Annotation of src/usr.bin/ssh/sshbuf-misc.c, Revision 1.18
1.18 ! djm 1: /* $OpenBSD: sshbuf-misc.c,v 1.17 2021/08/11 05:21:32 djm Exp $ */
1.1 djm 2: /*
3: * Copyright (c) 2011 Damien Miller
4: *
5: * Permission to use, copy, modify, and distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: #include <sys/types.h>
19: #include <sys/socket.h>
20: #include <netinet/in.h>
21: #include <errno.h>
1.13 djm 22: #include <stdlib.h>
1.3 millert 23: #include <stdint.h>
1.1 djm 24: #include <stdio.h>
1.13 djm 25: #include <limits.h>
1.1 djm 26: #include <string.h>
1.13 djm 27: #include <resolv.h>
28: #include <ctype.h>
1.18 ! djm 29: #include <unistd.h>
1.1 djm 30:
31: #include "ssherr.h"
32: #define SSHBUF_INTERNAL
33: #include "sshbuf.h"
34:
35: void
1.2 djm 36: sshbuf_dump_data(const void *s, size_t len, FILE *f)
1.1 djm 37: {
1.2 djm 38: size_t i, j;
39: const u_char *p = (const u_char *)s;
1.1 djm 40:
41: for (i = 0; i < len; i += 16) {
1.4 markus 42: fprintf(f, "%.4zu: ", i);
1.1 djm 43: for (j = i; j < i + 16; j++) {
44: if (j < len)
45: fprintf(f, "%02x ", p[j]);
46: else
47: fprintf(f, " ");
48: }
49: fprintf(f, " ");
50: for (j = i; j < i + 16; j++) {
51: if (j < len) {
52: if (isascii(p[j]) && isprint(p[j]))
53: fprintf(f, "%c", p[j]);
54: else
55: fprintf(f, ".");
56: }
57: }
58: fprintf(f, "\n");
59: }
1.2 djm 60: }
61:
62: void
1.15 djm 63: sshbuf_dump(const struct sshbuf *buf, FILE *f)
1.2 djm 64: {
1.17 djm 65: fprintf(f, "buffer len = %zu\n", sshbuf_len(buf));
1.2 djm 66: sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f);
1.1 djm 67: }
68:
69: char *
70: sshbuf_dtob16(struct sshbuf *buf)
71: {
72: size_t i, j, len = sshbuf_len(buf);
73: const u_char *p = sshbuf_ptr(buf);
74: char *ret;
75: const char hex[] = "0123456789abcdef";
76:
77: if (len == 0)
78: return strdup("");
79: if (SIZE_MAX / 2 <= len || (ret = malloc(len * 2 + 1)) == NULL)
80: return NULL;
81: for (i = j = 0; i < len; i++) {
82: ret[j++] = hex[(p[i] >> 4) & 0xf];
83: ret[j++] = hex[p[i] & 0xf];
84: }
85: ret[j] = '\0';
86: return ret;
87: }
88:
1.9 djm 89: int
90: sshbuf_dtob64(const struct sshbuf *d, struct sshbuf *b64, int wrap)
91: {
92: size_t i, slen = 0;
93: char *s = NULL;
94: int r;
95:
96: if (d == NULL || b64 == NULL || sshbuf_len(d) >= SIZE_MAX / 2)
97: return SSH_ERR_INVALID_ARGUMENT;
98: if (sshbuf_len(d) == 0)
99: return 0;
100: slen = ((sshbuf_len(d) + 2) / 3) * 4 + 1;
101: if ((s = malloc(slen)) == NULL)
102: return SSH_ERR_ALLOC_FAIL;
103: if (b64_ntop(sshbuf_ptr(d), sshbuf_len(d), s, slen) == -1) {
104: r = SSH_ERR_INTERNAL_ERROR;
105: goto fail;
106: }
107: if (wrap) {
108: for (i = 0; s[i] != '\0'; i++) {
109: if ((r = sshbuf_put_u8(b64, s[i])) != 0)
