1 // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 //     https://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14 
15 #include <openssl/buf.h>
16 
17 #include <string.h>
18 
19 #include <openssl/err.h>
20 #include <openssl/mem.h>
21 
22 #include "../internal.h"
23 
24 
BUF_MEM_new(void)25 BUF_MEM *BUF_MEM_new(void) {
26   return reinterpret_cast<BUF_MEM *>(OPENSSL_zalloc(sizeof(BUF_MEM)));
27 }
28 
BUF_MEM_free(BUF_MEM * buf)29 void BUF_MEM_free(BUF_MEM *buf) {
30   if (buf == nullptr) {
31     return;
32   }
33   OPENSSL_free(buf->data);
34   OPENSSL_free(buf);
35 }
36 
BUF_MEM_reserve(BUF_MEM * buf,size_t cap)37 int BUF_MEM_reserve(BUF_MEM *buf, size_t cap) {
38   if (buf->max >= cap) {
39     return 1;
40   }
41 
42   size_t n = cap + 3;
43   if (n < cap) {
44     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
45     return 0;
46   }
47   n = n / 3;
48   size_t alloc_size = n * 4;
49   if (alloc_size / 4 != n) {
50     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
51     return 0;
52   }
53 
54   char *new_buf =
55       reinterpret_cast<char *>(OPENSSL_realloc(buf->data, alloc_size));
56   if (new_buf == NULL) {
57     return 0;
58   }
59 
60   buf->data = new_buf;
61   buf->max = alloc_size;
62   return 1;
63 }
64 
BUF_MEM_grow(BUF_MEM * buf,size_t len)65 size_t BUF_MEM_grow(BUF_MEM *buf, size_t len) {
66   if (!BUF_MEM_reserve(buf, len)) {
67     return 0;
68   }
69   if (buf->length < len) {
70     OPENSSL_memset(&buf->data[buf->length], 0, len - buf->length);
71   }
72   buf->length = len;
73   return len;
74 }
75 
BUF_MEM_grow_clean(BUF_MEM * buf,size_t len)76 size_t BUF_MEM_grow_clean(BUF_MEM *buf, size_t len) {
77   return BUF_MEM_grow(buf, len);
78 }
79 
BUF_MEM_append(BUF_MEM * buf,const void * in,size_t len)80 int BUF_MEM_append(BUF_MEM *buf, const void *in, size_t len) {
81   // Work around a C language bug. See https://crbug.com/1019588.
82   if (len == 0) {
83     return 1;
84   }
85   size_t new_len = buf->length + len;
86   if (new_len < len) {
87     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
88     return 0;
89   }
90   if (!BUF_MEM_reserve(buf, new_len)) {
91     return 0;
92   }
93   OPENSSL_memcpy(buf->data + buf->length, in, len);
94   buf->length = new_len;
95   return 1;
96 }
97 
BUF_strdup(const char * str)98 char *BUF_strdup(const char *str) { return OPENSSL_strdup(str); }
99 
BUF_strnlen(const char * str,size_t max_len)100 size_t BUF_strnlen(const char *str, size_t max_len) {
101   return OPENSSL_strnlen(str, max_len);
102 }
103 
BUF_strndup(const char * str,size_t size)104 char *BUF_strndup(const char *str, size_t size) {
105   return OPENSSL_strndup(str, size);
106 }
107 
BUF_strlcpy(char * dst,const char * src,size_t dst_size)108 size_t BUF_strlcpy(char *dst, const char *src, size_t dst_size) {
109   return OPENSSL_strlcpy(dst, src, dst_size);
110 }
111 
BUF_strlcat(char * dst,const char * src,size_t dst_size)112 size_t BUF_strlcat(char *dst, const char *src, size_t dst_size) {
113   return OPENSSL_strlcat(dst, src, dst_size);
114 }
115 
BUF_memdup(const void * data,size_t size)116 void *BUF_memdup(const void *data, size_t size) {
117   return OPENSSL_memdup(data, size);
118 }
119