1*acf64401Sbeck /* $OpenBSD: bss_mem.c,v 1.22 2023/07/05 21:23:37 beck Exp $ */
25b37fcf3Sryker /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
35b37fcf3Sryker * All rights reserved.
45b37fcf3Sryker *
55b37fcf3Sryker * This package is an SSL implementation written
65b37fcf3Sryker * by Eric Young (eay@cryptsoft.com).
75b37fcf3Sryker * The implementation was written so as to conform with Netscapes SSL.
85b37fcf3Sryker *
95b37fcf3Sryker * This library is free for commercial and non-commercial use as long as
105b37fcf3Sryker * the following conditions are aheared to. The following conditions
115b37fcf3Sryker * apply to all code found in this distribution, be it the RC4, RSA,
125b37fcf3Sryker * lhash, DES, etc., code; not just the SSL code. The SSL documentation
135b37fcf3Sryker * included with this distribution is covered by the same copyright terms
145b37fcf3Sryker * except that the holder is Tim Hudson (tjh@cryptsoft.com).
155b37fcf3Sryker *
165b37fcf3Sryker * Copyright remains Eric Young's, and as such any Copyright notices in
175b37fcf3Sryker * the code are not to be removed.
185b37fcf3Sryker * If this package is used in a product, Eric Young should be given attribution
195b37fcf3Sryker * as the author of the parts of the library used.
205b37fcf3Sryker * This can be in the form of a textual message at program startup or
215b37fcf3Sryker * in documentation (online or textual) provided with the package.
225b37fcf3Sryker *
235b37fcf3Sryker * Redistribution and use in source and binary forms, with or without
245b37fcf3Sryker * modification, are permitted provided that the following conditions
255b37fcf3Sryker * are met:
265b37fcf3Sryker * 1. Redistributions of source code must retain the copyright
275b37fcf3Sryker * notice, this list of conditions and the following disclaimer.
285b37fcf3Sryker * 2. Redistributions in binary form must reproduce the above copyright
295b37fcf3Sryker * notice, this list of conditions and the following disclaimer in the
305b37fcf3Sryker * documentation and/or other materials provided with the distribution.
315b37fcf3Sryker * 3. All advertising materials mentioning features or use of this software
325b37fcf3Sryker * must display the following acknowledgement:
335b37fcf3Sryker * "This product includes cryptographic software written by
345b37fcf3Sryker * Eric Young (eay@cryptsoft.com)"
355b37fcf3Sryker * The word 'cryptographic' can be left out if the rouines from the library
365b37fcf3Sryker * being used are not cryptographic related :-).
375b37fcf3Sryker * 4. If you include any Windows specific code (or a derivative thereof) from
385b37fcf3Sryker * the apps directory (application code) you must include an acknowledgement:
395b37fcf3Sryker * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
405b37fcf3Sryker *
415b37fcf3Sryker * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
425b37fcf3Sryker * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
435b37fcf3Sryker * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
445b37fcf3Sryker * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
455b37fcf3Sryker * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
465b37fcf3Sryker * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
475b37fcf3Sryker * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
485b37fcf3Sryker * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
495b37fcf3Sryker * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
505b37fcf3Sryker * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
515b37fcf3Sryker * SUCH DAMAGE.
525b37fcf3Sryker *
535b37fcf3Sryker * The licence and distribution terms for any publically available version or
545b37fcf3Sryker * derivative of this code cannot be changed. i.e. this code cannot simply be
555b37fcf3Sryker * copied and put under another distribution licence
565b37fcf3Sryker * [including the GNU Public Licence.]