110: goto fail;
111: if (i % 70 == 69 && (r = sshbuf_put_u8(b64, '\n')) != 0)
112: goto fail;
113: }
1.10 djm 114: if ((i - 1) % 70 != 69 && (r = sshbuf_put_u8(b64, '\n')) != 0)
1.9 djm 115: goto fail;
116: } else {
117: if ((r = sshbuf_put(b64, s, strlen(s))) != 0)
118: goto fail;
119: }
120: /* Success */
121: r = 0;
122: fail:
123: freezero(s, slen);
124: return r;
125: }
126:
1.1 djm 127: char *
1.9 djm 128: sshbuf_dtob64_string(const struct sshbuf *buf, int wrap)
1.1 djm 129: {
1.9 djm 130: struct sshbuf *tmp;
1.1 djm 131: char *ret;
132:
1.9 djm 133: if ((tmp = sshbuf_new()) == NULL)
1.1 djm 134: return NULL;
1.9 djm 135: if (sshbuf_dtob64(buf, tmp, wrap) != 0) {
136: sshbuf_free(tmp);
1.1 djm 137: return NULL;
138: }
1.9 djm 139: ret = sshbuf_dup_string(tmp);
140: sshbuf_free(tmp);
1.1 djm 141: return ret;
142: }
143:
144: int
145: sshbuf_b64tod(struct sshbuf *buf, const char *b64)
146: {
147: size_t plen = strlen(b64);
148: int nlen, r;
149: u_char *p;
150:
151: if (plen == 0)
152: return 0;
153: if ((p = malloc(plen)) == NULL)
154: return SSH_ERR_ALLOC_FAIL;
155: if ((nlen = b64_pton(b64, p, plen)) < 0) {
1.14 jsg 156: freezero(p, plen);
1.1 djm 157: return SSH_ERR_INVALID_FORMAT;
158: }
159: if ((r = sshbuf_put(buf, p, nlen)) < 0) {
1.14 jsg 160: freezero(p, plen);
1.1 djm 161: return r;
162: }
1.14 jsg 163: freezero(p, plen);
1.1 djm 164: return 0;
1.16 djm 165: }
166:
167: int
168: sshbuf_dtourlb64(const struct sshbuf *d, struct sshbuf *b64, int wrap)
169: {
170: int r = SSH_ERR_INTERNAL_ERROR;
171: u_char *p;
172: struct sshbuf *b = NULL;
173: size_t i, l;
174:
175: if ((b = sshbuf_new()) == NULL)
176: return SSH_ERR_ALLOC_FAIL;
177: /* Encode using regular base64; we'll transform it once done */
178: if ((r = sshbuf_dtob64(d, b, wrap)) != 0)
179: goto out;
180: /* remove padding from end of encoded string*/
181: for (;;) {
182: l = sshbuf_len(b);
183: if (l <= 1 || sshbuf_ptr(b) == NULL) {
184: r = SSH_ERR_INTERNAL_ERROR;
185: goto out;
186: }
187: if (sshbuf_ptr(b)[l - 1] != '=')
188: break;
189: if ((r = sshbuf_consume_end(b, 1)) != 0)
190: goto out;
191: }
192: /* Replace characters with rfc4648 equivalents */
193: l = sshbuf_len(b);
194: if ((p = sshbuf_mutable_ptr(b)) == NULL) {
195: r = SSH_ERR_INTERNAL_ERROR;
196: goto out;
197: }
198: for (i = 0; i < l; i++) {
199: if (p[i] == '+')
200: p[i] = '-';
201: else if (p[i] == '/')
202: p[i] = '_';
203: }
204: r = sshbuf_putb(b64, b);
205: out:
206: sshbuf_free(b);
207: return r;
1.6 djm 208: }
209:
210: char *
211: sshbuf_dup_string(struct sshbuf *buf)
212: {
213: const u_char *p = NULL, *s = sshbuf_ptr(buf);
214: size_t l = sshbuf_len(buf);
215: char *r;
216:
217: if (s == NULL || l > SIZE_MAX)
218: return NULL;
219: /* accept a nul only as the last character in the buffer */
220: if (l > 0 && (p = memchr(s, '\0', l)) != NULL) {
221: if (p != s + l - 1)
222: return NULL;
223: l--; /* the nul is put back below */
224: }
225: if ((r = malloc(l + 1)) == NULL)
226: return NULL;
227: if (l > 0)
228: memcpy(r, s, l);
229: r[l] = '\0';
230: return r;
1.1 djm 231: }
232:
1.8 djm 233: int
234: sshbuf_cmp(const struct sshbuf *b, size_t offset,
1.11 djm 235: const void *s, size_t len)
1.8 djm 236: {
237: if (sshbuf_ptr(b) == NULL)
238: return SSH_ERR_INTERNAL_ERROR;
239: if (offset > SSHBUF_SIZE_MAX || len > SSHBUF_SIZE_MAX || len == 0)
240: return SSH_ERR_INVALID_ARGUMENT;
241: if (offset + len > sshbuf_len(b))
242: return SSH_ERR_MESSAGE_INCOMPLETE;
243: if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0)
244: return SSH_ERR_INVALID_FORMAT;
245: return 0;
246: }
247:
248: int
249: sshbuf_find(const struct sshbuf *b, size_t start_offset,
1.11 djm 250: const void *s, size_t len, size_t *offsetp)
1.8 djm 251: {
252: void *p;
253:
254: if (offsetp != NULL)
255: *offsetp = 0;
256: if (sshbuf_ptr(b) == NULL)
257: return SSH_ERR_INTERNAL_ERROR;
258: if (start_offset > SSHBUF_SIZE_MAX || len > SSHBUF_SIZE_MAX || len == 0)
259: return SSH_ERR_INVALID_ARGUMENT;
260: if (start_offset > sshbuf_len(b) || start_offset + len > sshbuf_len(b))
261: return SSH_ERR_MESSAGE_INCOMPLETE;
262: if ((p = memmem(sshbuf_ptr(b) + start_offset,
263: sshbuf_len(b) - start_offset, s, len)) == NULL)
264: return SSH_ERR_INVALID_FORMAT;
265: if (offsetp != NULL)
266: *offsetp = (const u_char *)p - sshbuf_ptr(b);
1.18 ! djm 267: return 0;
! 268: }
! 269:
! 270: int
! 271: sshbuf_read(int fd, struct sshbuf *buf, size_t maxlen, size_t *rlen)
! 272: {
! 273: int r, oerrno;
! 274: size_t adjust;
! 275: ssize_t rr;
! 276: u_char *d;
! 277:
! 278: if (rlen != NULL)
! 279: *rlen = 0;
! 280: if ((r = sshbuf_reserve(buf, maxlen, &d)) != 0)
! 281: return r;
! 282: rr = read(fd, d, maxlen);
! 283: oerrno = errno;
! 284:
! 285: /* Adjust the buffer to include only what was actually read */
! 286: if ((adjust = maxlen - (rr > 0 ? rr : 0)) != 0) {
! 287: if ((r = sshbuf_consume_end(buf, adjust)) != 0) {
! 288: /* avoid returning uninitialised data to caller */
! 289: memset(d + rr, '\0', adjust);
! 290: return SSH_ERR_INTERNAL_ERROR; /* shouldn't happen */
! 291: }
! 292: }
! 293: if (rr < 0) {
! 294: errno = oerrno;
! 295: return SSH_ERR_SYSTEM_ERROR;
! 296: } else if (rr == 0) {
! 297: errno = EPIPE;
! 298: return SSH_ERR_SYSTEM_ERROR;
! 299: }
! 300: /* success */
! 301: if (rlen != NULL)
! 302: *rlen = (size_t)rr;
1.8 djm 303: return 0;
304: }