mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-09 09:20:15 +01:00
1478 lines
37 KiB
C
1478 lines
37 KiB
C
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is Mozilla Communicator client code, released
|
|
* March 31, 1998.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1998-1999
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
/*
|
|
* Copyright (c) 1990 Regents of the University of Michigan.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms are permitted
|
|
* provided that this notice is preserved and that due credit is given
|
|
* to the University of Michigan at Ann Arbor. The name of the University
|
|
* may not be used to endorse or promote products derived from this
|
|
* software without specific prior written permission. This software
|
|
* is provided ``as is'' without express or implied warranty.
|
|
*/
|
|
/* io.c - ber general i/o routines */
|
|
|
|
#include "lber-int.h"
|
|
|
|
#define bergetc( sb, len ) ( sb->sb_ber.ber_end > sb->sb_ber.ber_ptr ? \
|
|
(unsigned char)*sb->sb_ber.ber_ptr++ : \
|
|
ber_filbuf( sb, len ))
|
|
|
|
# ifdef macintosh
|
|
/*
|
|
* MacTCP/OpenTransport
|
|
*/
|
|
# define read( s, b, l ) tcpread( s, 0, (unsigned char *)b, l, NULL )
|
|
# define MAX_WRITE 65535
|
|
# define BerWrite( sb, b, l ) tcpwrite( sb->sb_sd, (unsigned char *)(b), (l<MAX_WRITE)? l : MAX_WRITE )
|
|
# else /* macintosh */
|
|
# if defined(_WIN32) || defined(_WINDOWS) || defined(XP_OS2)
|
|
/*
|
|
* 32-bit Windows Socket API (under Windows NT or Windows 95)
|
|
*/
|
|
# define read( s, b, l ) recv( s, b, l, 0 )
|
|
# define BerWrite( s, b, l ) send( s->sb_sd, b, l, 0 )
|
|
# else /* _WIN32 */
|
|
/*
|
|
* everything else (Unix/BSD 4.3 socket API)
|
|
*/
|
|
# define BerWrite( sb, b, l ) write( sb->sb_sd, b, l )
|
|
# define udp_read( sb, b, l, al ) recvfrom(sb->sb_sd, (char *)b, l, 0, \
|
|
(struct sockaddr *)sb->sb_fromaddr, \
|
|
(al = sizeof(struct sockaddr), &al))
|
|
# define udp_write( sb, b, l ) sendto(sb->sb_sd, (char *)(b), l, 0, \
|
|
(struct sockaddr *)sb->sb_useaddr, sizeof(struct sockaddr))
|
|
# endif /* _WIN32 */
|
|
# endif /* macintosh */
|
|
|
|
#ifndef udp_read
|
|
#define udp_read( sb, b, l, al ) CLDAP NOT SUPPORTED
|
|
#define udp_write( sb, b, l ) CLDAP NOT SUPPORTED
|
|
#endif /* udp_read */
|
|
|
|
#define EXBUFSIZ 1024
|
|
|
|
#ifdef LDAP_DEBUG
|
|
int lber_debug;
|
|
#endif
|
|
|
|
/*
|
|
* function prototypes
|
|
*/
|
|
static void nslberi_install_compat_io_fns( Sockbuf *sb );
|
|
static int nslberi_extread_compat( int s, void *buf, int len,
|
|
struct lextiof_socket_private *arg );
|
|
static int nslberi_extwrite_compat( int s, const void *buf, int len,
|
|
struct lextiof_socket_private *arg );
|
|
static unsigned long get_tag( Sockbuf *sb, BerElement *ber);
|
|
static unsigned long get_ber_len( BerElement *ber);
|
|
static unsigned long read_len_in_ber( Sockbuf *sb, BerElement *ber);
|
|
|
|
/*
|
|
* internal global structure for memory allocation callback functions
|
|
*/
|
|
static struct lber_memalloc_fns nslberi_memalloc_fns;
|
|
|
|
|
|
/*
|
|
* buffered read from "sb".
|
|
* returns value of first character read on success and -1 on error.
|
|
*/
|
|
static int
|
|
ber_filbuf( Sockbuf *sb, long len )
|
|
{
|
|
short rc;
|
|
#ifdef CLDAP
|
|
int addrlen;
|
|
#endif /* CLDAP */
|
|
|
|
if ( sb->sb_ber.ber_buf == NULL ) {
|
|
if ( (sb->sb_ber.ber_buf = (char *)NSLBERI_MALLOC(
|
|
READBUFSIZ )) == NULL ) {
|
|
return( -1 );
|
|
}
|
|
sb->sb_ber.ber_flags &= ~LBER_FLAG_NO_FREE_BUFFER;
|
|
sb->sb_ber.ber_ptr = sb->sb_ber.ber_buf;
|
|
sb->sb_ber.ber_end = sb->sb_ber.ber_buf;
|
|
}
|
|
|
|
if ( sb->sb_naddr > 0 ) {
|
|
#ifdef CLDAP
|
|
rc = udp_read(sb, sb->sb_ber.ber_buf, READBUFSIZ, addrlen );
|
|
#ifdef LDAP_DEBUG
|
|
if ( lber_debug ) {
|
|
char msg[80];
|
|
sprintf( msg, "ber_filbuf udp_read %d bytes\n",
|
|
rc );
|
|
ber_err_print( msg );
|
|
if ( lber_debug > 1 && rc > 0 )
|
|
lber_bprint( sb->sb_ber.ber_buf, rc );
|
|
}
|
|
#endif /* LDAP_DEBUG */
|
|
#else /* CLDAP */
|
|
rc = -1;
|
|
#endif /* CLDAP */
|
|
} else {
|
|
if ( sb->sb_ext_io_fns.lbextiofn_read != NULL ) {
|
|
rc = sb->sb_ext_io_fns.lbextiofn_read(
|
|
sb->sb_sd, sb->sb_ber.ber_buf,
|
|
((sb->sb_options & LBER_SOCKBUF_OPT_NO_READ_AHEAD)
|
|
&& (len < READBUFSIZ)) ? len : READBUFSIZ,
|
|
sb->sb_ext_io_fns.lbextiofn_socket_arg );
|
|
} else {
|
|
#ifdef NSLDAPI_AVOID_OS_SOCKETS
|
|
return( -1 );
|
|
#else
|
|
rc = read( sb->sb_sd, sb->sb_ber.ber_buf,
|
|
((sb->sb_options & LBER_SOCKBUF_OPT_NO_READ_AHEAD)
|
|
&& (len < READBUFSIZ)) ? len : READBUFSIZ );
|
|
#endif
|
|
}
|
|
}
|
|
|
|
if ( rc > 0 ) {
|
|
sb->sb_ber.ber_ptr = sb->sb_ber.ber_buf + 1;
|
|
sb->sb_ber.ber_end = sb->sb_ber.ber_buf + rc;
|
|
return( (unsigned char)*sb->sb_ber.ber_buf );
|
|
}
|
|
|
|
return( -1 );
|
|
}
|
|
|
|
|
|
static long
|
|
BerRead( Sockbuf *sb, char *buf, long len )
|
|
{
|
|
int c;
|
|
long nread = 0;
|
|
|
|
while ( len > 0 ) {
|
|
if ( (c = bergetc( sb, len )) < 0 ) {
|
|
if ( nread > 0 )
|
|
break;
|
|
return( c );
|
|
}
|
|
*buf++ = c;
|
|
nread++;
|
|
len--;
|
|
}
|
|
|
|
return( nread );
|
|
}
|
|
|
|
|
|
/*
|
|
* Note: ber_read() only uses the ber_end and ber_ptr elements of ber.
|
|
* Functions like ber_get_tag(), ber_skip_tag, and ber_peek_tag() rely on
|
|
* that fact, so if this code is changed to use any additional elements of
|
|
* the ber structure, those functions will need to be changed as well.
|
|
*/
|
|
long
|
|
LDAP_CALL
|
|
ber_read( BerElement *ber, char *buf, unsigned long len )
|
|
{
|
|
unsigned long actuallen, nleft;
|
|
|
|
nleft = ber->ber_end - ber->ber_ptr;
|
|
actuallen = nleft < len ? nleft : len;
|
|
|
|
SAFEMEMCPY( buf, ber->ber_ptr, (size_t)actuallen );
|
|
|
|
ber->ber_ptr += actuallen;
|
|
|
|
return( (long)actuallen );
|
|
}
|
|
|
|
/*
|
|
* enlarge the ber buffer.
|
|
* return 0 on success, -1 on error.
|
|
*/
|
|
int
|
|
nslberi_ber_realloc( BerElement *ber, unsigned long len )
|
|
{
|
|
unsigned long need, have, total;
|
|
size_t have_bytes;
|
|
Seqorset *s;
|
|
long off;
|
|
char *oldbuf;
|
|
|
|
have_bytes = ber->ber_end - ber->ber_buf;
|
|
have = have_bytes / EXBUFSIZ;
|
|
need = (len < EXBUFSIZ ? 1 : (len + (EXBUFSIZ - 1)) / EXBUFSIZ);
|
|
total = have * EXBUFSIZ + need * EXBUFSIZ;
|
|
|
|
oldbuf = ber->ber_buf;
|
|
|
|
if (ber->ber_buf == NULL) {
|
|
if ( (ber->ber_buf = (char *)NSLBERI_MALLOC( (size_t)total ))
|
|
== NULL ) {
|
|
return( -1 );
|
|
}
|
|
ber->ber_flags &= ~LBER_FLAG_NO_FREE_BUFFER;
|
|
} else {
|
|
if ( ber->ber_flags & LBER_FLAG_NO_FREE_BUFFER ) {
|
|
/* transition to malloc'd buffer */
|
|
if ( (ber->ber_buf = (char *)NSLBERI_MALLOC(
|
|
(size_t)total )) == NULL ) {
|
|
return( -1 );
|
|
}
|
|
ber->ber_flags &= ~LBER_FLAG_NO_FREE_BUFFER;
|
|
/* copy existing data into new malloc'd buffer */
|
|
SAFEMEMCPY( ber->ber_buf, oldbuf, have_bytes );
|
|
} else {
|
|
if ( (ber->ber_buf = (char *)NSLBERI_REALLOC(
|
|
ber->ber_buf,(size_t)total )) == NULL ) {
|
|
return( -1 );
|
|
}
|
|
}
|
|
}
|
|
|
|
ber->ber_end = ber->ber_buf + total;
|
|
|
|
/*
|
|
* If the stinking thing was moved, we need to go through and
|
|
* reset all the sos and ber pointers. Offsets would've been
|
|
* a better idea... oh well.
|
|
*/
|
|
|
|
if ( ber->ber_buf != oldbuf ) {
|
|
ber->ber_ptr = ber->ber_buf + (ber->ber_ptr - oldbuf);
|
|
|
|
for ( s = ber->ber_sos; s != NULLSEQORSET; s = s->sos_next ) {
|
|
off = s->sos_first - oldbuf;
|
|
s->sos_first = ber->ber_buf + off;
|
|
|
|
off = s->sos_ptr - oldbuf;
|
|
s->sos_ptr = ber->ber_buf + off;
|
|
}
|
|
}
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* returns "len" on success and -1 on failure.
