| commit | b937830fe5a7adba40e63f6059bf2c543733de33 | [log] [tgz] |
|---|---|---|
| author | Vernon Mauery <vernon.mauery@linux.intel.com> | Wed Jun 16 14:06:57 2021 -0700 |
| committer | Vernon Mauery <vernon.mauery@linux.intel.com> | Wed Jun 16 14:07:43 2021 -0700 |
| tree | 7a3e3ca96d670ba7a2a79eace93c2c6f1e4a1efa | |
| parent | 83f012978df9abba623153b41457afcd4d86e568 [diff] |
Free cert usage before return
The ASN1 free will slowly leak memory for incorrect mutual auth
connections because if the certificate does not match the requirements
the function will return without freeing the usage string.
Tested: curl --cert client-cert.pem --key client-key.pem --cacert \
CA-cert.pem https://${bmc}/redfish/v1/SessionService/Sessions
Change-Id: I4c335d3cd151187c7a10e7e668d1556c11389039
Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
This component attempts to be a "do everything" embedded webserver for openbmc.
At this time, the webserver implements a few interfaces:
BMCWeb is configured by setting -D flags that correspond to options in bmcweb/meson_options.txt and then compiling. For example, meson <builddir> -Dkvm=disabled ... followed by ninja in build directory. The option names become C++ preprocessor symbols that control which code is compiled into the program.
meson builddir ninja -C builddir
meson builddir -Dbuildtype=minsize -Db_lto=true -Dtests=disabled ninja -C buildir
If any of the dependencies are not found on the host system during configuration, meson automatically gets them via its wrap dependencies mentioned in bmcweb/subprojects.
meson builddir -Dwrap_mode=nofallback ninja -C builddir
meson builddir -Dbuildtype=debug ninja -C builddir
meson builddir -Db_coverage=true -Dtests=enabled ninja coverage -C builddir test
When BMCWeb starts running, it reads persistent configuration data (such as UUID and session data) from a local file. If this is not usable, it generates a new configuration.
When BMCWeb SSL support is enabled and a usable certificate is not found, it will generate a self-sign a certificate before launching the server. The keys are generated by the secp384r1 algorithm. The certificate
C=US, O=OpenBMC, CN=testhost,SHA-256 algorithm.