freebsd-nq/crypto/openssh/bufaux.c

244 lines
6.4 KiB
C
Raw Normal View History

2000-02-24 14:29:47 +00:00
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
* Auxiliary functions for storing and retrieving various data types to/from
* Buffers.
*
* As far as I am concerned, the code I have written for this software
* can be used freely for any purpose. Any derived versions of this
* software must be clearly marked as such, and if the derived work is
* incompatible with the protocol description in the RFC file, it must be
* called by a name other than "ssh" or "Secure Shell".
*
*
* SSH2 packet format added by Markus Friedl
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2000-02-24 14:29:47 +00:00
*/
#include "includes.h"
2002-03-18 10:09:43 +00:00
RCSID("$OpenBSD: bufaux.c,v 1.22 2002/01/18 18:14:17 stevesk Exp $");
RCSID("$FreeBSD$");
2000-02-24 14:29:47 +00:00
#include <openssl/bn.h>
2000-02-24 14:29:47 +00:00
#include "bufaux.h"
#include "xmalloc.h"
#include "getput.h"
2001-05-04 04:14:23 +00:00
#include "log.h"
2000-02-24 14:29:47 +00:00
/*
* Stores an BIGNUM in the buffer with a 2-byte msb first bit count, followed
* by (bits+7)/8 bytes of binary data, msb first.
*/
void
buffer_put_bignum(Buffer *buffer, BIGNUM *value)
{
int bits = BN_num_bits(value);
int bin_size = (bits + 7) / 8;
2001-05-04 04:14:23 +00:00
u_char *buf = xmalloc(bin_size);
2000-02-24 14:29:47 +00:00
int oi;
char msg[2];
/* Get the value of in binary */
oi = BN_bn2bin(value, buf);
if (oi != bin_size)
fatal("buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d",
2002-03-18 10:09:43 +00:00
oi, bin_size);
2000-02-24 14:29:47 +00:00
/* Store the number of bits in the buffer in two bytes, msb first. */
PUT_16BIT(msg, bits);
buffer_append(buffer, msg, 2);
/* Store the binary data. */
2000-03-26 07:37:48 +00:00
buffer_append(buffer, (char *)buf, oi);
2000-02-24 14:29:47 +00:00
memset(buf, 0, bin_size);
xfree(buf);
}
/*
* Retrieves an BIGNUM from the buffer.
*/
2002-03-18 10:09:43 +00:00
void
2000-02-24 14:29:47 +00:00
buffer_get_bignum(Buffer *buffer, BIGNUM *value)
{
int bits, bytes;
2001-05-04 04:14:23 +00:00
u_char buf[2], *bin;
2000-02-24 14:29:47 +00:00
/* Get the number for bits. */
buffer_get(buffer, (char *) buf, 2);
bits = GET_16BIT(buf);
/* Compute the number of binary bytes that follow. */
bytes = (bits + 7) / 8;
if (buffer_len(buffer) < bytes)
fatal("buffer_get_bignum: input buffer too small");
2002-03-18 10:09:43 +00:00
bin = buffer_ptr(buffer);
2000-02-24 14:29:47 +00:00
BN_bin2bn(bin, bytes, value);
buffer_consume(buffer, bytes);
}
/*
* Stores an BIGNUM in the buffer in SSH2 format.
*/
void
buffer_put_bignum2(Buffer *buffer, BIGNUM *value)
{
int bytes = BN_num_bytes(value) + 1;
2001-05-04 04:14:23 +00:00
u_char *buf = xmalloc(bytes);
int oi;
int hasnohigh = 0;
buf[0] = '\0';
/* Get the value of in binary */
oi = BN_bn2bin(value, buf+1);
if (oi != bytes-1)
fatal("buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d",
2002-03-18 10:09:43 +00:00
oi, bytes);
hasnohigh = (buf[1] & 0x80) ? 0 : 1;
if (value->neg) {
/**XXX should be two's-complement */
int i, carry;
2001-05-04 04:14:23 +00:00
u_char *uc = buf;
log("negativ!");
2002-03-18 10:09:43 +00:00
for (i = bytes-1, carry = 1; i>=0; i--) {
uc[i] ^= 0xff;
2002-03-18 10:09:43 +00:00
if (carry)
carry = !++uc[i];
}
}
buffer_put_string(buffer, buf+hasnohigh, bytes-hasnohigh);
memset(buf, 0, bytes);
xfree(buf);
}
2002-03-18 10:09:43 +00:00
void
buffer_get_bignum2(Buffer *buffer, BIGNUM *value)
{
/**XXX should be two's-complement */
int len;
2002-03-18 10:09:43 +00:00
u_char *bin = buffer_get_string(buffer, (u_int *)&len);
BN_bin2bn(bin, len, value);
xfree(bin);
}
2000-02-24 14:29:47 +00:00
/*
* Returns an integer from the buffer (4 bytes, msb first).
