/src/boringssl/crypto/stack/stack.cc
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. |
2 | | // |
3 | | // Licensed under the Apache License, Version 2.0 (the "License"); |
4 | | // you may not use this file except in compliance with the License. |
5 | | // You may obtain a copy of the License at |
6 | | // |
7 | | // https://www.apache.org/licenses/LICENSE-2.0 |
8 | | // |
9 | | // Unless required by applicable law or agreed to in writing, software |
10 | | // distributed under the License is distributed on an "AS IS" BASIS, |
11 | | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
12 | | // See the License for the specific language governing permissions and |
13 | | // limitations under the License. |
14 | | |
15 | | #include <openssl/stack.h> |
16 | | |
17 | | #include <assert.h> |
18 | | #include <limits.h> |
19 | | |
20 | | #include <openssl/err.h> |
21 | | #include <openssl/mem.h> |
22 | | |
23 | | #include "../internal.h" |
24 | | |
25 | | |
26 | | struct stack_st { |
27 | | // num contains the number of valid pointers in |data|. |
28 | | size_t num; |
29 | | void **data; |
30 | | // sorted is non-zero if the values pointed to by |data| are in ascending |
31 | | // order, based on |comp|. |
32 | | int sorted; |
33 | | // num_alloc contains the number of pointers allocated in the buffer pointed |
34 | | // to by |data|, which may be larger than |num|. |
35 | | size_t num_alloc; |
36 | | // comp is an optional comparison function. |
37 | | OPENSSL_sk_cmp_func comp; |
38 | | }; |
39 | | |
40 | | // kMinSize is the number of pointers that will be initially allocated in a new |
41 | | // stack. |
42 | | static const size_t kMinSize = 4; |
43 | | |
44 | 4.82M | OPENSSL_STACK *OPENSSL_sk_new(OPENSSL_sk_cmp_func comp) { |
45 | 4.82M | OPENSSL_STACK *ret = |
46 | 4.82M | reinterpret_cast<OPENSSL_STACK *>(OPENSSL_zalloc(sizeof(OPENSSL_STACK))); |
47 | 4.82M | if (ret == NULL) { |
48 | 0 | return NULL; |
49 | 0 | } |
50 | | |
51 | 4.82M | ret->data = |
52 | 4.82M | reinterpret_cast<void **>(OPENSSL_calloc(kMinSize, sizeof(void *))); |
53 | 4.82M | if (ret->data == NULL) { |
54 | 0 | goto err; |
55 | 0 | } |
56 | | |
57 | 4.82M | ret->comp = comp; |
58 | 4.82M | ret->num_alloc = kMinSize; |
59 | | |
60 | 4.82M | return ret; |
61 | | |
62 | 0 | err: |
63 | 0 | OPENSSL_free(ret); |
64 | 0 | return NULL; |
65 | 4.82M | } |
66 | | |
67 | 4.81M | OPENSSL_STACK *OPENSSL_sk_new_null(void) { return OPENSSL_sk_new(NULL); } |
68 | | |
69 | 23.7M | size_t OPENSSL_sk_num(const OPENSSL_STACK *sk) { |
70 | 23.7M | if (sk == NULL) { |
71 | 773k | return 0; |
72 | 773k | } |
73 | 22.9M | return sk->num; |
74 | 23.7M | } |
75 | | |
76 | 0 | void OPENSSL_sk_zero(OPENSSL_STACK *sk) { |
77 | 0 | if (sk == NULL || sk->num == 0) { |
78 | 0 | return; |
79 | 0 | } |
80 | 0 | OPENSSL_memset(sk->data, 0, sizeof(void *) * sk->num); |
81 | 0 | sk->num = 0; |