|
|
*/
|
|
long
|
|
LDAP_CALL
|
|
ber_write( BerElement *ber, char *buf, unsigned long len, int nosos )
|
|
{
|
|
if ( nosos || ber->ber_sos == NULL ) {
|
|
if ( ber->ber_ptr + len > ber->ber_end ) {
|
|
if ( nslberi_ber_realloc( ber, len ) != 0 )
|
|
return( -1 );
|
|
}
|
|
SAFEMEMCPY( ber->ber_ptr, buf, (size_t)len );
|
|
ber->ber_ptr += len;
|
|
return( len );
|
|
} else {
|
|
if ( ber->ber_sos->sos_ptr + len > ber->ber_end ) {
|
|
if ( nslberi_ber_realloc( ber, len ) != 0 )
|
|
return( -1 );
|
|
}
|
|
SAFEMEMCPY( ber->ber_sos->sos_ptr, buf, (size_t)len );
|
|
ber->ber_sos->sos_ptr += len;
|
|
ber->ber_sos->sos_clen += len;
|
|
return( len );
|
|
}
|
|
}
|
|
|
|
void
|
|
LDAP_CALL
|
|
ber_free( BerElement *ber, int freebuf )
|
|
{
|
|
if ( ber != NULL ) {
|
|
if ( freebuf &&
|
|
!(ber->ber_flags & LBER_FLAG_NO_FREE_BUFFER)) {
|
|
NSLBERI_FREE(ber->ber_buf);
|
|
}
|
|
NSLBERI_FREE( (char *) ber );
|
|
}
|
|
}
|
|
|
|
/*
|
|
* return >= 0 on success, -1 on failure.
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_flush( Sockbuf *sb, BerElement *ber, int freeit )
|
|
{
|
|
long nwritten = 0, towrite, rc;
|
|
int i = 0;
|
|
|
|
if (ber->ber_rwptr == NULL) {
|
|
ber->ber_rwptr = ber->ber_buf;
|
|
} else if (ber->ber_rwptr >= ber->ber_end) {
|
|
/* we will use the ber_rwptr to continue an exited flush,
|
|
so if rwptr is not within the buffer we return an error. */
|
|
return( -1 );
|
|
}
|
|
|
|
/* writev section - for iDAR only!!! This section ignores freeit!!! */
|
|
if (sb->sb_ext_io_fns.lbextiofn_writev != NULL) {
|
|
|
|
/* add the sizes of the different buffers to write with writev */
|
|
for (towrite = 0, i = 0; i < BER_ARRAY_QUANTITY; ++i) {
|
|
/* don't add lengths of null buffers - writev will ignore them */
|
|
if (ber->ber_struct[i].ldapiov_base) {
|
|
towrite += ber->ber_struct[i].ldapiov_len;
|
|
}
|
|
}
|
|
|
|
rc = sb->sb_ext_io_fns.lbextiofn_writev(sb->sb_sd, ber->ber_struct, BER_ARRAY_QUANTITY,
|
|
sb->sb_ext_io_fns.lbextiofn_socket_arg);
|
|
|
|
if (rc >= 0) {
|
|
/* return the number of bytes TO BE written */
|
|
return (towrite - rc);
|
|
} else {
|
|
/* otherwise it's an error */
|
|
return (rc);
|
|
}
|
|
} /* end writev section */
|
|
|
|
towrite = ber->ber_ptr - ber->ber_rwptr;
|
|
|
|
#ifdef LDAP_DEBUG
|
|
if ( lber_debug ) {
|
|
char msg[80];
|
|
sprintf( msg, "ber_flush: %ld bytes to sd %ld%s\n", towrite,
|
|
sb->sb_sd, ber->ber_rwptr != ber->ber_buf ? " (re-flush)"
|
|
: "" );
|
|
ber_err_print( msg );
|
|
if ( lber_debug > 1 )
|
|
lber_bprint( ber->ber_rwptr, towrite );
|
|
}
|
|
#endif
|
|
#if !defined(macintosh) && !defined(DOS)
|
|
if ( sb->sb_options & (LBER_SOCKBUF_OPT_TO_FILE | LBER_SOCKBUF_OPT_TO_FILE_ONLY) ) {
|
|
rc = write( sb->sb_copyfd, ber->ber_buf, towrite );
|
|
if ( sb->sb_options & LBER_SOCKBUF_OPT_TO_FILE_ONLY ) {
|
|
return( (int)rc );
|
|
}
|
|
}
|
|
#endif
|
|
|
|
nwritten = 0;
|
|
do {
|
|
if (sb->sb_naddr > 0) {
|
|
#ifdef CLDAP
|
|
rc = udp_write( sb, ber->ber_buf + nwritten,
|
|
(size_t)towrite );
|
|
#else /* CLDAP */
|
|
rc = -1;
|
|
#endif /* CLDAP */
|
|
if ( rc <= 0 )
|
|
return( -1 );
|
|
/* fake error if write was not atomic */
|
|
if (rc < towrite) {
|
|
#if !defined( macintosh ) && !defined( DOS )
|
|
errno = EMSGSIZE; /* For Win32, see portable.h */
|
|
#endif
|
|
return( -1 );
|
|
}
|
|
} else {
|
|
if ( sb->sb_ext_io_fns.lbextiofn_write != NULL ) {
|
|
if ( (rc = sb->sb_ext_io_fns.lbextiofn_write(
|
|
sb->sb_sd, ber->ber_rwptr, (size_t)towrite,
|
|
sb->sb_ext_io_fns.lbextiofn_socket_arg ))
|
|
<= 0 ) {
|
|
return( -1 );
|
|
}
|
|
} else {
|
|
#ifdef NSLDAPI_AVOID_OS_SOCKETS
|
|
return( -1 );
|
|
#else
|
|
if ( (rc = BerWrite( sb, ber->ber_rwptr,
|
|
(size_t) towrite )) <= 0 ) {
|
|
return( -1 );
|
|
}
|
|
#endif
|
|
}
|
|
}
|
|
towrite -= rc;
|
|
nwritten += rc;
|
|
ber->ber_rwptr += rc;
|
|
} while ( towrite > 0 );
|
|
|
|
if ( freeit )
|
|
ber_free( ber, 1 );
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
|
|
/* we pre-allocate a buffer to save the extra malloc later */
|
|
BerElement *
|
|
LDAP_CALL
|
|
ber_alloc_t( int options )
|
|
{
|
|
BerElement *ber;
|
|
|
|
if ( (ber = (BerElement*)NSLBERI_CALLOC( 1,
|
|
sizeof(struct berelement) + EXBUFSIZ )) == NULL ) {
|
|
return( NULL );
|
|
}
|
|
|
|
/*
|
|
* for compatibility with the C LDAP API standard, we recognize
|
|
* LBER_USE_DER as LBER_OPT_USE_DER. See lber.h for a bit more info.
