Coverage Report

Created: 2018-08-29 13:53

/src/openssl/crypto/o_str.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2003-2017 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "e_os.h"
11
#include <limits.h>
12
#include <openssl/crypto.h>
13
#include "internal/cryptlib.h"
14
#include "internal/o_str.h"
15
16
int OPENSSL_memcmp(const void *v1, const void *v2, size_t n)
17
0
{
18
0
    const unsigned char *c1 = v1, *c2 = v2;
19
0
    int ret = 0;
20
0
21
0
    while (n && (ret = *c1 - *c2) == 0)
22
0
        n--, c1++, c2++;
23
0
24
0
    return ret;
25
0
}
26
27
char *CRYPTO_strdup(const char *str, const char* file, int line)
28
0
{
29
0
    char *ret;
30
0
31
0
    if (str == NULL)
32
0
        return NULL;
33
0
    ret = CRYPTO_malloc(strlen(str) + 1, file, line);
34
0
    if (ret != NULL)
35
0
        strcpy(ret, str);
36
0
    return ret;
37
0
}
38
39
char *CRYPTO_strndup(const char *str, size_t s, const char* file, int line)
40
0
{
41
0
    size_t maxlen;
42
0
    char *ret;
43
0
44
0
    if (str == NULL)
45
0
        return NULL;
46
0
47
0
    maxlen = OPENSSL_strnlen(str, s);
48
0
49
0
    ret = CRYPTO_malloc(maxlen + 1, file, line);
50
0
    if (ret) {
51
0
        memcpy(ret, str, maxlen);
52
0
        ret[maxlen] = '\0';
53
0
    }
54
0
    return ret;
55
0
}
56
57
void *CRYPTO_memdup(const void *data, size_t siz, const char* file, int line)
58
0
{
59
0
    void *ret;
60
0
61
0
    if (data == NULL || siz >= INT_MAX)
62
0
        return NULL;
63
0
64
0
    ret = CRYPTO_malloc(siz, file, line);
65
0
    if (ret == NULL) {
66
0
        CRYPTOerr(CRYPTO_F_CRYPTO_MEMDUP, ERR_R_MALLOC_FAILURE);
67
0
        return NULL;
68
0
    }
69
0
    return memcpy(ret, data, siz);
70
0
}
71
72
size_t OPENSSL_strnlen(const char *str, size_t maxlen)
73
0
{
74
0
    const char *p;
75
0
76
0
    for (p = str; maxlen-- != 0 && *p != '\0'; ++p) ;
77
0
78
0
    return p - str;
79
0
}
80
81
size_t OPENSSL_strlcpy(char *dst, const char *src, size_t size)
82
688k
{
83
688k
    size_t l = 0;
84
6.79M
    for (; size > 1 && *src; size--) {
85
6.10M
        *dst++ = *src++;
86
6.10M
        l++;
87
6.10M
    }
88
688k
    if (size)
89
668k
        *dst = '\0';
90
688k
    return l + strlen(src);
91
688k
}
92
93
size_t OPENSSL_strlcat(char *dst, const char *src, size_t size)
94
595k
{
95
595k
    size_t l = 0;
96
5.56M
    for (; size > 0 && *dst; size--, dst++)
97
4.96M
        l++;
98
595k
    return l + OPENSSL_strlcpy(dst, src, size);
99
595k
}
100
101
int OPENSSL_hexchar2int(unsigned char c)
102
10.1k
{
103
#ifdef CHARSET_EBCDIC
104
    c = os_toebcdic[c];
105
#endif
106
107
10.1k
    switch (c) {
108
10.1k
    case '0':
109
1.28k
        return 0;
110
10.1k
    case '1':
111
137
        return 1;
112
10.1k
    case '2':
113
19
        return 2;
114
10.1k
    case '3':
115
83
        return 3;
116
10.1k
    case '4':
117
39
          return 4;
118
10.1k
    case '5':
119
24
          return 5;
120
10.1k
    case '6':
121
161
          return 6;
122
10.1k
    case '7':
123
18
          return 7;
124
10.1k
    case '8':
125
5
          return 8;
126
10.1k
    case '9':
127
29
          return 9;
128
10.1k
    case 'a': case 'A':
129
560
          return 0x0A;
130
560
    case 'b': case 'B':
131
168
          return 0x0B;
132
337
    case 'c': case 'C':
133
337
          return 0x0C;
134
2.20k
    case 'd': case 'D':
135
2.20k
          return 0x0D;
136
4.16k
    case 'e': case 'E':
137
4.16k
          return 0x0E;
138
4.16k
    case 'f': case 'F':
139
129
          return 0x0F;
