On 10/05/2019 14:11, Arne Schwabe wrote: > From: Arne Schwabe <a...@openvpn.net> > > This is useful for features that can use enither a persistent > or an ephemeral key. > > Patch V2: Move the functionality of generating a random key into a > separate function that acts as wrapper for pem_read_key_file > --- > src/openvpn/crypto.c | 22 ++++++++++++++++++++++ > src/openvpn/crypto.h | 15 +++++++++++++++ > 2 files changed, 37 insertions(+) > > diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c > index eb56421b..0e17c351 100644 > --- a/src/openvpn/crypto.c > +++ b/src/openvpn/crypto.c > @@ -1892,6 +1892,28 @@ cleanup: > return; > } > > +bool > +load_pem_file_or_ephemeral_key(struct buffer *key, const char *pem_name, > + const char *key_file, const char *key_inline) > +{ > + if (key_file == NULL)
I don't like this approach. Why can't we have generate_ephemeral_key() basically doing the keyfile == NULL part below and put the "which key to use" logic in the only caller I could see in auth_token_init_secret() [added in a later patch] ? This makes the code clearer: ----------------------------------------------------------------- void auth_token_init_secret(struct key_ctx *key_ctx, const char *key_file, const char *key_inline) { /* .... */ bool key_loaded = false; if (key_file) { key_loaded = read_pem_key(...); } else { key_loaded = generate_ephemeral_key(...); } if (!key_loaded) { msg(M_FATAL, ....); } /* .... */ ----------------------------------------------------------------- You could also make it more compact, but not sure it's worth it here, as these functions requires a few longer argument lists: bool key_loaded = (key_file ? read_pem_key(...) : generate_ephemeral_key(...)); The point is: This makes read_pem_key() and generate_ephemeral_key() do only one simple and predictable task. The load_pem_file_or_ephemeral_key() does one of two things, depending on the argument. And since I only see we have only a single caller to the load_pem_file_or_ephemeral_key(), there's nothing to save on code reuse by wrapping it up like this. > + { > + msg(M_INFO, "Using random %s.", pem_name); > + uint8_t rand[BCAP(key)]; > + if (!rand_bytes(rand, BCAP(key))) > + { > + msg(M_WARN, "ERROR: could not generate random key"); > + return false; > + } > + buf_write(key, rand, BCAP(key)); > + return true; > + } > + else > + { > + return read_pem_key_file(key, pem_name, key_file, key_inline); > + } > +} > + -- kind regards, David Sommerseth OpenVPN Inc _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel