GCC Code Coverage Report | |||||||||||||||||||||
|
|||||||||||||||||||||
Line | Branch | Exec | Source |
1 |
/* $OpenBSD: sshbuf.c,v 1.11 2017/06/01 06:58:25 djm Exp $ */ |
||
2 |
/* |
||
3 |
* Copyright (c) 2011 Damien Miller |
||
4 |
* |
||
5 |
* Permission to use, copy, modify, and distribute this software for any |
||
6 |
* purpose with or without fee is hereby granted, provided that the above |
||
7 |
* copyright notice and this permission notice appear in all copies. |
||
8 |
* |
||
9 |
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
||
10 |
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
||
11 |
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
||
12 |
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
||
13 |
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
||
14 |
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
||
15 |
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
||
16 |
*/ |
||
17 |
|||
18 |
#include <sys/types.h> |
||
19 |
#include <signal.h> |
||
20 |
#include <stdlib.h> |
||
21 |
#include <stdio.h> |
||
22 |
#include <string.h> |
||
23 |
|||
24 |
#include "ssherr.h" |
||
25 |
#define SSHBUF_INTERNAL |
||
26 |
#include "sshbuf.h" |
||
27 |
#include "misc.h" |
||
28 |
|||
29 |
static inline int |
||
30 |
sshbuf_check_sanity(const struct sshbuf *buf) |
||
31 |
{ |
||
32 |
SSHBUF_TELL("sanity"); |
||
33 |
✓✗✓✓ ✓✗✓✗ ✓✗✓✗ ✓✓✓✗ ✓✗✓✗ ✓✗✓✗ ✗✓ |
28437254 |
if (__predict_false(buf == NULL || |
34 |
(!buf->readonly && buf->d != buf->cd) || |
||
35 |
buf->refcount < 1 || buf->refcount > SSHBUF_REFS_MAX || |
||
36 |
buf->cd == NULL || |
||
37 |
(buf->dont_free && (buf->readonly || buf->parent != NULL)) || |
||
38 |
buf->max_size > SSHBUF_SIZE_MAX || |
||
39 |
buf->alloc > buf->max_size || |
||
40 |
buf->size > buf->alloc || |
||
41 |
buf->off > buf->size)) { |
||
42 |
/* Do not try to recover from corrupted buffer internals */ |
||
43 |
SSHBUF_DBG(("SSH_ERR_INTERNAL_ERROR")); |
||
44 |
signal(SIGSEGV, SIG_DFL); |
||
45 |
raise(SIGSEGV); |
||
46 |
return SSH_ERR_INTERNAL_ERROR; |
||
47 |
} |
||
48 |
2187704 |
return 0; |
|
49 |
2187704 |
} |
|
50 |
|||
51 |
static void |
||
52 |
sshbuf_maybe_pack(struct sshbuf *buf, int force) |
||
53 |
{ |
||
54 |
SSHBUF_DBG(("force %d", force)); |
||
55 |
SSHBUF_TELL("pre-pack"); |
||
56 |
✓✓✓✗ ✓✗ |
611154 |
if (buf->off == 0 || buf->readonly || buf->refcount > 1) |
57 |
return; |
||
58 |
✓✗✓✓ |
1252 |
if (force || |
59 |
✓✗ | 1252 |
(buf->off >= SSHBUF_PACK_MIN && buf->off >= buf->size / 2)) { |
60 |
218 |
memmove(buf->d, buf->d + buf->off, buf->size - buf->off); |
|
61 |
218 |
buf->size -= buf->off; |
|
62 |
218 |
buf->off = 0; |
|
63 |
SSHBUF_TELL("packed"); |
||
64 |
218 |
} |
|
65 |
304951 |
} |
|
66 |
|||
67 |
struct sshbuf * |
||
68 |
sshbuf_new(void) |
||
69 |
{ |
||
70 |
struct sshbuf *ret; |
||
71 |
|||
72 |
✗✓ | 1078 |
if ((ret = calloc(sizeof(*ret), 1)) == NULL) |
73 |
return NULL; |
||
74 |
539 |
ret->alloc = SSHBUF_SIZE_INIT; |
|
75 |
539 |
ret->max_size = SSHBUF_SIZE_MAX; |
|
76 |
539 |
ret->readonly = 0; |
|
77 |
539 |
ret->refcount = 1; |
|
78 |
539 |
ret->parent = NULL; |
|
79 |
✗✓ | 539 |
if ((ret->cd = ret->d = calloc(1, ret->alloc)) == NULL) { |
80 |
free(ret); |
||
81 |
return NULL; |
||
82 |
} |
||
83 |
539 |
return ret; |
|
84 |
539 |
} |
|
85 |
|||
86 |
struct sshbuf * |
||
87 |
sshbuf_from(const void *blob, size_t len) |
||
88 |
{ |
||
89 |
struct sshbuf *ret; |
||
90 |
|||
91 |
✓✗✗✓ |
621 |
if (blob == NULL || len > SSHBUF_SIZE_MAX || |
92 |
207 |
(ret = calloc(sizeof(*ret), 1)) == NULL) |
|
93 |
return NULL; |
||
94 |
207 |
ret->alloc = ret->size = ret->max_size = len; |
|
95 |
207 |
ret->readonly = 1; |
|
96 |
207 |
ret->refcount = 1; |
|
97 |
207 |
ret->parent = NULL; |
|
98 |
207 |
ret->cd = blob; |
|
99 |
207 |
ret->d = NULL; |
|
100 |
207 |
return ret; |
|
101 |
207 |
} |
|
102 |
|||
103 |
int |
||
104 |
sshbuf_set_parent(struct sshbuf *child, struct sshbuf *parent) |
||
105 |
{ |
||
106 |
int r; |
||
107 |
|||
108 |
✓✗✗✓ |
297 |
if ((r = sshbuf_check_sanity(child)) != 0 || |
109 |
99 |
(r = sshbuf_check_sanity(parent)) != 0) |
|
110 |
return r; |
||
111 |
99 |
child->parent = parent; |
|
112 |
99 |
child->parent->refcount++; |
|
113 |
99 |
return 0; |
|
114 |
99 |
} |
|
115 |
|||
116 |
struct sshbuf * |
||
117 |
sshbuf_fromb(struct sshbuf *buf) |
||
118 |
{ |
||
119 |
struct sshbuf *ret; |
||
120 |
|||
121 |
✗✓ | 154 |
if (sshbuf_check_sanity(buf) != 0) |
122 |
return NULL; |
||
123 |
✗✓ | 77 |
if ((ret = sshbuf_from(sshbuf_ptr(buf), sshbuf_len(buf))) == NULL) |
124 |
return NULL; |
||
125 |
✗✓ | 77 |
if (sshbuf_set_parent(ret, buf) != 0) { |
126 |
sshbuf_free(ret); |
||
127 |
return NULL; |
||
128 |
} |
||
129 |
77 |
return ret; |
|
130 |
77 |
} |
|
131 |
|||
132 |
void |
||
133 |
sshbuf_init(struct sshbuf *ret) |
||
134 |
{ |
||
135 |
48 |
explicit_bzero(ret, sizeof(*ret)); |
|
136 |
24 |
ret->alloc = SSHBUF_SIZE_INIT; |
|
137 |
24 |
ret->max_size = SSHBUF_SIZE_MAX; |
|
138 |
24 |
ret->readonly = 0; |
|
139 |
24 |
ret->dont_free = 1; |
|
140 |
24 |
ret->refcount = 1; |
|
141 |
✗✓ | 24 |
if ((ret->cd = ret->d = calloc(1, ret->alloc)) == NULL) |
142 |
ret->alloc = 0; |
||
143 |
24 |
} |
|
144 |
|||
145 |
void |
||
146 |
sshbuf_free(struct sshbuf *buf) |
||
147 |
{ |
||
148 |
int dont_free = 0; |
||
149 |
|||
150 |
✓✓ | 3240 |
if (buf == NULL) |
151 |
775 |
return; |
|
152 |
/* |
||
153 |
* The following will leak on insane buffers, but this is the safest |
||
154 |
* course of action - an invalid pointer or already-freed pointer may |
||
155 |
* have been passed to us and continuing to scribble over memory would |
||
156 |
* be bad. |
||
157 |
*/ |
||
158 |
✗✓ | 845 |
if (sshbuf_check_sanity(buf) != 0) |
159 |
return; |
||
160 |
/* |
||
161 |
* If we are a child, the free our parent to decrement its reference |
||
162 |
* count and possibly free it. |
||
163 |
*/ |
||
164 |
845 |
sshbuf_free(buf->parent); |
|
165 |
845 |
buf->parent = NULL; |
|
166 |
/* |
||
167 |
* If we are a parent with still-extant children, then don't free just |
||
168 |
* yet. The last child's call to sshbuf_free should decrement our |
||
169 |
* refcount to 0 and trigger the actual free. |
||
170 |
*/ |
||
171 |
845 |
buf->refcount--; |
|
172 |
✓✓ | 845 |
if (buf->refcount > 0) |
173 |
99 |
return; |
|
174 |
746 |
dont_free = buf->dont_free; |
|
175 |
✓✓ | 746 |
if (!buf->readonly) { |
176 |
539 |
explicit_bzero(buf->d, buf->alloc); |
|
177 |
539 |
free(buf->d); |
|
178 |
539 |
} |
|
179 |
746 |
explicit_bzero(buf, sizeof(*buf)); |
|
180 |
✓✓ | 746 |
if (!dont_free) |
181 |
744 |
free(buf); |
|
182 |
2366 |
} |
|
183 |
|||
184 |
void |
||
185 |
sshbuf_reset(struct sshbuf *buf) |
||
186 |
{ |
||
187 |
u_char *d; |
||
188 |
|||
189 |
✓✗✗✓ |
300465 |
if (buf->readonly || buf->refcount > 1) { |
190 |
/* Nonsensical. Just make buffer appear empty */ |
||
191 |
buf->off = buf->size; |
||
192 |
return; |
||
193 |
} |
||
194 |
100155 |
(void) sshbuf_check_sanity(buf); |
|
195 |
100155 |
buf->off = buf->size = 0; |
|
196 |
✓✓ | 100155 |
if (buf->alloc != SSHBUF_SIZE_INIT) { |
197 |
✓✗ | 75014 |
if ((d = recallocarray(buf->d, buf->alloc, SSHBUF_SIZE_INIT, |
198 |
37507 |
1)) != NULL) { |
|
199 |
37507 |
buf->cd = buf->d = d; |
|
200 |
37507 |
buf->alloc = SSHBUF_SIZE_INIT; |
|
201 |
37507 |
} |
|
202 |
} |
||
203 |
100155 |
explicit_bzero(buf->d, SSHBUF_SIZE_INIT); |
|
204 |
200310 |
} |
|
205 |
|||
206 |
size_t |
||
207 |
sshbuf_max_size(const struct sshbuf *buf) |
||
208 |
{ |
||
209 |
return buf->max_size; |
||
210 |
} |
||
211 |
|||
212 |
size_t |
||
213 |
sshbuf_alloc(const struct sshbuf *buf) |
||
214 |
{ |
||
215 |
return buf->alloc; |
||
216 |
} |
||
217 |
|||
218 |
const struct sshbuf * |
||
219 |
sshbuf_parent(const struct sshbuf *buf) |
||
220 |
{ |
||
221 |
return buf->parent; |
||
222 |
} |
||
223 |
|||
224 |
u_int |
||
225 |
sshbuf_refcount(const struct sshbuf *buf) |
||
226 |
{ |
||
227 |
return buf->refcount; |
||
228 |
} |
||
229 |
|||
230 |
int |
||
231 |
sshbuf_set_max_size(struct sshbuf *buf, size_t max_size) |
||
232 |
{ |
||
233 |
size_t rlen; |
||
234 |
u_char *dp; |
||
235 |
int r; |
||
236 |
|||
237 |
SSHBUF_DBG(("set max buf = %p len = %zu", buf, max_size)); |
||
238 |
if ((r = sshbuf_check_sanity(buf)) != 0) |
||
239 |
return r; |
||
240 |
if (max_size == buf->max_size) |
||
241 |
return 0; |
||
242 |
if (buf->readonly || buf->refcount > 1) |
||
243 |
return SSH_ERR_BUFFER_READ_ONLY; |
||
244 |
if (max_size > SSHBUF_SIZE_MAX) |
||
245 |
return SSH_ERR_NO_BUFFER_SPACE; |
||
246 |
/* pack and realloc if necessary */ |
||
247 |
sshbuf_maybe_pack(buf, max_size < buf->size); |
||
248 |
if (max_size < buf->alloc && max_size > buf->size) { |
||