140
792
    }
141
792
    return -1;
142
792
}
143
144
/*
145
 * Give a string of hex digits convert to a buffer
146
 */
147
unsigned char *OPENSSL_hexstr2buf(const char *str, long *len)
148
0
{
149
0
    unsigned char *hexbuf, *q;
150
0
    unsigned char ch, cl;
151
0
    int chi, cli;
152
0
    const unsigned char *p;
153
0
    size_t s;
154
0
155
0
    s = strlen(str);
156
0
    if ((hexbuf = OPENSSL_malloc(s >> 1)) == NULL) {
157
0
        CRYPTOerr(CRYPTO_F_OPENSSL_HEXSTR2BUF, ERR_R_MALLOC_FAILURE);
158
0
        return NULL;
159
0
    }
160
0
    for (p = (const unsigned char *)str, q = hexbuf; *p; ) {
161
0
        ch = *p++;
162
0
        if (ch == ':')
163
0
            continue;
164
0
        cl = *p++;
165
0
        if (!cl) {
166
0
            CRYPTOerr(CRYPTO_F_OPENSSL_HEXSTR2BUF,
167
0
                      CRYPTO_R_ODD_NUMBER_OF_DIGITS);
168
0
            OPENSSL_free(hexbuf);
169
0
            return NULL;
170
0
        }
171
0
        cli = OPENSSL_hexchar2int(cl);
172
0
        chi = OPENSSL_hexchar2int(ch);
173
0
        if (cli < 0 || chi < 0) {
174
0
            OPENSSL_free(hexbuf);
175
0
            CRYPTOerr(CRYPTO_F_OPENSSL_HEXSTR2BUF, CRYPTO_R_ILLEGAL_HEX_DIGIT);
176
0
            return NULL;
177
0
        }
178
0
        *q++ = (unsigned char)((chi << 4) | cli);
179
0
    }
180
0
181
0
    if (len)
182
0
        *len = q - hexbuf;
183
0
    return hexbuf;
184
0
}
185
186
/*
187
 * Given a buffer of length 'len' return a OPENSSL_malloc'ed string with its
188
 * hex representation @@@ (Contents of buffer are always kept in ASCII, also
189
 * on EBCDIC machines)
190
 */
191
char *OPENSSL_buf2hexstr(const unsigned char *buffer, long len)
192
0
{
193
0
    static const char hexdig[] = "0123456789ABCDEF";
194
0
    char *tmp, *q;
195
0
    const unsigned char *p;
196
0
    int i;
197
0
198
0
    if (len == 0)
199
0
    {
200
0
        return OPENSSL_zalloc(1);
201
0
    }
202
0
203
0
    if ((tmp = OPENSSL_malloc(len * 3)) == NULL) {
204
0
        CRYPTOerr(CRYPTO_F_OPENSSL_BUF2HEXSTR, ERR_R_MALLOC_FAILURE);
205
0
        return NULL;
206
0
    }
207
0
    q = tmp;
208
0
    for (i = 0, p = buffer; i < len; i++, p++) {
209
0
        *q++ = hexdig[(*p >> 4) & 0xf];
210
0
        *q++ = hexdig[*p & 0xf];
211
0
        *q++ = ':';
212
0
    }
213
0
    q[-1] = 0;
214
#ifdef CHARSET_EBCDIC
215
    ebcdic2ascii(tmp, tmp, q - tmp - 1);
216
#endif
217
218
0
    return tmp;
219
0
}
220
221
int openssl_strerror_r(int errnum, char *buf, size_t buflen)
222
1.01k
{
223
#if defined(_MSC_VER) && _MSC_VER>=1400
224
    return !strerror_s(buf, buflen, errnum);
225
#elif defined(_GNU_SOURCE)
226
    return strerror_r(errnum, buf, buflen) != NULL;
227
#elif (defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L) || \
228
      (defined(_XOPEN_SOURCE) && _XOPEN_SOURCE >= 600)
229
    /*
230
1.01k
     * We can use "real" strerror_r. The OpenSSL version differs in that it
231
1.01k
     * gives 1 on success and 0 on failure for consistency with other OpenSSL
232
1.01k
     * functions. Real strerror_r does it the other way around
233
1.01k
     */
234
1.01k
    return !strerror_r(errnum, buf, buflen);
235
#else
236
    char *err;
237
    /* Fall back to non-thread safe strerror()...its all we can do */
238
    if (buflen < 2)
239
        return 0;
240
    err = strerror(errnum);
241
    /* Can this ever happen? */
242
    if (err == NULL)
243
        return 0;
244
    strncpy(buf, err, buflen - 1);
245
    buf[buflen - 1] = '\0';
246
    return 1;
247
#endif
248
}