|
|
*/
|
|
if ( options & LBER_USE_DER ) {
|
|
options &= ~LBER_USE_DER;
|
|
options |= LBER_OPT_USE_DER;
|
|
}
|
|
|
|
ber->ber_tag = LBER_DEFAULT;
|
|
ber->ber_options = options;
|
|
ber->ber_buf = (char*)ber + sizeof(struct berelement);
|
|
ber->ber_ptr = ber->ber_buf;
|
|
ber->ber_end = ber->ber_buf + EXBUFSIZ;
|
|
ber->ber_flags = LBER_FLAG_NO_FREE_BUFFER;
|
|
|
|
return( ber );
|
|
}
|
|
|
|
|
|
BerElement *
|
|
LDAP_CALL
|
|
ber_alloc()
|
|
{
|
|
return( ber_alloc_t( 0 ) );
|
|
}
|
|
|
|
BerElement *
|
|
LDAP_CALL
|
|
der_alloc()
|
|
{
|
|
return( ber_alloc_t( LBER_OPT_USE_DER ) );
|
|
}
|
|
|
|
BerElement *
|
|
LDAP_CALL
|
|
ber_dup( BerElement *ber )
|
|
{
|
|
BerElement *new;
|
|
|
|
if ( (new = ber_alloc()) == NULL )
|
|
return( NULL );
|
|
|
|
*new = *ber;
|
|
|
|
return( new );
|
|
}
|
|
|
|
|
|
void
|
|
LDAP_CALL
|
|
ber_init_w_nullchar( BerElement *ber, int options )
|
|
{
|
|
(void) memset( (char *)ber, '\0', sizeof(struct berelement) );
|
|
ber->ber_tag = LBER_DEFAULT;
|
|
|
|
/*
|
|
* For compatibility with the C LDAP API standard, we recognize
|
|
* LBER_USE_DER as LBER_OPT_USE_DER. See lber.h for a bit more info.
|
|
*/
|
|
if ( options & LBER_USE_DER ) {
|
|
options &= ~LBER_USE_DER;
|
|
options |= LBER_OPT_USE_DER;
|
|
}
|
|
|
|
ber->ber_options = options;
|
|
}
|
|
|
|
void
|
|
LDAP_CALL
|
|
ber_reset( BerElement *ber, int was_writing )
|
|
{
|
|
if ( was_writing ) {
|
|
ber->ber_end = ber->ber_ptr;
|
|
ber->ber_ptr = ber->ber_buf;
|
|
} else {
|
|
ber->ber_ptr = ber->ber_end;
|
|
}
|
|
|
|
ber->ber_rwptr = NULL;
|
|
|
|
memset(ber->ber_struct, 0, BER_CONTENTS_STRUCT_SIZE);
|
|
}
|
|
|
|
|
|
#ifdef LDAP_DEBUG
|
|
|
|
void
|
|
ber_dump( BerElement *ber, int inout )
|
|
{
|
|
char msg[128];
|
|
sprintf( msg, "ber_dump: buf 0x%lx, ptr 0x%lx, rwptr 0x%lx, end 0x%lx\n",
|
|
ber->ber_buf, ber->ber_ptr, ber->ber_rwptr, ber->ber_end );
|
|
ber_err_print( msg );
|
|
if ( inout == 1 ) {
|
|
sprintf( msg, " current len %ld, contents:\n",
|
|
ber->ber_end - ber->ber_ptr );
|
|
ber_err_print( msg );
|
|
lber_bprint( ber->ber_ptr, ber->ber_end - ber->ber_ptr );
|
|
} else {
|
|
sprintf( msg, " current len %ld, contents:\n",
|
|
ber->ber_ptr - ber->ber_buf );
|
|
ber_err_print( msg );
|
|
lber_bprint( ber->ber_buf, ber->ber_ptr - ber->ber_buf );
|
|
}
|
|
}
|
|
|
|
void
|
|
ber_sos_dump( Seqorset *sos )
|
|
{
|
|
char msg[80];
|
|
ber_err_print ( "*** sos dump ***\n" );
|
|
while ( sos != NULLSEQORSET ) {
|
|
sprintf( msg, "ber_sos_dump: clen %ld first 0x%lx ptr 0x%lx\n",
|
|
sos->sos_clen, sos->sos_first, sos->sos_ptr );
|
|
ber_err_print( msg );
|
|
sprintf( msg, " current len %ld contents:\n",
|
|
sos->sos_ptr - sos->sos_first );
|
|
ber_err_print( msg );
|
|
lber_bprint( sos->sos_first, sos->sos_ptr - sos->sos_first );
|
|
|
|
sos = sos->sos_next;
|
|
}
|
|
ber_err_print( "*** end dump ***\n" );
|
|
}
|
|
|
|
#endif
|
|
|
|
/* return the tag - LBER_DEFAULT returned means trouble
|
|
* assumes the tag is only one byte! */
|
|
static unsigned long
|
|
get_tag( Sockbuf *sb, BerElement *ber)
|
|
{
|
|
unsigned char xbyte;
|
|
|
|
if ( (BerRead( sb, (char *) &xbyte, 1 )) != 1 ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
if ( (xbyte & LBER_BIG_TAG_MASK) == LBER_BIG_TAG_MASK ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
ber->ber_tag_contents[0] = xbyte;
|
|
ber->ber_struct[BER_STRUCT_TAG].ldapiov_len = 1;
|
|
return((unsigned long)xbyte);
|
|
}
|
|
|
|
|
|
/* Error checking? */
|
|
/* Takes a ber and returns the actual length in a long */
|
|
static unsigned long
|
|
get_ber_len( BerElement *ber)
|
|
{
|
|
int noctets;
|
|
unsigned long len = 0;
|
|
char xbyte;
|
|
|
|
xbyte = ber->ber_len_contents[0];
|
|
|
|
/* long form */
|
|
if (xbyte & 0x80) {
|
|
noctets = (int) (xbyte & 0x7f);
|
|
if (noctets >= MAX_LEN_SIZE) {
|
|
return(LBER_DEFAULT);
|
|
}
|
|
memcpy((char*) &len + sizeof(unsigned long) - noctets, &ber->ber_len_contents[1], noctets);
|
|
len = LBER_NTOHL(len);
|
|
return(len);
|
|
} else {
|
|
return((unsigned long)(xbyte));
|
|
}
|
|
}
|
|
|
|
/* LBER_DEFAULT means trouble
|
|
reads in the length, stores it in ber->ber_struct, and returns get_ber_len */
|
|
static unsigned long
|
|
read_len_in_ber( Sockbuf *sb, BerElement *ber)
|
|
{
|
|
unsigned char xbyte;
|
|
int noctets;
|
|
int rc = 0;
|