249 |
if (buf->size < SSHBUF_SIZE_INIT) |
||
250 |
rlen = SSHBUF_SIZE_INIT; |
||
251 |
else |
||
252 |
rlen = ROUNDUP(buf->size, SSHBUF_SIZE_INC); |
||
253 |
if (rlen > max_size) |
||
254 |
rlen = max_size; |
||
255 |
SSHBUF_DBG(("new alloc = %zu", rlen)); |
||
256 |
if ((dp = recallocarray(buf->d, buf->alloc, rlen, 1)) == NULL) |
||
257 |
return SSH_ERR_ALLOC_FAIL; |
||
258 |
buf->cd = buf->d = dp; |
||
259 |
buf->alloc = rlen; |
||
260 |
} |
||
261 |
SSHBUF_TELL("new-max"); |
||
262 |
if (max_size < buf->alloc) |
||
263 |
return SSH_ERR_NO_BUFFER_SPACE; |
||
264 |
buf->max_size = max_size; |
||
265 |
return 0; |
||
266 |
} |
||
267 |
|||
268 |
size_t |
||
269 |
sshbuf_len(const struct sshbuf *buf) |
||
270 |
{ |
||
271 |
✗✓ | 2113964 |
if (sshbuf_check_sanity(buf) != 0) |
272 |
return 0; |
||
273 |
1056982 |
return buf->size - buf->off; |
|
274 |
1056982 |
} |
|
275 |
|||
276 |
size_t |
||
277 |
sshbuf_avail(const struct sshbuf *buf) |
||
278 |
{ |
||
279 |
if (sshbuf_check_sanity(buf) != 0 || buf->readonly || buf->refcount > 1) |
||
280 |
return 0; |
||
281 |
return buf->max_size - (buf->size - buf->off); |
||
282 |
} |
||
283 |
|||
284 |
const u_char * |
||
285 |
sshbuf_ptr(const struct sshbuf *buf) |
||
286 |
{ |
||
287 |
✗✓ | 753672 |
if (sshbuf_check_sanity(buf) != 0) |
288 |
return NULL; |
||
289 |
376836 |
return buf->cd + buf->off; |
|
290 |
376836 |
} |
|
291 |
|||
292 |
u_char * |
||
293 |
sshbuf_mutable_ptr(const struct sshbuf *buf) |
||
294 |
{ |
||
295 |
✓✗✓✗ ✗✓ |
208600 |
if (sshbuf_check_sanity(buf) != 0 || buf->readonly || buf->refcount > 1) |
296 |
return NULL; |
||
297 |
52150 |
return buf->d + buf->off; |
|
298 |
52150 |
} |
|
299 |
|||
300 |
int |
||
301 |
sshbuf_check_reserve(const struct sshbuf *buf, size_t len) |
||
302 |
{ |
||
303 |
int r; |
||
304 |
|||
305 |
✗✓ | 832532 |
if ((r = sshbuf_check_sanity(buf)) != 0) |
306 |
return r; |
||
307 |
✓✗✗✓ |
832532 |
if (buf->readonly || buf->refcount > 1) |
308 |
return SSH_ERR_BUFFER_READ_ONLY; |
||
309 |
SSHBUF_TELL("check"); |
||
310 |
/* Check that len is reasonable and that max_size + available < len */ |
||
311 |
✓✗✗✓ |
832532 |
if (len > buf->max_size || buf->max_size - len < buf->size - buf->off) |
312 |
return SSH_ERR_NO_BUFFER_SPACE; |
||
313 |
416266 |
return 0; |
|
314 |
416266 |
} |
|
315 |
|||
316 |
int |
||
317 |
sshbuf_allocate(struct sshbuf *buf, size_t len) |
||
318 |
{ |
||
319 |
size_t rlen, need; |
||
320 |
u_char *dp; |
||
321 |
int r; |
||
322 |
|||
323 |
SSHBUF_DBG(("allocate buf = %p len = %zu", buf, len)); |
||
324 |
✗✓ | 609902 |
if ((r = sshbuf_check_reserve(buf, len)) != 0) |
325 |
return r; |
||
326 |
/* |
||
327 |
* If the requested allocation appended would push us past max_size |
||
328 |
* then pack the buffer, zeroing buf->off. |
||
329 |
*/ |
||
330 |
304951 |
sshbuf_maybe_pack(buf, buf->size + len > buf->max_size); |
|
331 |
SSHBUF_TELL("allocate"); |