82 | 0 | sk->sorted = 0; |
83 | 0 | } |
84 | | |
85 | 14.7M | void *OPENSSL_sk_value(const OPENSSL_STACK *sk, size_t i) { |
86 | 14.7M | if (!sk || i >= sk->num) { |
87 | 0 | return NULL; |
88 | 0 | } |
89 | 14.7M | return sk->data[i]; |
90 | 14.7M | } |
91 | | |
92 | 1.33M | void *OPENSSL_sk_set(OPENSSL_STACK *sk, size_t i, void *value) { |
93 | 1.33M | if (!sk || i >= sk->num) { |
94 | 0 | return NULL; |
95 | 0 | } |
96 | 1.33M | return sk->data[i] = value; |
97 | 1.33M | } |
98 | | |
99 | 5.68M | void OPENSSL_sk_free(OPENSSL_STACK *sk) { |
100 | 5.68M | if (sk == NULL) { |
101 | 635k | return; |
102 | 635k | } |
103 | 5.04M | OPENSSL_free(sk->data); |
104 | 5.04M | OPENSSL_free(sk); |
105 | 5.04M | } |
106 | | |
107 | | void OPENSSL_sk_pop_free_ex(OPENSSL_STACK *sk, |
108 | | OPENSSL_sk_call_free_func call_free_func, |
109 | 5.18M | OPENSSL_sk_free_func free_func) { |
110 | 5.18M | if (sk == NULL) { |
111 | 1.59M | return; |
112 | 1.59M | } |
113 | | |
114 | 9.05M | for (size_t i = 0; i < sk->num; i++) { |
115 | 5.46M | if (sk->data[i] != NULL) { |
116 | 5.46M | call_free_func(free_func, sk->data[i]); |
117 | 5.46M | } |
118 | 5.46M | } |
119 | 3.59M | OPENSSL_sk_free(sk); |
120 | 3.59M | } |
121 | | |
122 | | // Historically, |sk_pop_free| called the function as |OPENSSL_sk_free_func| |
123 | | // directly. This is undefined in C. Some callers called |sk_pop_free| directly, |
124 | | // so we must maintain a compatibility version for now. |
125 | 0 | static void call_free_func_legacy(OPENSSL_sk_free_func func, void *ptr) { |
126 | 0 | func(ptr); |
127 | 0 | } |
128 | | |
129 | 0 | void sk_pop_free(OPENSSL_STACK *sk, OPENSSL_sk_free_func free_func) { |
130 | 0 | OPENSSL_sk_pop_free_ex(sk, call_free_func_legacy, free_func); |
131 | 0 | } |
132 | | |
133 | 7.84M | size_t OPENSSL_sk_insert(OPENSSL_STACK *sk, void *p, size_t where) { |
134 | 7.84M | if (sk == NULL) { |
135 | 0 | return 0; |
136 | 0 | } |
137 | | |
138 | 7.84M | if (sk->num >= INT_MAX) { |
139 | 0 | OPENSSL_PUT_ERROR(CRYPTO, ERR_R_OVERFLOW); |
140 | 0 | return 0; |
141 | 0 | } |
142 | | |
143 | 7.84M | if (sk->num_alloc <= sk->num + 1) { |
144 | | // Attempt to double the size of the array. |
145 | 183k | size_t new_alloc = sk->num_alloc << 1; |
146 | 183k | size_t alloc_size = new_alloc * sizeof(void *); |
147 | 183k | void **data; |
148 | | |
149 | | // If the doubling overflowed, try to increment. |
150 | 183k | if (new_alloc < sk->num_alloc || alloc_size / sizeof(void *) != new_alloc) { |
151 | 0 | new_alloc = sk->num_alloc + 1; |
152 | 0 | alloc_size = new_alloc * sizeof(void *); |
153 | 0 | } |
154 | | |
155 | | // If the increment also overflowed, fail. |
156 | 183k | if (new_alloc < sk->num_alloc || alloc_size / sizeof(void *) != new_alloc) { |
157 | 0 | return 0; |
158 | 0 | } |
159 | | |
160 | 183k | data = reinterpret_cast<void **>(OPENSSL_realloc(sk->data, alloc_size)); |
