
813ad5
   ret = sscg_io_utils_add_output_file (options->streams,
813ad5
                                        SSCG_FILE_TYPE_DHPARAMS,
813ad5
-                                       options->dhparams_file,
813ad5
+                                       dhparams_file,
813ad5
                                        options->dhparams_mode);
813ad5
   CHECK_OK (ret);
813ad5
 
813ad5
@@ -281,28 +292,36 @@ main (int argc, const char **argv)
813ad5
 
813ad5
 
813ad5
   /* Create DH parameters file */
813ad5
-  bp = GET_BIO (SSCG_FILE_TYPE_DHPARAMS);
813ad5
-  if (options->dhparams_prime_len > 0)
813ad5
+  if ((bp = GET_BIO (SSCG_FILE_TYPE_DHPARAMS)))
813ad5
     {
813ad5
-      ret = create_dhparams (options->verbosity,
813ad5
-                             options->dhparams_prime_len,
813ad5
-                             options->dhparams_generator,
813ad5
-                             &dhparams);
813ad5
-      CHECK_OK (ret);
813ad5
+      if (options->dhparams_prime_len > 0)
813ad5
+        {
813ad5
+          ret = create_dhparams (options->verbosity,
813ad5
+                                 options->dhparams_prime_len,
813ad5
+                                 options->dhparams_generator,
813ad5
+                                 &dhparams);
813ad5
+          CHECK_OK (ret);
813ad5
+        }
813ad5
+      else
813ad5
+        {
813ad5
+          ret = get_params_by_named_group (options->dhparams_group, &dhparams);
813ad5
+          CHECK_OK (ret);
813ad5
+        }
813ad5
+
813ad5
+      /* Export the DH parameters to the file */
813ad5
+      sret = PEM_write_bio_Parameters (bp, dhparams);
813ad5
+      CHECK_SSL (sret, PEM_write_bio_Parameters ());
813ad5
+      ANNOUNCE_WRITE (SSCG_FILE_TYPE_DHPARAMS);
813ad5
+      EVP_PKEY_free (dhparams);
813ad5
     }
813ad5
-  else
813ad5
+  else if (options->dhparams_file)
813ad5
     {
813ad5
-      ret = get_params_by_named_group (options->dhparams_group, &dhparams);
813ad5
-      CHECK_OK (ret);
813ad5
+      /* A filename was explicitly passed, but it couldn't be created */
813ad5
+      ret = EPERM;
813ad5
+      fprintf (stderr, "Could not write to %s: ", options->dhparams_file);
813ad5
+      goto done;
813ad5
     }
813ad5
 
813ad5
-  /* Export the DH parameters to the file */
813ad5
-  sret = PEM_write_bio_Parameters (bp, dhparams);
813ad5
-  CHECK_SSL (sret, PEM_write_bio_Parameters ());
813ad5
-  ANNOUNCE_WRITE (SSCG_FILE_TYPE_DHPARAMS);
813ad5
-  EVP_PKEY_free (dhparams);
813ad5
-
813ad5
-
813ad5
   /* Set the final file permissions */
813ad5
   sscg_io_utils_finalize_output_files (options->streams);
813ad5
 
813ad5
-- 
813ad5
2.38.1
813ad5