||
332 |
✓✓ | 304951 |
if (len + buf->size <= buf->alloc) |
333 |
267027 |
return 0; /* already have it. */ |
|
334 |
|||
335 |
/* |
||
336 |
* Prefer to alloc in SSHBUF_SIZE_INC units, but |
||
337 |
* allocate less if doing so would overflow max_size. |
||
338 |
*/ |
||
339 |
37924 |
need = len + buf->size - buf->alloc; |
|
340 |
37924 |
rlen = ROUNDUP(buf->alloc + need, SSHBUF_SIZE_INC); |
|
341 |
SSHBUF_DBG(("need %zu initial rlen %zu", need, rlen)); |
||
342 |
✗✓ | 37924 |
if (rlen > buf->max_size) |
343 |
rlen = buf->alloc + need; |
||
344 |
SSHBUF_DBG(("adjusted rlen %zu", rlen)); |
||
345 |
✗✓ | 37924 |
if ((dp = recallocarray(buf->d, buf->alloc, rlen, 1)) == NULL) { |
346 |
SSHBUF_DBG(("realloc fail")); |
||
347 |
return SSH_ERR_ALLOC_FAIL; |
||
348 |
} |
||
349 |
37924 |
buf->alloc = rlen; |
|
350 |
37924 |
buf->cd = buf->d = dp; |
|
351 |
✗✓ | 37924 |
if ((r = sshbuf_check_reserve(buf, len)) < 0) { |
352 |
/* shouldn't fail */ |
||
353 |
return r; |
||
354 |
} |
||
355 |
SSHBUF_TELL("done"); |
||
356 |
37924 |
return 0; |
|
357 |
304951 |
} |
|
358 |
|||
359 |
int |
||
360 |
sshbuf_reserve(struct sshbuf *buf, size_t len, u_char **dpp) |
||
361 |
{ |
||
362 |
u_char *dp; |
||
363 |
int r; |
||
364 |
|||
365 |
✓✗ | 609902 |
if (dpp != NULL) |
366 |
304951 |
*dpp = NULL; |
|
367 |
|||
368 |
SSHBUF_DBG(("reserve buf = %p len = %zu", buf, len)); |
||
369 |
✗✓ | 304951 |
if ((r = sshbuf_allocate(buf, len)) != 0) |
370 |
return r; |
||
371 |
|||
372 |
304951 |
dp = buf->d + buf->size; |
|
373 |
304951 |
buf->size += len; |
|
374 |
✓✗ | 304951 |
if (dpp != NULL) |
375 |
304951 |
*dpp = dp; |
|
376 |
304951 |
return 0; |
|
377 |
304951 |
} |
|
378 |
|||
379 |
int |
||
380 |
sshbuf_consume(struct sshbuf *buf, size_t len) |
||
381 |
{ |
||
382 |
int r; |
||
383 |
|||
384 |
SSHBUF_DBG(("len = %zu", len)); |
||
385 |
✗✓ | 338686 |
if ((r = sshbuf_check_sanity(buf)) != 0) |
386 |
return r; |
||
387 |
✗✓ | 169343 |
if (len == 0) |
388 |
return 0; |
||
389 |
✗✓ | 169343 |
if (len > sshbuf_len(buf)) |
390 |
return SSH_ERR_MESSAGE_INCOMPLETE; |
||
391 |
169343 |
buf->off += len; |
|
392 |
/* deal with empty buffer */ |
||
393 |
✓✓ | 169343 |
if (buf->off == buf->size) |
394 |
122677 |
buf->off = buf->size = 0; |
|
395 |
SSHBUF_TELL("done"); |
||
396 |
169343 |
return 0; |
|
397 |
169343 |
} |
|
398 |
|||
399 |
int |
||
400 |
sshbuf_consume_end(struct sshbuf *buf, size_t len) |
||
401 |
{ |
||
402 |
int r; |
||
403 |
|||
404 |
SSHBUF_DBG(("len = %zu", len)); |
||
405 |
✗✓ | 29704 |
if ((r = sshbuf_check_sanity(buf)) != 0) |
406 |
return r; |
||
407 |
✗✓ | 14852 |
if (len == 0) |
408 |
return 0; |
||
409 |
✗✓ | 14852 |
if (len > sshbuf_len(buf)) |
410 |
return SSH_ERR_MESSAGE_INCOMPLETE; |
||
411 |
14852 |
buf->size -= len; |
|
412 |
SSHBUF_TELL("done"); |
||
413 |
14852 |
return 0; |
|
414 |
14852 |
} |
|
415 |
Generated by: GCOVR (Version 3.3) |