|
|
|
/*
|
|
* Next, read the length. The first byte contains the length
|
|
* of the length. If bit 8 is set, the length is the long
|
|
* form, otherwise it's the short form. We don't allow a
|
|
* length that's greater than what we can hold in a long (2GB)
|
|
*/
|
|
|
|
if ( BerRead( sb, (char *) &xbyte, 1 ) != 1 ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
ber->ber_len_contents[0] = xbyte;
|
|
|
|
/* long form of the length value */
|
|
if ( xbyte & 0x80 ) {
|
|
noctets = (xbyte & 0x7f);
|
|
if ( noctets >= MAX_LEN_SIZE )
|
|
return( LBER_DEFAULT );
|
|
while (rc < noctets) {
|
|
if ( (rc += BerRead( sb, &(ber->ber_len_contents[1]) + rc, noctets - rc )) <= 0) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
}
|
|
ber->ber_struct[BER_STRUCT_LEN].ldapiov_len = 1 + noctets;
|
|
} else { /* short form of the length value */
|
|
ber->ber_struct[BER_STRUCT_LEN].ldapiov_len = 1;
|
|
}
|
|
return(get_ber_len(ber));
|
|
}
|
|
|
|
|
|
unsigned long
|
|
LDAP_CALL
|
|
ber_get_next( Sockbuf *sb, unsigned long *len, BerElement *ber )
|
|
{
|
|
unsigned long tag, toread, newlen;
|
|
long rc;
|
|
|
|
#ifdef LDAP_DEBUG
|
|
if ( lber_debug )
|
|
ber_err_print( "ber_get_next\n" );
|
|
#endif
|
|
|
|
/*
|
|
* first time through - malloc the buffer, set up ptrs, and
|
|
* read the tag and the length and as much of the rest as we can
|
|
*/
|
|
|
|
if ( ber->ber_rwptr == NULL ) {
|
|
/* read the tag */
|
|
if ((tag = get_tag(sb, ber)) == LBER_DEFAULT ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
if((sb->sb_options & LBER_SOCKBUF_OPT_VALID_TAG) &&
|
|
(tag != sb->sb_valid_tag)) {
|
|
return( LBER_DEFAULT);
|
|
}
|
|
|
|
ber->ber_tag_contents[0] = (char)tag; /* we only handle 1 byte tags */
|
|
|
|
/* read the length */
|
|
if ((newlen = read_len_in_ber(sb, ber)) == LBER_DEFAULT ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
/*
|
|
* Finally, malloc a buffer for the contents and read it in.
|
|
* It's this buffer that's passed to all the other ber decoding
|
|
* routines.
|
|
*/
|
|
|
|
#if defined( DOS ) && !( defined( _WIN32 ) || defined(XP_OS2) )
|
|
if ( newlen > 65535 ) { /* DOS can't allocate > 64K */
|
|
return( LBER_DEFAULT );
|
|
}
|
|
#endif /* DOS && !_WIN32 */
|
|
|
|
if ( ( sb->sb_options & LBER_SOCKBUF_OPT_MAX_INCOMING_SIZE )
|
|
&& newlen > sb->sb_max_incoming ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
/* check to see if we already have enough memory allocated */
|
|
if ( (ber->ber_end - ber->ber_buf) < (size_t)newlen) {
|
|
if ( (ber->ber_buf = (char *)NSLBERI_CALLOC( 1,(size_t)newlen ))
|
|
== NULL ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
ber->ber_flags &= ~LBER_FLAG_NO_FREE_BUFFER;
|
|
}
|
|
|
|
|
|
ber->ber_len = newlen;
|
|
ber->ber_ptr = ber->ber_buf;
|
|
ber->ber_end = ber->ber_buf + newlen;
|
|
ber->ber_rwptr = ber->ber_buf;
|
|
}
|
|
|
|
/* OK, we've malloc-ed the buffer; now read the rest of the expected length */
|
|
toread = (unsigned long)ber->ber_end - (unsigned long)ber->ber_rwptr;
|
|
do {
|
|
if ( (rc = BerRead( sb, ber->ber_rwptr, (long)toread )) <= 0 ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
toread -= rc;
|
|
ber->ber_rwptr += rc;
|
|
} while ( toread > 0 );
|
|
|
|
#ifdef LDAP_DEBUG
|
|
if ( lber_debug ) {
|
|
char msg[80];
|
|
sprintf( msg, "ber_get_next: tag 0x%lx len %ld contents:\n",
|
|
tag, ber->ber_len );
|
|
ber_err_print( msg );
|
|
if ( lber_debug > 1 )
|
|
ber_dump( ber, 1 );
|
|
}
|
|
#endif
|
|
|
|
ber->ber_rwptr = NULL;
|
|
*len = newlen;
|
|
ber->ber_struct[BER_STRUCT_VAL].ldapiov_len = newlen;
|
|
return(tag);
|
|
}
|
|
|
|
Sockbuf *
|
|
LDAP_CALL
|
|
ber_sockbuf_alloc()
|
|
{
|
|
return( (Sockbuf *)NSLBERI_CALLOC( 1, sizeof(struct sockbuf) ) );
|
|
}
|
|
|
|
void
|
|
LDAP_CALL
|
|
ber_sockbuf_free(Sockbuf *p)
|
|
{
|
|
if ( p != NULL ) {
|
|
if ( p->sb_ber.ber_buf != NULL &&
|
|
!(p->sb_ber.ber_flags & LBER_FLAG_NO_FREE_BUFFER) ) {
|
|
NSLBERI_FREE( p->sb_ber.ber_buf );
|
|
}
|
|
NSLBERI_FREE(p);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* return 0 on success and -1 on error
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_set_option( struct berelement *ber, int option, void *value )
|
|
{
|
|
|
|
/*
|
|
* memory allocation callbacks are global, so it is OK to pass
|
|
* NULL for ber. Handle this as a special case.
