2014-05-15 06:33:43 +02:00
|
|
|
/* $OpenBSD: buffer.c,v 1.36 2014/04/30 05:29:56 djm Exp $ */
|
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
/*
|
2014-05-15 06:33:43 +02:00
|
|
|
* Copyright (c) 2012 Damien Miller <djm@mindrot.org>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
2000-04-16 03:18:38 +02:00
|
|
|
*
|
2014-05-15 06:33:43 +02:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
1999-11-24 14:26:21 +01:00
|
|
|
*/
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2014-05-15 06:33:43 +02:00
|
|
|
/* Emulation wrappers for legacy OpenSSH buffer API atop sshbuf */
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2014-06-11 05:39:24 +02:00
|
|
|
#include "includes.h"
|
|
|
|
|
2014-05-15 06:33:43 +02:00
|
|
|
#include <sys/types.h>
|
2006-08-05 03:02:17 +02:00
|
|
|
|
1999-10-27 05:42:43 +02:00
|
|
|
#include "buffer.h"
|
2001-01-22 06:34:40 +01:00
|
|
|
#include "log.h"
|
2014-05-15 06:33:43 +02:00
|
|
|
#include "ssherr.h"
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2000-04-16 03:18:38 +02:00
|
|
|
void
|
2001-12-21 04:56:54 +01:00
|
|
|
buffer_append(Buffer *buffer, const void *data, u_int len)
|
1999-10-27 05:42:43 +02:00
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret;
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2014-05-15 06:33:43 +02:00
|
|
|
if ((ret = sshbuf_put(buffer, data, len)) != 0)
|
|
|
|
fatal("%s: %s", __func__, ssh_err(ret));
|
2006-04-23 04:06:03 +02:00
|
|
|
}
|
|
|
|
|
2001-12-21 04:56:54 +01:00
|
|
|
void *
|
|
|
|
buffer_append_space(Buffer *buffer, u_int len)
|
1999-10-27 05:42:43 +02:00
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret;
|
|
|
|
u_char *p;
|
2001-12-21 04:56:54 +01:00
|
|
|
|
2014-05-15 06:33:43 +02:00
|
|
|
if ((ret = sshbuf_reserve(buffer, len, &p)) != 0)
|
|
|
|
fatal("%s: %s", __func__, ssh_err(ret));
|
|
|
|
return p;
|
1999-10-27 05:42:43 +02:00
|
|
|
}
|
|
|
|
|
2006-04-23 04:06:03 +02:00
|
|
|
int
|
|
|
|
buffer_check_alloc(Buffer *buffer, u_int len)
|
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret = sshbuf_check_reserve(buffer, len);
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2014-05-15 06:33:43 +02:00
|
|
|
if (ret == 0)
|
|
|
|
return 1;
|
|
|
|
if (ret == SSH_ERR_NO_BUFFER_SPACE)
|
|
|
|
return 0;
|
|
|
|
fatal("%s: %s", __func__, ssh_err(ret));
|
2016-12-19 23:46:28 +01:00
|
|
|
return -1;
|
1999-10-27 05:42:43 +02:00
|
|
|
}
|
|
|
|
|
2004-11-05 10:41:24 +01:00
|
|
|
int
|
|
|
|
buffer_get_ret(Buffer *buffer, void *buf, u_int len)
|
1999-10-27 05:42:43 +02:00
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((ret = sshbuf_get(buffer, buf, len)) != 0) {
|
|
|
|
error("%s: %s", __func__, ssh_err(ret));
|
|
|
|
return -1;
|
2004-11-05 10:41:24 +01:00
|
|
|
}
|
2014-05-15 06:33:43 +02:00
|
|
|
return 0;
|
2004-11-05 10:41:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
buffer_get(Buffer *buffer, void *buf, u_int len)
|
|
|
|
{
|
|
|
|
if (buffer_get_ret(buffer, buf, len) == -1)
|
2014-05-15 06:33:43 +02:00
|
|
|
fatal("%s: buffer error", __func__);
|
1999-10-27 05:42:43 +02:00
|
|
|
}
|
|
|
|
|
2004-11-05 10:41:24 +01:00
|
|
|
int
|
|
|
|
buffer_consume_ret(Buffer *buffer, u_int bytes)
|
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret = sshbuf_consume(buffer, bytes);
|
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
return 0;
|
|
|
|
if (ret == SSH_ERR_MESSAGE_INCOMPLETE)
|
|
|
|
return -1;
|
|
|
|
fatal("%s: %s", __func__, ssh_err(ret));
|
2016-12-19 23:46:28 +01:00
|
|
|
return -1;
|
2004-11-05 10:41:24 +01:00
|
|
|
}
|
|
|
|
|
2000-04-16 03:18:38 +02:00
|
|
|
void
|
2000-12-22 02:43:59 +01:00
|
|
|
buffer_consume(Buffer *buffer, u_int bytes)
|
1999-10-27 05:42:43 +02:00
|
|
|
{
|
2004-11-05 10:41:24 +01:00
|
|
|
if (buffer_consume_ret(buffer, bytes) == -1)
|
2014-05-15 06:33:43 +02:00
|
|
|
fatal("%s: buffer error", __func__);
|
1999-11-24 14:26:21 +01:00
|
|
|
}
|
1999-10-27 05:42:43 +02:00
|
|
|
|
2004-11-05 10:41:24 +01:00
|
|
|
int
|
|
|
|
buffer_consume_end_ret(Buffer *buffer, u_int bytes)
|
|
|
|
{
|
2014-05-15 06:33:43 +02:00
|
|
|
int ret = sshbuf_consume_end(buffer, bytes);
|
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
return 0;
|
|
|
|
if (ret == SSH_ERR_MESSAGE_INCOMPLETE)
|
|
|
|
return -1;
|
|
|
|
fatal("%s: %s", __func__, ssh_err(ret));
|
2016-12-19 23:46:28 +01:00
|
|
|
return -1;
|
2004-11-05 10:41:24 +01:00
|
|
|
}
|
|
|
|
|
2000-04-16 03:18:38 +02:00
|
|
|
void
|
2000-12-22 02:43:59 +01:00
|
|
|
buffer_consume_end(Buffer *buffer, u_int bytes)
|
1999-10-27 05:42:43 +02:00
|
|
|
{
|
2004-11-05 10:41:24 +01:00
|
|
|
if (buffer_consume_end_ret(buffer, bytes) == -1)
|
2014-05-15 06:33:43 +02:00
|
|
|
fatal("%s: buffer error", __func__);
|
1999-10-27 05:42:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|