Coverage Report

Created: 2023-09-25 06:45

/src/openssl111/ssl/packet.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "internal/cryptlib.h"
11
#include "packet_local.h"
12
#include <openssl/sslerr.h>
13
14
6.44k
#define DEFAULT_BUF_SIZE    256
15
16
int WPACKET_allocate_bytes(WPACKET *pkt, size_t len, unsigned char **allocbytes)
17
6.42M
{
18
6.42M
    if (!WPACKET_reserve_bytes(pkt, len, allocbytes))
19
7.02k
        return 0;
20
21
6.41M
    pkt->written += len;
22
6.41M
    pkt->curr += len;
23
6.41M
    return 1;
24
6.42M
}
25
26
int WPACKET_sub_allocate_bytes__(WPACKET *pkt, size_t len,
27
                                 unsigned char **allocbytes, size_t lenbytes)
28
11.3k
{
29
11.3k
    if (!WPACKET_start_sub_packet_len__(pkt, lenbytes)
30
11.3k
            || !WPACKET_allocate_bytes(pkt, len, allocbytes)
31
11.3k
            || !WPACKET_close(pkt))
32
0
        return 0;
33
34
11.3k
    return 1;
35
11.3k
}
36
37
2.31M
#define GETBUF(p)   (((p)->staticbuf != NULL) \
38
2.31M
                     ? (p)->staticbuf : (unsigned char *)(p)->buf->data)
39
40
int WPACKET_reserve_bytes(WPACKET *pkt, size_t len, unsigned char **allocbytes)
41
1.85M
{
42
    /* Internal API, so should not fail */
43
1.85M
    if (!ossl_assert(pkt->subs != NULL && len != 0))
44
0
        return 0;
45
46
1.85M
    if (pkt->maxsize - pkt->written < len)
47
0
        return 0;
48
49
1.85M
    if (pkt->staticbuf == NULL && (pkt->buf->length - pkt->written < len)) {
50
4.86k
        size_t newlen;
51
4.86k
        size_t reflen;
52
53
4.86k
        reflen = (len > pkt->buf->length) ? len : pkt->buf->length;
54
55
4.86k
        if (reflen > SIZE_MAX / 2) {
56
0
            newlen = SIZE_MAX;
57
4.86k
        } else {
58
4.86k
            newlen = reflen * 2;
59
4.86k
            if (newlen < DEFAULT_BUF_SIZE)
60
1.58k
                newlen = DEFAULT_BUF_SIZE;
61
4.86k
        }
62
4.86k
        if (BUF_MEM_grow(pkt->buf, newlen) == 0)
63
0
            return 0;
64
4.86k
    }
65
1.85M
    if (allocbytes != NULL)
66
1.77M
        *allocbytes = WPACKET_get_curr(pkt);
67
68
1.85M
    return 1;
69
1.85M
}
70
71
int WPACKET_sub_reserve_bytes__(WPACKET *pkt, size_t len,
72
                                unsigned char **allocbytes, size_t lenbytes)
73
803
{
74
803
    if (!WPACKET_reserve_bytes(pkt, lenbytes + len, allocbytes))
75
0
        return 0;
76
77
803
    *allocbytes += lenbytes;
78
79
803
    return 1;
80
803
}
81
82
static size_t maxmaxsize(size_t lenbytes)
83
411k
{
84
411k
    if (lenbytes >= sizeof(size_t) || lenbytes == 0)
85
411k
        return SIZE_MAX;
86
87
0
    return ((size_t)1 << (lenbytes * 8)) - 1 + lenbytes;
88
411k
}
89
90
static int wpacket_intern_init_len(WPACKET *pkt, size_t lenbytes)
91
84.4k
{
92
84.4k
    unsigned char *lenchars;
93
94
84.4k
    pkt->curr = 0;