|
|
*/
|
|
if ( option == LBER_OPT_MEMALLOC_FN_PTRS ) {
|
|
/* struct copy */
|
|
nslberi_memalloc_fns = *((struct lber_memalloc_fns *)value);
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* lber_debug is global, so it is OK to pass
|
|
* NULL for ber. Handle this as a special case.
|
|
*/
|
|
if ( option == LBER_OPT_DEBUG_LEVEL ) {
|
|
#ifdef LDAP_DEBUG
|
|
lber_debug = *(int *)value;
|
|
#endif
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* all the rest require a non-NULL ber
|
|
*/
|
|
if ( !NSLBERI_VALID_BERELEMENT_POINTER( ber )) {
|
|
return( -1 );
|
|
}
|
|
|
|
switch ( option ) {
|
|
case LBER_OPT_USE_DER:
|
|
case LBER_OPT_TRANSLATE_STRINGS:
|
|
if ( value != NULL ) {
|
|
ber->ber_options |= option;
|
|
} else {
|
|
ber->ber_options &= ~option;
|
|
}
|
|
break;
|
|
case LBER_OPT_REMAINING_BYTES:
|
|
ber->ber_end = ber->ber_ptr + *((unsigned long *)value);
|
|
break;
|
|
case LBER_OPT_TOTAL_BYTES:
|
|
ber->ber_end = ber->ber_buf + *((unsigned long *)value);
|
|
break;
|
|
case LBER_OPT_BYTES_TO_WRITE:
|
|
ber->ber_ptr = ber->ber_buf + *((unsigned long *)value);
|
|
break;
|
|
default:
|
|
return( -1 );
|
|
}
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* return 0 on success and -1 on error
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_get_option( struct berelement *ber, int option, void *value )
|
|
{
|
|
/*
|
|
* memory callocation callbacks are global, so it is OK to pass
|
|
* NULL for ber. Handle this as a special case
|
|
*/
|
|
if ( option == LBER_OPT_MEMALLOC_FN_PTRS ) {
|
|
/* struct copy */
|
|
*((struct lber_memalloc_fns *)value) = nslberi_memalloc_fns;
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* lber_debug is global, so it is OK to pass
|
|
* NULL for ber. Handle this as a special case.
|
|
*/
|
|
if ( option == LBER_OPT_DEBUG_LEVEL ) {
|
|
#ifdef LDAP_DEBUG
|
|
*(int *)value = lber_debug;
|
|
#endif
|
|
return( 0 );
|
|
}
|
|
/*
|
|
* all the rest require a non-NULL ber
|
|
*/
|
|
if ( !NSLBERI_VALID_BERELEMENT_POINTER( ber )) {
|
|
return( -1 );
|
|
}
|
|
|
|
switch ( option ) {
|
|
case LBER_OPT_USE_DER:
|
|
case LBER_OPT_TRANSLATE_STRINGS:
|
|
*((int *) value) = (ber->ber_options & option);
|
|
break;
|
|
case LBER_OPT_REMAINING_BYTES:
|
|
*((unsigned long *) value) = ber->ber_end - ber->ber_ptr;
|
|
break;
|
|
case LBER_OPT_TOTAL_BYTES:
|
|
*((unsigned long *) value) = ber->ber_end - ber->ber_buf;
|
|
break;
|
|
case LBER_OPT_BYTES_TO_WRITE:
|
|
*((unsigned long *) value) = ber->ber_ptr - ber->ber_buf;
|
|
break;
|
|
default:
|
|
return( -1 );
|
|
}
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* return 0 on success and -1 on error
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_sockbuf_set_option( Sockbuf *sb, int option, void *value )
|
|
{
|
|
struct lber_x_ext_io_fns *extiofns;
|
|
|
|
if ( !NSLBERI_VALID_SOCKBUF_POINTER( sb )) {
|
|
return( -1 );
|
|
}
|
|
|
|
switch ( option ) {
|
|
case LBER_SOCKBUF_OPT_VALID_TAG:
|
|
sb->sb_valid_tag= *((unsigned long *) value);
|
|
if ( value != NULL ) {
|
|
sb->sb_options |= option;
|
|
} else {
|
|
sb->sb_options &= ~option;
|
|
}
|
|
break;
|
|
case LBER_SOCKBUF_OPT_MAX_INCOMING_SIZE:
|
|
sb->sb_max_incoming = *((unsigned long *) value);
|
|
/* FALL */
|
|
case LBER_SOCKBUF_OPT_TO_FILE:
|
|
case LBER_SOCKBUF_OPT_TO_FILE_ONLY:
|
|
case LBER_SOCKBUF_OPT_NO_READ_AHEAD:
|
|
if ( value != NULL ) {
|
|
sb->sb_options |= option;
|
|
} else {
|
|
sb->sb_options &= ~option;
|
|
}
|
|
break;
|
|
case LBER_SOCKBUF_OPT_DESC:
|
|
sb->sb_sd = *((LBER_SOCKET *) value);
|
|
break;
|
|
case LBER_SOCKBUF_OPT_COPYDESC:
|
|
sb->sb_copyfd = *((LBER_SOCKET *) value);
|
|
break;
|
|