*/
2001-05-04 04:14:23 +00:00
u_int
2000-02-24 14:29:47 +00:00
buffer_get_int(Buffer *buffer)
{
2001-05-04 04:14:23 +00:00
u_char buf[4];
2000-02-24 14:29:47 +00:00
buffer_get(buffer, (char *) buf, 4);
return GET_32BIT(buf);
}
2001-05-04 04:14:23 +00:00
u_int64_t
buffer_get_int64(Buffer *buffer)
{
u_char buf[8];
buffer_get(buffer, (char *) buf, 8);
return GET_64BIT(buf);
}
2000-02-24 14:29:47 +00:00
/*
* Stores an integer in the buffer in 4 bytes, msb first.
*/
void
2001-05-04 04:14:23 +00:00
buffer_put_int(Buffer *buffer, u_int value)
2000-02-24 14:29:47 +00:00
{
char buf[4];
PUT_32BIT(buf, value);
buffer_append(buffer, buf, 4);
}
2001-05-04 04:14:23 +00:00
void
buffer_put_int64(Buffer *buffer, u_int64_t value)
{
char buf[8];
PUT_64BIT(buf, value);
buffer_append(buffer, buf, 8);
}
2000-02-24 14:29:47 +00:00
/*
* Returns an arbitrary binary string from the buffer. The string cannot
* be longer than 256k. The returned value points to memory allocated
* with xmalloc; it is the responsibility of the calling function to free
* the data. If length_ptr is non-NULL, the length of the returned data
* will be stored there. A null character will be automatically appended
* to the returned string, and is not counted in length.
*/
2002-03-18 10:09:43 +00:00
void *
2001-05-04 04:14:23 +00:00
buffer_get_string(Buffer *buffer, u_int *length_ptr)
2000-02-24 14:29:47 +00:00
{
2001-05-04 04:14:23 +00:00
u_int len;
2002-03-18 10:09:43 +00:00
u_char *value;
2000-02-24 14:29:47 +00:00
/* Get the length. */
len = buffer_get_int(buffer);
if (len > 256 * 1024)
fatal("Received packet with bad string length %d", len);
/* Allocate space for the string. Add one byte for a null character. */
value = xmalloc(len + 1);
/* Get the string. */
buffer_get(buffer, value, len);
/* Append a null character to make processing easier. */
value[len] = 0;
/* Optionally return the length of the string. */
if (length_ptr)
*length_ptr = len;
return value;
}
/*
* Stores and arbitrary binary string in the buffer.
*/
void
2001-05-04 04:14:23 +00:00
buffer_put_string(Buffer *buffer, const void *buf, u_int len)
2000-02-24 14:29:47 +00:00
{
buffer_put_int(buffer, len);
buffer_append(buffer, buf, len);
}
void
buffer_put_cstring(Buffer *buffer, const char *s)
{
buffer_put_string(buffer, s, strlen(s));
}
2000-02-24 14:29:47 +00:00
/*
* Returns a character from the buffer (0 - 255).
*/
int
2000-02-24 14:29:47 +00:00
buffer_get_char(Buffer *buffer)
{
char ch;
buffer_get(buffer, &ch, 1);
2001-05-04 04:14:23 +00:00
return (u_char) ch;
2000-02-24 14:29:47 +00:00
}
/*
* Stores a character in the buffer.
*/
void
2000-02-24 14:29:47 +00:00
buffer_put_char(Buffer *buffer, int value)
{
char ch = value;
buffer_append(buffer, &ch, 1);
}