95
84.4k
    pkt->written = 0;
96
97
84.4k
    if ((pkt->subs = OPENSSL_zalloc(sizeof(*pkt->subs))) == NULL) {
98
0
        SSLerr(SSL_F_WPACKET_INTERN_INIT_LEN, ERR_R_MALLOC_FAILURE);
99
0
        return 0;
100
0
    }
101
102
84.4k
    if (lenbytes == 0)
103
84.4k
        return 1;
104
105
0
    pkt->subs->pwritten = lenbytes;
106
0
    pkt->subs->lenbytes = lenbytes;
107
108
0
    if (!WPACKET_allocate_bytes(pkt, lenbytes, &lenchars)) {
109
0
        OPENSSL_free(pkt->subs);
110
0
        pkt->subs = NULL;
111
0
        return 0;
112
0
    }
113
0
    pkt->subs->packet_len = lenchars - GETBUF(pkt);
114
115
0
    return 1;
116
0
}
117
118
int WPACKET_init_static_len(WPACKET *pkt, unsigned char *buf, size_t len,
119
                            size_t lenbytes)
120
188k
{
121
188k
    size_t max = maxmaxsize(lenbytes);
122
123
    /* Internal API, so should not fail */
124
188k
    if (!ossl_assert(buf != NULL && len > 0))
125
0
        return 0;
126
127
188k
    pkt->staticbuf = buf;
128
188k
    pkt->buf = NULL;
129
188k
    pkt->maxsize = (max < len) ? max : len;
130
131
188k
    return wpacket_intern_init_len(pkt, lenbytes);
132
188k
}
133
134
int WPACKET_init_len(WPACKET *pkt, BUF_MEM *buf, size_t lenbytes)
135
73.3k
{
136
    /* Internal API, so should not fail */
137
73.3k
    if (!ossl_assert(buf != NULL))
138
0
        return 0;
139
140
73.3k
    pkt->staticbuf = NULL;
141
73.3k
    pkt->buf = buf;
142
73.3k
    pkt->maxsize = maxmaxsize(lenbytes);
143
144
73.3k
    return wpacket_intern_init_len(pkt, lenbytes);
145
73.3k
}
146
147
int WPACKET_init(WPACKET *pkt, BUF_MEM *buf)
148
72.2k
{
149
72.2k
    return WPACKET_init_len(pkt, buf, 0);
150
72.2k
}
151
152
int WPACKET_set_flags(WPACKET *pkt, unsigned int flags)
153
43.8k
{
154
    /* Internal API, so should not fail */
155
43.8k
    if (!ossl_assert(pkt->subs != NULL))
156
0
        return 0;
157
158
43.8k
    pkt->subs->flags = flags;
159
160
43.8k
    return 1;
161
43.8k
}
162
163
/* Store the |value| of length |len| at location |data| */
164
static int put_value(unsigned char *data, uint64_t value, size_t len)
165
1.62M
{
166
4.72M
    for (data += len - 1; len > 0; len--) {
167
3.10M
        *data = (unsigned char)(value & 0xff);
168
3.10M
        data--;
169
3.10M
        value >>= 8;
170
3.10M
    }
171
172
    /* Check whether we could fit the value in the assigned number of bytes */
173
1.62M
    if (value > 0)
174
0
        return 0;
175
176
1.62M
    return 1;
177
1.62M
}
178
179
180
/*
181
 * Internal helper function used by WPACKET_close(), WPACKET_finish() and
182
 * WPACKET_fill_lengths() to close a sub-packet and write out its length if
183
 * necessary. If |doclose| is 0 then it goes through the motions of closing
184
 * (i.e. it fills in all the lengths), but doesn't actually close anything.