161 | 183k | if (data == NULL) { |
162 | 0 | return 0; |
163 | 0 | } |
164 | | |
165 | 183k | sk->data = data; |
166 | 183k | sk->num_alloc = new_alloc; |
167 | 183k | } |
168 | | |
169 | 7.84M | if (where >= sk->num) { |
170 | 7.84M | sk->data[sk->num] = p; |
171 | 7.84M | } else { |
172 | 0 | OPENSSL_memmove(&sk->data[where + 1], &sk->data[where], |
173 | 0 | sizeof(void *) * (sk->num - where)); |
174 | 0 | sk->data[where] = p; |
175 | 0 | } |
176 | | |
177 | 7.84M | sk->num++; |
178 | 7.84M | sk->sorted = 0; |
179 | | |
180 | 7.84M | return sk->num; |
181 | 7.84M | } |
182 | | |
183 | 9.83k | void *OPENSSL_sk_delete(OPENSSL_STACK *sk, size_t where) { |
184 | 9.83k | void *ret; |
185 | | |
186 | 9.83k | if (!sk || where >= sk->num) { |
187 | 0 | return NULL; |
188 | 0 | } |
189 | | |
190 | 9.83k | ret = sk->data[where]; |
191 | | |
192 | 9.83k | if (where != sk->num - 1) { |
193 | 3.65k | OPENSSL_memmove(&sk->data[where], &sk->data[where + 1], |
194 | 3.65k | sizeof(void *) * (sk->num - where - 1)); |
195 | 3.65k | } |
196 | | |
197 | 9.83k | sk->num--; |
198 | 9.83k | return ret; |
199 | 9.83k | } |
200 | | |
201 | 3.65k | void *OPENSSL_sk_delete_ptr(OPENSSL_STACK *sk, const void *p) { |
202 | 3.65k | if (sk == NULL) { |
203 | 0 | return NULL; |
204 | 0 | } |
205 | | |
206 | 21.7k | for (size_t i = 0; i < sk->num; i++) { |
207 | 21.7k | if (sk->data[i] == p) { |
208 | 3.65k | return OPENSSL_sk_delete(sk, i); |
209 | 3.65k | } |
210 | 21.7k | } |
211 | | |
212 | 0 | return NULL; |
213 | 3.65k | } |
214 | | |
215 | | void OPENSSL_sk_delete_if(OPENSSL_STACK *sk, |
216 | | OPENSSL_sk_call_delete_if_func call_func, |
217 | 0 | OPENSSL_sk_delete_if_func func, void *data) { |
218 | 0 | if (sk == NULL) { |
219 | 0 | return; |
220 | 0 | } |
221 | | |
222 | 0 | size_t new_num = 0; |
223 | 0 | for (size_t i = 0; i < sk->num; i++) { |
224 | 0 | if (!call_func(func, sk->data[i], data)) { |
225 | 0 | sk->data[new_num] = sk->data[i]; |
226 | 0 | new_num++; |
227 | 0 | } |
228 | 0 | } |
229 | 0 | sk->num = new_num; |
230 | 0 | } |
231 | | |
232 | | int OPENSSL_sk_find(const OPENSSL_STACK *sk, size_t *out_index, const void *p, |
233 | 69.3k | OPENSSL_sk_call_cmp_func call_cmp_func) { |
234 | 69.3k | if (sk == NULL) { |
235 | 0 | return 0; |
236 | 0 | } |
237 | | |
238 | 69.3k | if (sk->comp == NULL) { |
239 | | // Use pointer equality when no comparison function has been set. |
240 | 602k | for (size_t i = 0; i < sk->num; i++) { |
241 | 601k | if (sk->data[i] == p) { |
242 | 69.1k | if (out_index) { |
243 | 7.34k | *out_index = i; |
244 | 7.34k | } |
245 | 69.1k | return 1; |
246 | 69.1k | } |
247 | 601k | } |
248 | 225 | return 0; |
249 | 69.3k | } |
250 | | |
251 | 0 | if (p == NULL) { |
252 | 0 | return 0; |
253 | 0 | } |
254 | | |
255 | 0 | if (!OPENSSL_sk_is_sorted(sk)) { |
256 | 0 | for (size_t i = 0; i < sk->num; i++) { |
