1 // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // https://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14
15 #include <openssl/buf.h>
16
17 #include <string.h>
18
19 #include <openssl/err.h>
20 #include <openssl/mem.h>
21
22 #include "../internal.h"
23
24
BUF_MEM_new(void)25 BUF_MEM *BUF_MEM_new(void) {
26 return reinterpret_cast<BUF_MEM *>(OPENSSL_zalloc(sizeof(BUF_MEM)));
27 }
28
BUF_MEM_free(BUF_MEM * buf)29 void BUF_MEM_free(BUF_MEM *buf) {
30 if (buf == nullptr) {
31 return;
32 }
33 OPENSSL_free(buf->data);
34 OPENSSL_free(buf);
35 }
36
BUF_MEM_reserve(BUF_MEM * buf,size_t cap)37 int BUF_MEM_reserve(BUF_MEM *buf, size_t cap) {
38 if (buf->max >= cap) {
39 return 1;
40 }
41
42 size_t n = cap + 3;
43 if (n < cap) {
44 OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
45 return 0;
46 }
47 n = n / 3;
48 size_t alloc_size = n * 4;
49 if (alloc_size / 4 != n) {
50 OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
51 return 0;
52 }
53
54 char *new_buf =
55 reinterpret_cast<char *>(OPENSSL_realloc(buf->data, alloc_size));
56 if (new_buf == NULL) {
57 return 0;
58 }
59
60 buf->data = new_buf;
61 buf->max = alloc_size;
62 return 1;
63 }
64
BUF_MEM_grow(BUF_MEM * buf,size_t len)65 size_t BUF_MEM_grow(BUF_MEM *buf, size_t len) {
66 if (!BUF_MEM_reserve(buf, len)) {
67 return 0;
68 }
69 if (buf->length < len) {
70 OPENSSL_memset(&buf->data[buf->length], 0, len - buf->length);
71 }
72 buf->length = len;
73 return len;
74 }
75
BUF_MEM_grow_clean(BUF_MEM * buf,size_t len)76 size_t BUF_MEM_grow_clean(BUF_MEM *buf, size_t len) {
77 return BUF_MEM_grow(buf, len);
78 }
79
BUF_MEM_append(BUF_MEM * buf,const void * in,size_t len)80 int BUF_MEM_append(BUF_MEM *buf, const void *in, size_t len) {
81 // Work around a C language bug. See https://crbug.com/1019588.
82 if (len == 0) {
83 return 1;
84 }
85 size_t new_len = buf->length + len;
86 if (new_len < len) {
87 OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW);
88 return 0;
89 }
90 if (!BUF_MEM_reserve(buf, new_len)) {
91 return 0;
92 }
93 OPENSSL_memcpy(buf->data + buf->length, in, len);
94 buf->length = new_len;
95 return 1;
96 }
97
BUF_strdup(const char * str)98 char *BUF_strdup(const char *str) { return OPENSSL_strdup(str); }
99
BUF_strnlen(const char * str,size_t max_len)100 size_t BUF_strnlen(const char *str, size_t max_len) {
101 return OPENSSL_strnlen(str, max_len);
102 }
103
BUF_strndup(const char * str,size_t size)104 char *BUF_strndup(const char *str, size_t size) {
105 return OPENSSL_strndup(str, size);
106 }
107
BUF_strlcpy(char * dst,const char * src,size_t dst_size)108 size_t BUF_strlcpy(char *dst, const char *src, size_t dst_size) {
109 return OPENSSL_strlcpy(dst, src, dst_size);
110 }
111
BUF_strlcat(char * dst,const char * src,size_t dst_size)112 size_t BUF_strlcat(char *dst, const char *src, size_t dst_size) {
113 return OPENSSL_strlcat(dst, src, dst_size);
114 }
115
BUF_memdup(const void * data,size_t size)116 void *BUF_memdup(const void *data, size_t size) {
117 return OPENSSL_memdup(data, size);
118 }
119