1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay (at) cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay (at) cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57 #include <openssl/buf.h> 58 59 #include <string.h> 60 61 #include <openssl/mem.h> 62 #include <openssl/err.h> 63 64 #include "../internal.h" 65 66 67 BUF_MEM *BUF_MEM_new(void) { 68 BUF_MEM *ret; 69 70 ret = OPENSSL_malloc(sizeof(BUF_MEM)); 71 if (ret == NULL) { 72 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 73 return NULL; 74 } 75 76 OPENSSL_memset(ret, 0, sizeof(BUF_MEM)); 77 return ret; 78 } 79 80 void BUF_MEM_free(BUF_MEM *buf) { 81 if (buf == NULL) { 82 return; 83 } 84 85 if (buf->data != NULL) { 86 OPENSSL_cleanse(buf->data, buf->max); 87 OPENSSL_free(buf->data); 88 } 89 90 OPENSSL_free(buf); 91 } 92 93 static int buf_mem_reserve(BUF_MEM *buf, size_t cap, int clean) { 94 if (buf->max >= cap) { 95 return 1; 96 } 97 98 size_t n = cap + 3; 99 if (n < cap) { 100 /* overflow */ 101 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 102 return 0; 103 } 104 n = n / 3; 105 size_t alloc_size = n * 4; 106 if (alloc_size / 4 != n) { 107 /* overflow */ 108 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 109 return 0; 110 } 111 112 char *new_buf; 113 if (buf->data == NULL) { 114 new_buf = OPENSSL_malloc(alloc_size); 115 } else { 116 if (clean) { 117 new_buf = OPENSSL_realloc_clean(buf->data, buf->max, alloc_size); 118 } else { 119 new_buf = OPENSSL_realloc(buf->data, alloc_size); 120 } 121 } 122 123 if (new_buf == NULL) { 124 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 125 return 0; 126 } 127 128 buf->data = new_buf; 129 buf->max = alloc_size; 130 return 1; 131 } 132 133 int BUF_MEM_reserve(BUF_MEM *buf, size_t cap) { 134 return buf_mem_reserve(buf, cap, 0 /* don't clear old buffer contents. */); 135 } 136 137 static size_t buf_mem_grow(BUF_MEM *buf, size_t len, int clean) { 138 if (!buf_mem_reserve(buf, len, clean)) { 139 return 0; 140 } 141 if (buf->length < len) { 142 OPENSSL_memset(&buf->data[buf->length], 0, len - buf->length); 143 } 144 buf->length = len; 145 return len; 146 } 147 148 size_t BUF_MEM_grow(BUF_MEM *buf, size_t len) { 149 return buf_mem_grow(buf, len, 0 /* don't clear old buffer contents. */); 150 } 151 152 size_t BUF_MEM_grow_clean(BUF_MEM *buf, size_t len) { 153 return buf_mem_grow(buf, len, 1 /* clear old buffer contents. */); 154 } 155 156 char *BUF_strdup(const char *buf) { 157 if (buf == NULL) { 158 return NULL; 159 } 160 161 return BUF_strndup(buf, strlen(buf)); 162 } 163 164 size_t BUF_strnlen(const char *str, size_t max_len) { 165 size_t i; 166 167 for (i = 0; i < max_len; i++) { 168 if (str[i] == 0) { 169 break; 170 } 171 } 172 173 return i; 174 } 175 176 char *BUF_strndup(const char *buf, size_t size) { 177 char *ret; 178 size_t alloc_size; 179 180 if (buf == NULL) { 181 return NULL; 182 } 183 184 size = BUF_strnlen(buf, size); 185 186 alloc_size = size + 1; 187 if (alloc_size < size) { 188 /* overflow */ 189 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 190 return NULL; 191 } 192 ret = OPENSSL_malloc(alloc_size); 193 if (ret == NULL) { 194 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 195 return NULL; 196 } 197 198 OPENSSL_memcpy(ret, buf, size); 199 ret[size] = '\0'; 200 return ret; 201 } 202 203 size_t BUF_strlcpy(char *dst, const char *src, size_t dst_size) { 204 size_t l = 0; 205 206 for (; dst_size > 1 && *src; dst_size--) { 207 *dst++ = *src++; 208 l++; 209 } 210 211 if (dst_size) { 212 *dst = 0; 213 } 214 215 return l + strlen(src); 216 } 217 218 size_t BUF_strlcat(char *dst, const char *src, size_t dst_size) { 219 size_t l = 0; 220 for (; dst_size > 0 && *dst; dst_size--, dst++) { 221 l++; 222 } 223 return l + BUF_strlcpy(dst, src, dst_size); 224 } 225 226 void *BUF_memdup(const void *data, size_t dst_size) { 227 void *ret; 228 229 if (dst_size == 0) { 230 return NULL; 231 } 232 233 ret = OPENSSL_malloc(dst_size); 234 if (ret == NULL) { 235 OPENSSL_PUT_ERROR(BUF, ERR_R_MALLOC_FAILURE); 236 return NULL; 237 } 238 239 OPENSSL_memcpy(ret, data, dst_size); 240 return ret; 241 } 242