257 | 0 | if (call_cmp_func(sk->comp, p, sk->data[i]) == 0) { |
258 | 0 | if (out_index) { |
259 | 0 | *out_index = i; |
260 | 0 | } |
261 | 0 | return 1; |
262 | 0 | } |
263 | 0 | } |
264 | 0 | return 0; |
265 | 0 | } |
266 | | |
267 | | // The stack is sorted, so binary search to find the element. |
268 | | // |
269 | | // |lo| and |hi| maintain a half-open interval of where the answer may be. All |
270 | | // indices such that |lo <= idx < hi| are candidates. |
271 | 0 | size_t lo = 0, hi = sk->num; |
272 | 0 | while (lo < hi) { |
273 | | // Bias |mid| towards |lo|. See the |r == 0| case below. |
274 | 0 | size_t mid = lo + (hi - lo - 1) / 2; |
275 | 0 | assert(lo <= mid && mid < hi); |
276 | 0 | int r = call_cmp_func(sk->comp, p, sk->data[mid]); |
277 | 0 | if (r > 0) { |
278 | 0 | lo = mid + 1; // |mid| is too low. |
279 | 0 | } else if (r < 0) { |
280 | 0 | hi = mid; // |mid| is too high. |
281 | 0 | } else { |
282 | | // |mid| matches. However, this function returns the earliest match, so we |
283 | | // can only return if the range has size one. |
284 | 0 | if (hi - lo == 1) { |
285 | 0 | if (out_index != NULL) { |
286 | 0 | *out_index = mid; |
287 | 0 | } |
288 | 0 | return 1; |
289 | 0 | } |
290 | | // The sample is biased towards |lo|. |mid| can only be |hi - 1| if |
291 | | // |hi - lo| was one, so this makes forward progress. |
292 | 0 | assert(mid + 1 < hi); |
293 | 0 | hi = mid + 1; |
294 | 0 | } |
295 | 0 | } |
296 | | |
297 | 0 | assert(lo == hi); |
298 | 0 | return 0; // Not found. |
299 | 0 | } |
300 | | |
301 | 0 | void *OPENSSL_sk_shift(OPENSSL_STACK *sk) { |
302 | 0 | if (sk == NULL) { |
303 | 0 | return NULL; |
304 | 0 | } |
305 | 0 | if (sk->num == 0) { |
306 | 0 | return NULL; |
307 | 0 | } |
308 | 0 | return OPENSSL_sk_delete(sk, 0); |
309 | 0 | } |
310 | | |
311 | 7.81M | size_t OPENSSL_sk_push(OPENSSL_STACK *sk, void *p) { |
312 | 7.81M | return OPENSSL_sk_insert(sk, p, sk->num); |
313 | 7.81M | } |
314 | | |
315 | 6.18k | void *OPENSSL_sk_pop(OPENSSL_STACK *sk) { |
316 | 6.18k | if (sk == NULL) { |
317 | 0 | return NULL; |
318 | 0 | } |
319 | 6.18k | if (sk->num == 0) { |
320 | 0 | return NULL; |
321 | 0 | } |
322 | 6.18k | return OPENSSL_sk_delete(sk, sk->num - 1); |
323 | 6.18k | } |
324 | | |
325 | 227k | OPENSSL_STACK *OPENSSL_sk_dup(const OPENSSL_STACK *sk) { |
326 | 227k | if (sk == NULL) { |
327 | 0 | return NULL; |
328 | 0 | } |
329 | | |
330 | 227k | OPENSSL_STACK *ret = |
331 | 227k | reinterpret_cast<OPENSSL_STACK *>(OPENSSL_zalloc(sizeof(OPENSSL_STACK))); |
332 | 227k | if (ret == NULL) { |
333 | 0 | return NULL; |
334 | 0 | } |
335 | | |
336 | 227k | ret->data = reinterpret_cast<void **>( |
337 | 227k | OPENSSL_memdup(sk->data, sizeof(void *) * sk->num_alloc)); |
338 | 227k | if (ret->data == NULL) { |
339 | 0 | goto err; |
340 | 0 | } |
341 | | |
342 | 227k | ret->num = sk->num; |