575b37fcf3Sryker */
585b37fcf3Sryker
595b37fcf3Sryker #include <errno.h>
604c6baae9Sjsing #include <limits.h>
61a8913c44Sjsing #include <stdio.h>
62a8913c44Sjsing #include <string.h>
63a8913c44Sjsing
64913ec974Sbeck #include <openssl/bio.h>
65b6ab114eSjsing #include <openssl/err.h>
66b6ab114eSjsing #include <openssl/buffer.h>
675b37fcf3Sryker
6894b1984eStb #include "bio_local.h"
6994b1984eStb
70c2d9aa03Sjsing struct bio_mem {
71c2d9aa03Sjsing BUF_MEM *buf;
72de0d09aaSjsing size_t read_offset;
73c2d9aa03Sjsing };
74c2d9aa03Sjsing
75de0d09aaSjsing static size_t
bio_mem_pending(struct bio_mem * bm)76de0d09aaSjsing bio_mem_pending(struct bio_mem *bm)
77de0d09aaSjsing {
78de0d09aaSjsing if (bm->read_offset > bm->buf->length)
79de0d09aaSjsing return 0;
80de0d09aaSjsing
81de0d09aaSjsing return bm->buf->length - bm->read_offset;
82de0d09aaSjsing }
83de0d09aaSjsing
84de0d09aaSjsing static uint8_t *
bio_mem_read_ptr(struct bio_mem * bm)85de0d09aaSjsing bio_mem_read_ptr(struct bio_mem *bm)
86de0d09aaSjsing {
87de0d09aaSjsing return &bm->buf->data[bm->read_offset];
88de0d09aaSjsing }
89de0d09aaSjsing
904c6baae9Sjsing static int mem_new(BIO *bio);
914c6baae9Sjsing static int mem_free(BIO *bio);
924c6baae9Sjsing static int mem_write(BIO *bio, const char *in, int in_len);
934c6baae9Sjsing static int mem_read(BIO *bio, char *out, int out_len);
944c6baae9Sjsing static int mem_puts(BIO *bio, const char *in);
954c6baae9Sjsing static int mem_gets(BIO *bio, char *out, int out_len);
964c6baae9Sjsing static long mem_ctrl(BIO *bio, int cmd, long arg1, void *arg2);
97c3d505beSjsing
988341b5ddStb static const BIO_METHOD mem_method = {
99e402ce74Smiod .type = BIO_TYPE_MEM,
100e402ce74Smiod .name = "memory buffer",
101e402ce74Smiod .bwrite = mem_write,
102e402ce74Smiod .bread = mem_read,
103e402ce74Smiod .bputs = mem_puts,
104e402ce74Smiod .bgets = mem_gets,
105e402ce74Smiod .ctrl = mem_ctrl,
106e402ce74Smiod .create = mem_new,
107e402ce74Smiod .destroy = mem_free
1085b37fcf3Sryker };
1095b37fcf3Sryker
1104c6baae9Sjsing /*
1114c6baae9Sjsing * bio->num is used to hold the value to return on 'empty', if it is
1124c6baae9Sjsing * 0, should_retry is not set.
1134c6baae9Sjsing */
114913ec974Sbeck
1158341b5ddStb const BIO_METHOD *
BIO_s_mem(void)116ae7f143bSderaadt BIO_s_mem(void)
1175b37fcf3Sryker {
1184c6baae9Sjsing return &mem_method;
1195b37fcf3Sryker }
120*acf64401Sbeck LCRYPTO_ALIAS(BIO_s_mem);
1215b37fcf3Sryker
122ae7f143bSderaadt BIO *
BIO_new_mem_buf(const void * buf,int buf_len)1234c6baae9Sjsing BIO_new_mem_buf(const void *buf, int buf_len)
124ba5406e9Sbeck {
125c2d9aa03Sjsing struct bio_mem *bm;
1264c6baae9Sjsing BIO *bio;
1270a5d6edeSdjm
1284c6baae9Sjsing if (buf == NULL) {
1295067ae9fSbeck BIOerror(BIO_R_NULL_PARAMETER);
130ba5406e9Sbeck return NULL;
131ba5406e9Sbeck }
1324c6baae9Sjsing if (buf_len == -1)
1334c6baae9Sjsing buf_len = strlen(buf);
1344c6baae9Sjsing if (buf_len < 0) {
1354c6baae9Sjsing BIOerror(BIO_R_INVALID_ARGUMENT);
136c3d505beSjsing return NULL;
1374c6baae9Sjsing }
1384c6baae9Sjsing
1394c6baae9Sjsing if ((bio = BIO_new(BIO_s_mem())) == NULL)
1404c6baae9Sjsing return NULL;
1414c6baae9Sjsing
142c2d9aa03Sjsing bm = bio->ptr;
143c2d9aa03Sjsing bm->buf->data = (void *)buf; /* Trust in the BIO_FLAGS_MEM_RDONLY flag. */
144c2d9aa03Sjsing bm->buf->length = buf_len;
145c2d9aa03Sjsing bm->buf->max = buf_len;
1464c6baae9Sjsing bio->flags |= BIO_FLAGS_MEM_RDONLY;
1474c6baae9Sjsing /* Since this is static data retrying will not help. */
1484c6baae9Sjsing bio->num = 0;
1494c6baae9Sjsing
1504c6baae9Sjsing return bio;
151ba5406e9Sbeck }
152*acf64401Sbeck LCRYPTO_ALIAS(BIO_new_mem_buf);
153ba5406e9Sbeck
154c3d505beSjsing static int
mem_new(BIO * bio)1554c6baae9Sjsing mem_new(BIO *bio)
1565b37fcf3Sryker {
157c2d9aa03Sjsing struct bio_mem *bm;
1585b37fcf3Sryker
159c2d9aa03Sjsing if ((bm = calloc(1, sizeof(*bm))) == NULL)
1604c6baae9Sjsing return 0;
161c2d9aa03Sjsing if ((bm->buf = BUF_MEM_new()) == NULL) {
162c2d9aa03Sjsing free(bm);
163c2d9aa03Sjsing return 0;
164c2d9aa03Sjsing }
1654c6baae9Sjsing
1664c6baae9Sjsing bio->shutdown = 1;
1674c6baae9Sjsing bio->init = 1;
1684c6baae9Sjsing bio->num = -1;
169c2d9aa03Sjsing bio->ptr = bm;
1704c6baae9Sjsing
1714c6baae9Sjsing return 1;
1725b37fcf3Sryker }
1735b37fcf3Sryker
174c3d505beSjsing static int
mem_free(BIO * bio)1754c6baae9Sjsing mem_free(BIO *bio)
1765b37fcf3Sryker {
177c2d9aa03Sjsing struct bio_mem *bm;
1784c6baae9Sjsing
1794c6baae9Sjsing if (bio == NULL)
1804c6baae9Sjsing return 0;
181c2d9aa03Sjsing if (!bio->init || bio->ptr == NULL)
1824c6baae9Sjsing return 1;
1834c6baae9Sjsing
184c2d9aa03Sjsing bm = bio->ptr;
185c2d9aa03Sjsing if (bio->shutdown) {
1864c6baae9Sjsing if (bio->flags & BIO_FLAGS_MEM_RDONLY)
187c2d9aa03Sjsing bm->buf->data = NULL;
188c2d9aa03Sjsing BUF_MEM_free(bm->buf);
189c2d9aa03Sjsing }
190c2d9aa03Sjsing free(bm);
1914c6baae9Sjsing bio->ptr = NULL;
1924c6baae9Sjsing
1934c6baae9Sjsing return 1;
1945b37fcf3Sryker }
1955b37fcf3Sryker
196c3d505beSjsing static int
mem_read(BIO * bio,char * out,int out_len)1974c6baae9Sjsing mem_read(BIO *bio, char *out, int out_len)
1985b37fcf3Sryker {
199c2d9aa03Sjsing struct bio_mem *bm = bio->ptr;
2005b37fcf3Sryker
2014c6baae9Sjsing BIO_clear_retry_flags(bio);
2024c6baae9Sjsing
2034c6baae9Sjsing if (out == NULL || out_len <= 0)
2044c6baae9Sjsing return 0;
2054c6baae9Sjsing
206de0d09aaSjsing if ((size_t)out_len > bio_mem_pending(bm))
207de0d09aaSjsing out_len = bio_mem_pending(bm);
2084c6baae9Sjsing
2094c6baae9Sjsing if (out_len == 0) {
2104c6baae9Sjsing if (bio->num != 0)
2114c6baae9Sjsing BIO_set_retry_read(bio);
2124c6baae9Sjsing return bio->num;
2135b37fcf3Sryker }
2144c6baae9Sjsing
215de0d09aaSjsing memcpy(out, bio_mem_read_ptr(bm), out_len);
216de0d09aaSjsing bm->read_offset += out_len;
217de0d09aaSjsing
2184c6baae9Sjsing return out_len;
2195b37fcf3Sryker }
2205b37fcf3Sryker
221c3d505beSjsing static int
mem_write(BIO * bio,const char * in,int in_len)2224c6baae9Sjsing mem_write(BIO *bio, const char *in, int in_len)
2235b37fcf3Sryker {
224c2d9aa03Sjsing struct bio_mem *bm = bio->ptr;
2254c6baae9Sjsing size_t buf_len;
2265b37fcf3Sryker
2274c6baae9Sjsing BIO_clear_retry_flags(bio);
2285b37fcf3Sryker
2294c6baae9Sjsing if (in == NULL || in_len <= 0)
2304c6baae9Sjsing return 0;
2314c6baae9Sjsing
2324c6baae9Sjsing if (bio->flags & BIO_FLAGS_MEM_RDONLY) {
2335067ae9fSbeck BIOerror(BIO_R_WRITE_TO_READ_ONLY_BIO);
2344c6baae9Sjsing return -1;
235ba5406e9Sbeck }
236ba5406e9Sbeck
237de0d09aaSjsing if (bm->read_offset > 4096) {
238de0d09aaSjsing memmove(bm->buf->data, bio_mem_read_ptr(bm),
239de0d09aaSjsing bio_mem_pending(bm));
240de0d09aaSjsing bm->buf->length = bio_mem_pending(bm);
241de0d09aaSjsing bm->read_offset = 0;
242de0d09aaSjsing }
243de0d09aaSjsing
2444c6baae9Sjsing /*
2454c6baae9Sjsing * Check for overflow and ensure we do not exceed an int, otherwise we
2464c6baae9Sjsing * cannot tell if BUF_MEM_grow_clean() succeeded.
2474c6baae9Sjsing */
248c2d9aa03Sjsing buf_len = bm->buf->length + in_len;
249c2d9aa03Sjsing if (buf_len < bm->buf->length || buf_len > INT_MAX)
2504c6baae9Sjsing return -1;
2514c6baae9Sjsing
252c2d9aa03Sjsing if (BUF_MEM_grow_clean(bm->buf, buf_len) != buf_len)
2534c6baae9Sjsing return -1;
2544c6baae9Sjsing
255c2d9aa03Sjsing memcpy(&bm->buf->data[buf_len - in_len], in, in_len);
2564c6baae9Sjsing
2574c6baae9Sjsing return in_len;
2585b37fcf3Sryker }
2595b37fcf3Sryker
260c3d505beSjsing static long
mem_ctrl(BIO * bio,int cmd,long num,void * ptr)2614c6baae9Sjsing mem_ctrl(BIO *bio, int cmd, long num, void *ptr)
2625b37fcf3Sryker {
263c2d9aa03Sjsing struct bio_mem *bm = bio->ptr;
264c2d9aa03Sjsing void **pptr;
2655b37fcf3Sryker long ret = 1;
2665b37fcf3Sryker
267c3d505beSjsing switch (cmd) {
2685b37fcf3Sryker case BIO_CTRL_RESET:
269c2d9aa03Sjsing if (bm->buf->data != NULL) {
270de0d09aaSjsing if (!(bio->flags & BIO_FLAGS_MEM_RDONLY)) {
271c2d9aa03Sjsing memset(bm->buf->data, 0, bm->buf->max);
272c2d9aa03Sjsing bm->buf->length = 0;
273ba5406e9Sbeck }
274de0d09aaSjsing bm->read_offset = 0;
275ba5406e9Sbeck }
2765b37fcf3Sryker break;
2775b37fcf3Sryker case BIO_CTRL_EOF:
278de0d09aaSjsing ret = (long)(bio_mem_pending(bm) == 0);
2795b37fcf3Sryker break;
280913ec974Sbeck case BIO_C_SET_BUF_MEM_EOF_RETURN:
2814c6baae9Sjsing bio->num = (int)num;
282913ec974Sbeck break;
2835b37fcf3Sryker case BIO_CTRL_INFO:
284c3d505beSjsing if (ptr != NULL) {
285c2d9aa03Sjsing pptr = (void **)ptr;