185
 */
186
static int wpacket_intern_close(WPACKET *pkt, WPACKET_SUB *sub, int doclose)
187
339k
{
188
339k
    size_t packlen = pkt->written - sub->pwritten;
189
190
339k
    if (packlen == 0
191
339k
            && (sub->flags & WPACKET_FLAGS_NON_ZERO_LENGTH) != 0)
192
0
        return 0;
193
194
339k
    if (packlen == 0
195
339k
            && sub->flags & WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH) {
196
        /* We can't handle this case. Return an error */
197
1.99k
        if (!doclose)
198
0
            return 0;
199
200
        /* Deallocate any bytes allocated for the length of the WPACKET */
201
1.99k
        if ((pkt->curr - sub->lenbytes) == sub->packet_len) {
202
1.99k
            pkt->written -= sub->lenbytes;
203
1.99k
            pkt->curr -= sub->lenbytes;
204
1.99k
        }
205
206
        /* Don't write out the packet length */
207
1.99k
        sub->packet_len = 0;
208
1.99k
        sub->lenbytes = 0;
209
1.99k
    }
210
211
    /* Write out the WPACKET length if needed */
212
339k
    if (sub->lenbytes > 0
213
339k
                && !put_value(&GETBUF(pkt)[sub->packet_len], packlen,
214
253k
                              sub->lenbytes))
215
0
            return 0;
216
217
339k
    if (doclose) {
218
339k
        pkt->subs = sub->parent;
219
339k
        OPENSSL_free(sub);
220
339k
    }
221
222
339k
    return 1;
223
339k
}
224
225
int WPACKET_fill_lengths(WPACKET *pkt)
226
0
{
227
0
    WPACKET_SUB *sub;
228
229
0
    if (!ossl_assert(pkt->subs != NULL))
230
0
        return 0;
231
232
0
    for (sub = pkt->subs; sub != NULL; sub = sub->parent) {
233
0
        if (!wpacket_intern_close(pkt, sub, 0))
234
0
            return 0;
235
0
    }
236
237
0
    return 1;
238
0
}
239
240
int WPACKET_close(WPACKET *pkt)
241
1.18M
{
242
    /*
243
     * Internal API, so should not fail - but we do negative testing of this
244
     * so no assert (otherwise the tests fail)
245
     */
246
1.18M
    if (pkt->subs == NULL || pkt->subs->parent == NULL)
247
0
        return 0;
248
249
1.18M
    return wpacket_intern_close(pkt, pkt->subs, 1);
250
1.18M
}
251
252
int WPACKET_finish(WPACKET *pkt)
253
414k
{
254
414k
    int ret;
255
256
    /*
257
     * Internal API, so should not fail - but we do negative testing of this
258
     * so no assert (otherwise the tests fail)
259
     */
260
414k
    if (pkt->subs == NULL || pkt->subs->parent != NULL)
261
0
        return 0;
262
263
414k
    ret = wpacket_intern_close(pkt, pkt->subs, 1);
264
414k
    if (ret) {
265
414k
        OPENSSL_free(pkt->subs);
266
414k
        pkt->subs = NULL;
267
414k
    }
268
269
414k
    return ret;
270
414k
}
271
272
int WPACKET_start_sub_packet_len__(WPACKET *pkt, size_t lenbytes)
273
255k
{
274
255k
    WPACKET_SUB *sub;
275
255k
    unsigned char *lenchars;
276
277
    /* Internal API, so should not fail */
278
255k
    if (!ossl_assert(pkt->subs != NULL))
279
0
        return 0;
280
281
255k
    if ((sub = OPENSSL_zalloc(sizeof(*sub))) == NULL) {
282
0
        SSLerr(SSL_F_WPACKET_START_SUB_PACKET_LEN__, ERR_R_MALLOC_FAILURE);
283
0
        return 0;
284
0
    }
285
286
255k
    sub->parent = pkt->subs;
287
255k
    pkt->subs = sub;
288
255k
    sub->pwritten = pkt->written + lenbytes;
289
255k
    sub->lenbytes = lenbytes;
290
291
255k
    if (lenbytes == 0) {
292
0
        sub->packet_len = 0;
293
0
        return 1;
294
0
    }
295
296
255k
    if (!WPACKET_allocate_bytes(pkt, lenbytes, &lenchars))