343 | 227k | ret->sorted = sk->sorted; |
344 | 227k | ret->num_alloc = sk->num_alloc; |
345 | 227k | ret->comp = sk->comp; |
346 | 227k | return ret; |
347 | | |
348 | 0 | err: |
349 | 0 | OPENSSL_sk_free(ret); |
350 | 0 | return NULL; |
351 | 227k | } |
352 | | |
353 | 0 | static size_t parent_idx(size_t idx) { |
354 | 0 | assert(idx > 0); |
355 | 0 | return (idx - 1) / 2; |
356 | 0 | } |
357 | | |
358 | 0 | static size_t left_idx(size_t idx) { |
359 | | // The largest possible index is |PTRDIFF_MAX|, not |SIZE_MAX|. If |
360 | | // |ptrdiff_t|, a signed type, is the same size as |size_t|, this cannot |
361 | | // overflow. |
362 | 0 | assert(idx <= PTRDIFF_MAX); |
363 | 0 | static_assert(PTRDIFF_MAX <= (SIZE_MAX - 1) / 2, "2 * idx + 1 may oveflow"); |
364 | 0 | return 2 * idx + 1; |
365 | 0 | } |
366 | | |
367 | | // down_heap fixes the subtree rooted at |i|. |i|'s children must each satisfy |
368 | | // the heap property. Only the first |num| elements of |sk| are considered. |
369 | | static void down_heap(OPENSSL_STACK *sk, OPENSSL_sk_call_cmp_func call_cmp_func, |
370 | 0 | size_t i, size_t num) { |
371 | 0 | assert(i < num && num <= sk->num); |
372 | 0 | for (;;) { |
373 | 0 | size_t left = left_idx(i); |
374 | 0 | if (left >= num) { |
375 | 0 | break; // No left child. |
376 | 0 | } |
377 | | |
378 | | // Swap |i| with the largest of its children. |
379 | 0 | size_t next = i; |
380 | 0 | if (call_cmp_func(sk->comp, sk->data[next], sk->data[left]) < 0) { |
381 | 0 | next = left; |
382 | 0 | } |
383 | 0 | size_t right = left + 1; // Cannot overflow because |left < num|. |
384 | 0 | if (right < num && |
385 | 0 | call_cmp_func(sk->comp, sk->data[next], sk->data[right]) < 0) { |
386 | 0 | next = right; |
387 | 0 | } |
388 | |
|
389 | 0 | if (i == next) { |
390 | 0 | break; // |i| is already larger than its children. |
391 | 0 | } |
392 | | |
393 | 0 | void *tmp = sk->data[i]; |
394 | 0 | sk->data[i] = sk->data[next]; |
395 | 0 | sk->data[next] = tmp; |
396 | 0 | i = next; |
397 | 0 | } |
398 | 0 | } |
399 | | |
400 | | void OPENSSL_sk_sort(OPENSSL_STACK *sk, |
401 | 0 | OPENSSL_sk_call_cmp_func call_cmp_func) { |
402 | 0 | if (sk == NULL || sk->comp == NULL || sk->sorted) { |
403 | 0 | return; |
404 | 0 | } |
405 | | |
406 | 0 | if (sk->num >= 2) { |
407 | | // |qsort| lacks a context parameter in the comparison function for us to |
408 | | // pass in |call_cmp_func| and |sk->comp|. While we could cast |sk->comp| to |
409 | | // the expected type, it is undefined behavior in C can trip sanitizers. |
410 | | // |qsort_r| and |qsort_s| avoid this, but using them is impractical. See |
411 | | // https://stackoverflow.com/a/39561369 |
412 | | // |
413 | | // Use our own heap sort instead. This is not performance-sensitive, so we |
414 | | // optimize for simplicity and size. First, build a max-heap in place. |