case LBER_SOCKBUF_OPT_READ_FN:
|
|
sb->sb_io_fns.lbiof_read = (LDAP_IOF_READ_CALLBACK *) value;
|
|
nslberi_install_compat_io_fns( sb );
|
|
break;
|
|
case LBER_SOCKBUF_OPT_WRITE_FN:
|
|
sb->sb_io_fns.lbiof_write = (LDAP_IOF_WRITE_CALLBACK *) value;
|
|
nslberi_install_compat_io_fns( sb );
|
|
break;
|
|
case LBER_SOCKBUF_OPT_EXT_IO_FNS:
|
|
extiofns = (struct lber_x_ext_io_fns *) value;
|
|
if ( extiofns == NULL ) { /* remove */
|
|
(void)memset( (char *)&sb->sb_ext_io_fns, '\0',
|
|
sizeof(sb->sb_ext_io_fns ));
|
|
} else if ( extiofns->lbextiofn_size
|
|
== LBER_X_EXTIO_FNS_SIZE ) {
|
|
/* struct copy */
|
|
sb->sb_ext_io_fns = *extiofns;
|
|
} else if ( extiofns->lbextiofn_size
|
|
== LBER_X_EXTIO_FNS_SIZE_REV0 ) {
|
|
/* backwards compatiblity for older struct */
|
|
sb->sb_ext_io_fns.lbextiofn_size =
|
|
LBER_X_EXTIO_FNS_SIZE;
|
|
sb->sb_ext_io_fns.lbextiofn_read =
|
|
extiofns->lbextiofn_read;
|
|
sb->sb_ext_io_fns.lbextiofn_write =
|
|
extiofns->lbextiofn_write;
|
|
sb->sb_ext_io_fns.lbextiofn_writev = NULL;
|
|
sb->sb_ext_io_fns.lbextiofn_socket_arg =
|
|
extiofns->lbextiofn_socket_arg;
|
|
} else {
|
|
return( -1 );
|
|
}
|
|
break;
|
|
default:
|
|
return( -1 );
|
|
}
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
/*
|
|
* return 0 on success and -1 on error
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_sockbuf_get_option( Sockbuf *sb, int option, void *value )
|
|
{
|
|
struct lber_x_ext_io_fns *extiofns;
|
|
|
|
if ( !NSLBERI_VALID_SOCKBUF_POINTER( sb )) {
|
|
return( -1 );
|
|
}
|
|
|
|
switch ( option ) {
|
|
case LBER_SOCKBUF_OPT_VALID_TAG:
|
|
*((unsigned long *) value) = sb->sb_valid_tag;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_MAX_INCOMING_SIZE:
|
|
*((unsigned long *) value) = sb->sb_max_incoming;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_TO_FILE:
|
|
case LBER_SOCKBUF_OPT_TO_FILE_ONLY:
|
|
case LBER_SOCKBUF_OPT_NO_READ_AHEAD:
|
|
*((int *) value) = (sb->sb_options & option);
|
|
break;
|
|
case LBER_SOCKBUF_OPT_DESC:
|
|
*((LBER_SOCKET *) value) = sb->sb_sd;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_COPYDESC:
|
|
*((LBER_SOCKET *) value) = sb->sb_copyfd;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_READ_FN:
|
|
*((LDAP_IOF_READ_CALLBACK **) value)
|
|
= sb->sb_io_fns.lbiof_read;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_WRITE_FN:
|
|
*((LDAP_IOF_WRITE_CALLBACK **) value)
|
|
= sb->sb_io_fns.lbiof_write;
|
|
break;
|
|
case LBER_SOCKBUF_OPT_EXT_IO_FNS:
|
|
extiofns = (struct lber_x_ext_io_fns *) value;
|
|
if ( extiofns == NULL ) {
|
|
return( -1 );
|
|
} else if ( extiofns->lbextiofn_size
|
|
== LBER_X_EXTIO_FNS_SIZE ) {
|
|
/* struct copy */
|
|
*extiofns = sb->sb_ext_io_fns;
|
|
} else if ( extiofns->lbextiofn_size
|
|
== LBER_X_EXTIO_FNS_SIZE_REV0 ) {
|
|
/* backwards compatiblity for older struct */
|
|
extiofns->lbextiofn_read = sb->sb_ext_io_fns.lbextiofn_read;
|
|
extiofns->lbextiofn_write = sb->sb_ext_io_fns.lbextiofn_write;
|
|
extiofns->lbextiofn_socket_arg = sb->sb_ext_io_fns.lbextiofn_socket_arg;
|
|
} else {
|
|
return( -1 );
|
|
}
|
|
break;
|
|
default:
|
|
return( -1 );
|
|
}
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
|
|
/* new dboreham code below: */
|
|
|
|
struct byte_buffer {
|
|
unsigned char *p;
|
|
int offset;
|
|
int length;
|
|
};
|
|
typedef struct byte_buffer byte_buffer;
|
|
|
|
|
|
/* This call allocates us a BerElement structure plus some extra memory.
|
|
* It returns a pointer to the BerElement, plus a pointer to the extra memory.
|
|
* This routine also allocates a ber data buffer within the same block, thus
|
|
* saving a call to calloc later when we read data.
