1 /* $OpenBSD: sshbuf-misc.c,v 1.17 2021/08/11 05:21:32 djm Exp $ */
3 * Copyright (c) 2011 Damien Miller
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 #include <sys/types.h>
21 #include <sys/socket.h>
22 #include <netinet/in.h>
35 #define SSHBUF_INTERNAL
39 sshbuf_dump_data(const void *s, size_t len, FILE *f)
42 const u_char *p = (const u_char *)s;
44 for (i = 0; i < len; i += 16) {
45 fprintf(f, "%.4zu: ", i);
46 for (j = i; j < i + 16; j++) {
48 fprintf(f, "%02x ", p[j]);
53 for (j = i; j < i + 16; j++) {
55 if (isascii(p[j]) && isprint(p[j]))
56 fprintf(f, "%c", p[j]);
66 sshbuf_dump(const struct sshbuf *buf, FILE *f)
68 fprintf(f, "buffer len = %zu\n", sshbuf_len(buf));
69 sshbuf_dump_data(sshbuf_ptr(buf), sshbuf_len(buf), f);
73 sshbuf_dtob16(struct sshbuf *buf)
75 size_t i, j, len = sshbuf_len(buf);
76 const u_char *p = sshbuf_ptr(buf);
78 const char hex[] = "0123456789abcdef";
82 if (SIZE_MAX / 2 <= len || (ret = malloc(len * 2 + 1)) == NULL)
84 for (i = j = 0; i < len; i++) {
85 ret[j++] = hex[(p[i] >> 4) & 0xf];
86 ret[j++] = hex[p[i] & 0xf];
93 sshbuf_dtob64(const struct sshbuf *d, struct sshbuf *b64, int wrap)
99 if (d == NULL || b64 == NULL || sshbuf_len(d) >= SIZE_MAX / 2)
100 return SSH_ERR_INVALID_ARGUMENT;
101 if (sshbuf_len(d) == 0)
103 slen = ((sshbuf_len(d) + 2) / 3) * 4 + 1;
104 if ((s = malloc(slen)) == NULL)
105 return SSH_ERR_ALLOC_FAIL;
106 if (b64_ntop(sshbuf_ptr(d), sshbuf_len(d), s, slen) == -1) {
107 r = SSH_ERR_INTERNAL_ERROR;
111 for (i = 0; s[i] != '\0'; i++) {
112 if ((r = sshbuf_put_u8(b64, s[i])) != 0)
114 if (i % 70 == 69 && (r = sshbuf_put_u8(b64, '\n')) != 0)
117 if ((i - 1) % 70 != 69 && (r = sshbuf_put_u8(b64, '\n')) != 0)
120 if ((r = sshbuf_put(b64, s, strlen(s))) != 0)
131 sshbuf_dtob64_string(const struct sshbuf *buf, int wrap)
136 if ((tmp = sshbuf_new()) == NULL)
138 if (sshbuf_dtob64(buf, tmp, wrap) != 0) {
142 ret = sshbuf_dup_string(tmp);
148 sshbuf_b64tod(struct sshbuf *buf, const char *b64)
150 size_t plen = strlen(b64);
156 if ((p = malloc(plen)) == NULL)
157 return SSH_ERR_ALLOC_FAIL;
158 if ((nlen = b64_pton(b64, p, plen)) < 0) {
160 return SSH_ERR_INVALID_FORMAT;
162 if ((r = sshbuf_put(buf, p, nlen)) < 0) {
171 sshbuf_dtourlb64(const struct sshbuf *d, struct sshbuf *b64, int wrap)
173 int r = SSH_ERR_INTERNAL_ERROR;
175 struct sshbuf *b = NULL;
178 if ((b = sshbuf_new()) == NULL)
179 return SSH_ERR_ALLOC_FAIL;
180 /* Encode using regular base64; we'll transform it once done */
181 if ((r = sshbuf_dtob64(d, b, wrap)) != 0)
183 /* remove padding from end of encoded string*/
186 if (l <= 1 || sshbuf_ptr(b) == NULL) {
187 r = SSH_ERR_INTERNAL_ERROR;
190 if (sshbuf_ptr(b)[l - 1] != '=')
192 if ((r = sshbuf_consume_end(b, 1)) != 0)
195 /* Replace characters with rfc4648 equivalents */
197 if ((p = sshbuf_mutable_ptr(b)) == NULL) {
198 r = SSH_ERR_INTERNAL_ERROR;
201 for (i = 0; i < l; i++) {
204 else if (p[i] == '/')
207 r = sshbuf_putb(b64, b);
214 sshbuf_dup_string(struct sshbuf *buf)
216 const u_char *p = NULL, *s = sshbuf_ptr(buf);
217 size_t l = sshbuf_len(buf);
220 if (s == NULL || l > SIZE_MAX)
222 /* accept a nul only as the last character in the buffer */
223 if (l > 0 && (p = memchr(s, '\0', l)) != NULL) {
226 l--; /* the nul is put back below */
228 if ((r = malloc(l + 1)) == NULL)
237 sshbuf_cmp(const struct sshbuf *b, size_t offset,
238 const void *s, size_t len)
240 if (sshbuf_ptr(b) == NULL)
241 return SSH_ERR_INTERNAL_ERROR;
242 if (offset > SSHBUF_SIZE_MAX || len > SSHBUF_SIZE_MAX || len == 0)
243 return SSH_ERR_INVALID_ARGUMENT;
244 if (offset + len > sshbuf_len(b))
245 return SSH_ERR_MESSAGE_INCOMPLETE;
246 if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0)
247 return SSH_ERR_INVALID_FORMAT;
252 sshbuf_find(const struct sshbuf *b, size_t start_offset,
253 const void *s, size_t len, size_t *offsetp)
259 if (sshbuf_ptr(b) == NULL)
260 return SSH_ERR_INTERNAL_ERROR;
261 if (start_offset > SSHBUF_SIZE_MAX || len > SSHBUF_SIZE_MAX || len == 0)
262 return SSH_ERR_INVALID_ARGUMENT;
263 if (start_offset > sshbuf_len(b) || start_offset + len > sshbuf_len(b))
264 return SSH_ERR_MESSAGE_INCOMPLETE;
265 if ((p = memmem(sshbuf_ptr(b) + start_offset,
266 sshbuf_len(b) - start_offset, s, len)) == NULL)
267 return SSH_ERR_INVALID_FORMAT;
269 *offsetp = (const u_char *)p - sshbuf_ptr(b);