415 | 0 | for (size_t i = parent_idx(sk->num - 1); i < sk->num; i--) { |
416 | 0 | down_heap(sk, call_cmp_func, i, sk->num); |
417 | 0 | } |
418 | | |
419 | | // Iteratively remove the maximum element to populate the result in reverse. |
420 | 0 | for (size_t i = sk->num - 1; i > 0; i--) { |
421 | 0 | void *tmp = sk->data[0]; |
422 | 0 | sk->data[0] = sk->data[i]; |
423 | 0 | sk->data[i] = tmp; |
424 | 0 | down_heap(sk, call_cmp_func, 0, i); |
425 | 0 | } |
426 | 0 | } |
427 | 0 | sk->sorted = 1; |
428 | 0 | } |
429 | | |
430 | 0 | int OPENSSL_sk_is_sorted(const OPENSSL_STACK *sk) { |
431 | 0 | if (!sk) { |
432 | 0 | return 1; |
433 | 0 | } |
434 | | // Zero- and one-element lists are always sorted. |
435 | 0 | return sk->sorted || (sk->comp != NULL && sk->num < 2); |
436 | 0 | } |
437 | | |
438 | | OPENSSL_sk_cmp_func OPENSSL_sk_set_cmp_func(OPENSSL_STACK *sk, |
439 | 0 | OPENSSL_sk_cmp_func comp) { |
440 | 0 | OPENSSL_sk_cmp_func old = sk->comp; |
441 | |
|
442 | 0 | if (sk->comp != comp) { |
443 | 0 | sk->sorted = 0; |
444 | 0 | } |
445 | 0 | sk->comp = comp; |
446 | |
|
447 | 0 | return old; |
448 | 0 | } |
449 | | |
450 | | OPENSSL_STACK *OPENSSL_sk_deep_copy(const OPENSSL_STACK *sk, |
451 | | OPENSSL_sk_call_copy_func call_copy_func, |
452 | | OPENSSL_sk_copy_func copy_func, |
453 | | OPENSSL_sk_call_free_func call_free_func, |
454 | 170k | OPENSSL_sk_free_func free_func) { |
455 | 170k | OPENSSL_STACK *ret = OPENSSL_sk_dup(sk); |
456 | 170k | if (ret == NULL) { |
457 | 0 | return NULL; |
458 | 0 | } |
459 | | |
460 | 347k | for (size_t i = 0; i < ret->num; i++) { |
461 | 176k | if (ret->data[i] == NULL) { |
462 | 361 | continue; |
463 | 361 | } |
464 | 175k | ret->data[i] = call_copy_func(copy_func, ret->data[i]); |
465 | 175k | if (ret->data[i] == NULL) { |
466 | 0 | for (size_t j = 0; j < i; j++) { |
467 | 0 | if (ret->data[j] != NULL) { |
468 | 0 | call_free_func(free_func, ret->data[j]); |
469 | 0 | } |
470 | 0 | } |
471 | 0 | OPENSSL_sk_free(ret); |
472 | 0 | return NULL; |
473 | 0 | } |
474 | 175k | } |
475 | | |
476 | 170k | return ret; |
477 | 170k | } |
478 | | |
479 | 0 | OPENSSL_STACK *sk_new_null(void) { return OPENSSL_sk_new_null(); } |
480 | | |
481 | 0 | size_t sk_num(const OPENSSL_STACK *sk) { return OPENSSL_sk_num(sk); } |
482 | | |
483 | 0 | void *sk_value(const OPENSSL_STACK *sk, size_t i) { |
484 | 0 | return OPENSSL_sk_value(sk, i); |
485 | 0 | } |
486 | | |
487 | 0 | void sk_free(OPENSSL_STACK *sk) { OPENSSL_sk_free(sk); } |
488 | | |
489 | 0 | size_t sk_push(OPENSSL_STACK *sk, void *p) { return OPENSSL_sk_push(sk, p); } |
490 | | |
491 | 0 | void *sk_pop(OPENSSL_STACK *sk) { return OPENSSL_sk_pop(sk); } |
492 | | |
493 | | void sk_pop_free_ex(OPENSSL_STACK *sk, OPENSSL_sk_call_free_func call_free_func, |
494 | 0 | OPENSSL_sk_free_func free_func) { |
495 | 0 | OPENSSL_sk_pop_free_ex(sk, call_free_func, free_func); |
496 | 0 | } |