297
0
        return 0;
298
    /* Convert to an offset in case the underlying BUF_MEM gets realloc'd */
299
255k
    sub->packet_len = lenchars - GETBUF(pkt);
300
301
255k
    return 1;
302
255k
}
303
304
int WPACKET_start_sub_packet(WPACKET *pkt)
305
457k
{
306
457k
    return WPACKET_start_sub_packet_len__(pkt, 0);
307
457k
}
308
309
int WPACKET_put_bytes__(WPACKET *pkt, uint64_t val, size_t size)
310
4.94M
{
311
4.94M
    unsigned char *data;
312
313
    /* Internal API, so should not fail */
314
4.94M
    if (!ossl_assert(size <= sizeof(uint64_t))
315
4.94M
            || !WPACKET_allocate_bytes(pkt, size, &data)
316
4.94M
            || !put_value(data, val, size))
317
1.99k
        return 0;
318
319
4.94M
    return 1;
320
4.94M
}
321
322
int WPACKET_set_max_size(WPACKET *pkt, size_t maxsize)
323
0
{
324
0
    WPACKET_SUB *sub;
325
0
    size_t lenbytes;
326
327
    /* Internal API, so should not fail */
328
0
    if (!ossl_assert(pkt->subs != NULL))
329
0
        return 0;
330
331
    /* Find the WPACKET_SUB for the top level */
332
0
    for (sub = pkt->subs; sub->parent != NULL; sub = sub->parent)
333
0
        continue;
334
335
0
    lenbytes = sub->lenbytes;
336
0
    if (lenbytes == 0)
337
0
        lenbytes = sizeof(pkt->maxsize);
338
339
0
    if (maxmaxsize(lenbytes) < maxsize || maxsize < pkt->written)
340
0
        return 0;
341
342
0
    pkt->maxsize = maxsize;
343
344
0
    return 1;
345
0
}
346
347
int WPACKET_memset(WPACKET *pkt, int ch, size_t len)
348
0
{
349
0
    unsigned char *dest;
350
351
0
    if (len == 0)
352
0
        return 1;
353
354
0
    if (!WPACKET_allocate_bytes(pkt, len, &dest))
355
0
        return 0;
356
357
0
    memset(dest, ch, len);
358
359
0
    return 1;
360
0
}
361
362
int WPACKET_memcpy(WPACKET *pkt, const void *src, size_t len)
363
119k
{
364
119k
    unsigned char *dest;
365
366
119k
    if (len == 0)
367
14.0k
        return 1;
368
369
105k
    if (!WPACKET_allocate_bytes(pkt, len, &dest))
370
0
        return 0;
371
372
105k
    memcpy(dest, src, len);
373
374
105k
    return 1;
375
105k
}
376
377
int WPACKET_sub_memcpy__(WPACKET *pkt, const void *src, size_t len,
378
                         size_t lenbytes)
379
129k
{
380
129k
    if (!WPACKET_start_sub_packet_len__(pkt, lenbytes)
381
129k
            || !WPACKET_memcpy(pkt, src, len)
382
129k
            || !WPACKET_close(pkt))
383
234
        return 0;
384
385
128k
    return 1;
386
129k
}
387
388
int WPACKET_get_total_written(WPACKET *pkt, size_t *written)
389
255k
{
390
    /* Internal API, so should not fail */
391
255k
    if (!ossl_assert(written != NULL))
392
0
        return 0;
393
394
255k
    *written = pkt->written;
395
396
255k
    return 1;
397
255k
}
398
399
int WPACKET_get_length(WPACKET *pkt, size_t *len)
400
492k
{
401
    /* Internal API, so should not fail */
402
492k
    if (!ossl_assert(pkt->subs != NULL && len != NULL))
403
0
        return 0;
404
405
492k
    *len = pkt->written - pkt->subs->pwritten;
406
407
492k
    return 1;
408
492k
}
409
410
unsigned char *WPACKET_get_curr(WPACKET *pkt)
411
1.81M
{
412
1.81M
    return GETBUF(pkt) + pkt->curr;
413
1.81M
}
414
415
void WPACKET_cleanup(WPACKET *pkt)
416
39.9k
{
417
39.9k
    WPACKET_SUB *sub, *parent;
418
419
42.6k
    for (sub = pkt->subs; sub != NULL; sub = parent) {
420
2.77k
        parent = sub->parent;
421
2.77k
        OPENSSL_free(sub);
422
2.77k
    }
423
39.9k
    pkt->subs = NULL;
424
39.9k
}