286de0d09aaSjsing *pptr = bio_mem_read_ptr(bm);
2875b37fcf3Sryker }
288de0d09aaSjsing ret = (long)bio_mem_pending(bm);
2895b37fcf3Sryker break;
2905b37fcf3Sryker case BIO_C_SET_BUF_MEM:
291c2d9aa03Sjsing BUF_MEM_free(bm->buf);
2924c6baae9Sjsing bio->shutdown = (int)num;
293c2d9aa03Sjsing bm->buf = ptr;
294de0d09aaSjsing bm->read_offset = 0;
2955b37fcf3Sryker break;
2965b37fcf3Sryker case BIO_C_GET_BUF_MEM_PTR:
297c3d505beSjsing if (ptr != NULL) {
298c2d9aa03Sjsing pptr = (void **)ptr;
299c2d9aa03Sjsing *pptr = bm->buf;
3005b37fcf3Sryker }
3015b37fcf3Sryker break;
3025b37fcf3Sryker case BIO_CTRL_GET_CLOSE:
3034c6baae9Sjsing ret = (long)bio->shutdown;
3045b37fcf3Sryker break;
3055b37fcf3Sryker case BIO_CTRL_SET_CLOSE:
3064c6baae9Sjsing bio->shutdown = (int)num;
3075b37fcf3Sryker break;
3085b37fcf3Sryker case BIO_CTRL_WPENDING:
3095b37fcf3Sryker ret = 0L;
3105b37fcf3Sryker break;
3115b37fcf3Sryker case BIO_CTRL_PENDING:
312de0d09aaSjsing ret = (long)bio_mem_pending(bm);
3135b37fcf3Sryker break;
3145b37fcf3Sryker case BIO_CTRL_DUP:
3155b37fcf3Sryker case BIO_CTRL_FLUSH:
3165b37fcf3Sryker ret = 1;
3175b37fcf3Sryker break;
3185b37fcf3Sryker case BIO_CTRL_PUSH:
3195b37fcf3Sryker case BIO_CTRL_POP:
3205b37fcf3Sryker default:
3215b37fcf3Sryker ret = 0;
3225b37fcf3Sryker break;
3235b37fcf3Sryker }
3244c6baae9Sjsing return ret;
3255b37fcf3Sryker }
3265b37fcf3Sryker
327c3d505beSjsing static int
mem_gets(BIO * bio,char * out,int out_len)3284c6baae9Sjsing mem_gets(BIO *bio, char *out, int out_len)
3295b37fcf3Sryker {
330c2d9aa03Sjsing struct bio_mem *bm = bio->ptr;
3314c6baae9Sjsing int i, out_max;
3325b37fcf3Sryker char *p;
3334c6baae9Sjsing int ret = -1;
3345b37fcf3Sryker
3354c6baae9Sjsing BIO_clear_retry_flags(bio);
3364c6baae9Sjsing
337de0d09aaSjsing out_max = bio_mem_pending(bm);
3384c6baae9Sjsing if (out_len - 1 < out_max)
3394c6baae9Sjsing out_max = out_len - 1;
3404c6baae9Sjsing if (out_max <= 0) {
3414c6baae9Sjsing *out = '\0';
342767fe2ffSmarkus return 0;
343767fe2ffSmarkus }
3444c6baae9Sjsing
345de0d09aaSjsing p = bio_mem_read_ptr(bm);
3464c6baae9Sjsing for (i = 0; i < out_max; i++) {
347c3d505beSjsing if (p[i] == '\n') {
3485b37fcf3Sryker i++;
34950c17820Sdjm break;
35050c17820Sdjm }
35150c17820Sdjm }
35250c17820Sdjm
35350c17820Sdjm /*
3544c6baae9Sjsing * i is now the max num of bytes to copy, either out_max or up to and
3554c6baae9Sjsing * including the first newline
35650c17820Sdjm */
3574c6baae9Sjsing if ((ret = mem_read(bio, out, i)) > 0)
3584c6baae9Sjsing out[ret] = '\0';
35950c17820Sdjm
3604c6baae9Sjsing return ret;
3615b37fcf3Sryker }
3625b37fcf3Sryker
363c3d505beSjsing static int
mem_puts(BIO * bio,const char * in)3644c6baae9Sjsing mem_puts(BIO *bio, const char *in)
3655b37fcf3Sryker {
3664c6baae9Sjsing return mem_write(bio, in, strlen(in));
3675b37fcf3Sryker }
368