summaryrefslogtreecommitdiff
path: root/src/feature
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2019-04-30 14:45:58 -0400
committerNick Mathewson <nickm@torproject.org>2019-04-30 14:45:58 -0400
commit0034f1095680e2b05c19ec13368ddc936a53058a (patch)
treee6859977e9ac95876925307f68d342f47d081b66 /src/feature
parent309467c64e007ea6841c07fdee35eaff0146d541 (diff)
downloadtor-0034f1095680e2b05c19ec13368ddc936a53058a.tar.gz
tor-0034f1095680e2b05c19ec13368ddc936a53058a.zip
Use safe_mem_is_zero in a few more places.
I don't believe any of these represent a real timing vulnerability (remote timing against memcmp() on a modern CPU is not easy), but these are the ones where I believe we should be more careful.
Diffstat (limited to 'src/feature')
-rw-r--r--src/feature/relay/routerkeys.c2
-rw-r--r--src/feature/rend/rendcache.c6
2 files changed, 5 insertions, 3 deletions
diff --git a/src/feature/relay/routerkeys.c b/src/feature/relay/routerkeys.c
index 5db7ed7268..a9190b2e13 100644
--- a/src/feature/relay/routerkeys.c
+++ b/src/feature/relay/routerkeys.c
@@ -226,7 +226,7 @@ load_ed_keys(const or_options_t *options, time_t now)
tor_free(fname);
}
}
- if (tor_mem_is_zero((char*)id->seckey.seckey, sizeof(id->seckey)))
+ if (safe_mem_is_zero((char*)id->seckey.seckey, sizeof(id->seckey)))
sign_signing_key_with_id = NULL;
else
sign_signing_key_with_id = id;
diff --git a/src/feature/rend/rendcache.c b/src/feature/rend/rendcache.c
index abeb150685..c3f86d8c82 100644
--- a/src/feature/rend/rendcache.c
+++ b/src/feature/rend/rendcache.c
@@ -19,6 +19,8 @@
#include "feature/rend/rend_intro_point_st.h"
#include "feature/rend/rend_service_descriptor_st.h"
+#include "lib/ctime/di_ops.h"
+
/** Map from service id (as generated by rend_get_service_id) to
* rend_cache_entry_t. */
STATIC strmap_t *rend_cache = NULL;
@@ -889,8 +891,8 @@ rend_cache_store_v2_desc_as_client(const char *desc,
if (intro_content && intro_size > 0) {
int n_intro_points;
if (rend_data->auth_type != REND_NO_AUTH &&
- !tor_mem_is_zero(rend_data->descriptor_cookie,
- sizeof(rend_data->descriptor_cookie))) {
+ !safe_mem_is_zero(rend_data->descriptor_cookie,
+ sizeof(rend_data->descriptor_cookie))) {
char *ipos_decrypted = NULL;
size_t ipos_decrypted_size;
if (rend_decrypt_introduction_points(&ipos_decrypted,