|
|
*/
|
|
void*
|
|
LDAP_CALL
|
|
ber_special_alloc(size_t size, BerElement **ppBer)
|
|
{
|
|
char *mem = NULL;
|
|
|
|
/* Make sure mem size requested is aligned */
|
|
if (0 != ( size & 0x03 )) {
|
|
size += (sizeof(long) - (size & 0x03));
|
|
}
|
|
|
|
mem = NSLBERI_MALLOC(sizeof(struct berelement) + EXBUFSIZ + size );
|
|
if (NULL == mem) {
|
|
return NULL;
|
|
}
|
|
*ppBer = (BerElement*) (mem + size);
|
|
memset(*ppBer,0,sizeof(struct berelement));
|
|
(*ppBer)->ber_tag = LBER_DEFAULT;
|
|
(*ppBer)->ber_buf = mem + size + sizeof(struct berelement);
|
|
(*ppBer)->ber_ptr = (*ppBer)->ber_buf;
|
|
(*ppBer)->ber_end = (*ppBer)->ber_buf + EXBUFSIZ;
|
|
(*ppBer)->ber_flags = LBER_FLAG_NO_FREE_BUFFER;
|
|
return (void*)mem;
|
|
}
|
|
|
|
void
|
|
LDAP_CALL
|
|
ber_special_free(void* buf, BerElement *ber)
|
|
{
|
|
if (!(ber->ber_flags & LBER_FLAG_NO_FREE_BUFFER)) {
|
|
NSLBERI_FREE(ber->ber_buf);
|
|
}
|
|
NSLBERI_FREE( buf );
|
|
}
|
|
|
|
static int
|
|
read_bytes(byte_buffer *b, unsigned char *return_buffer, int bytes_to_read)
|
|
{
|
|
/* copy up to bytes_to_read bytes into the caller's buffer, return the number of bytes copied */
|
|
int bytes_to_copy = 0;
|
|
|
|
if (bytes_to_read <= (b->length - b->offset) ) {
|
|
bytes_to_copy = bytes_to_read;
|
|
} else {
|
|
bytes_to_copy = (b->length - b->offset);
|
|
}
|
|
if (1 == bytes_to_copy) {
|
|
*return_buffer = *(b->p+b->offset++);
|
|
} else
|
|
if (0 == bytes_to_copy) {
|
|
;
|
|
} else
|
|
{
|
|
memcpy(return_buffer,b->p+b->offset,bytes_to_copy);
|
|
b->offset += bytes_to_copy;
|
|
}
|
|
return bytes_to_copy;
|
|
}
|
|
|
|
/* return the tag - LBER_DEFAULT returned means trouble */
|
|
static unsigned long
|
|
get_buffer_tag(byte_buffer *sb )
|
|
{
|
|
unsigned char xbyte;
|
|
unsigned long tag;
|
|
char *tagp;
|
|
int i;
|
|
|
|
if ( (i = read_bytes( sb, &xbyte, 1 )) != 1 ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
if ( (xbyte & LBER_BIG_TAG_MASK) != LBER_BIG_TAG_MASK ) {
|
|
return( (unsigned long) xbyte );
|
|
}
|
|
|
|
tagp = (char *) &tag;
|
|
tagp[0] = xbyte;
|
|
for ( i = 1; i < sizeof(long); i++ ) {
|
|
if ( read_bytes( sb, &xbyte, 1 ) != 1 )
|
|
return( LBER_DEFAULT );
|
|
|
|
tagp[i] = xbyte;
|
|
|
|
if ( ! (xbyte & LBER_MORE_TAG_MASK) )
|
|
break;
|
|
}
|
|
|
|
/* tag too big! */
|
|
if ( i == sizeof(long) )
|
|
return( LBER_DEFAULT );
|
|
|
|
/* want leading, not trailing 0's */
|
|
return( tag >> (sizeof(long) - i - 1) );
|
|
}
|
|
|
|
/* Like ber_get_next, but from a byte buffer the caller already has. */
|
|
/* Bytes_Scanned returns the number of bytes we actually looked at in the buffer. */
|
|
/* ber_get_next_buffer is now implemented in terms of ber_get_next_buffer_ext */
|
|
/* and is here for backward compatibility. This new function allows us to pass */
|
|
/* the Sockbuf structure along */
|
|
|
|
unsigned long
|
|
LDAP_CALL
|
|
ber_get_next_buffer( void *buffer, size_t buffer_size, unsigned long *len,
|
|
BerElement *ber, unsigned long *Bytes_Scanned )
|
|
{
|
|
return (ber_get_next_buffer_ext( buffer, buffer_size, len, ber,
|
|
Bytes_Scanned, NULL));
|
|
}
|
|
|
|
unsigned long
|
|
LDAP_CALL
|
|
ber_get_next_buffer_ext( void *buffer, size_t buffer_size, unsigned long *len,
|
|
BerElement *ber, unsigned long *Bytes_Scanned, Sockbuf *sock )
|
|
{
|
|
unsigned long tag = 0, netlen, toread;
|
|
unsigned char lc;
|
|
long rc;
|
|
int noctets, diff;
|
|
byte_buffer sb = {0};
|
|
|
|
|
|
/*
|
|
* Any ber element looks like this: tag length contents.
|
|
* Assuming everything's ok, we return the tag byte (we
|
|
* can assume a single byte), return the length in len,
|
|
* and the rest of the undecoded element in buf.
|
|
*
|
|
* Assumptions:
|
|
* 1) small tags (less than 128)
|
|
* 2) definite lengths
|
|
* 3) primitive encodings used whenever possible
|
|
*/
|
|
|
|
/*
|
|
* first time through - malloc the buffer, set up ptrs, and
|
|
* read the tag and the length and as much of the rest as we can
|
|
*/
|
|
|
|
sb.p = buffer;
|
|
sb.length = buffer_size;
|
|
|
|
if ( ber->ber_rwptr == NULL ) {
|
|
/*
|
|
* First, we read the tag.
|
|
*/
|
|
|
|
/* if we have been called before with a fragment not
|
|
* containing a comlete length, we have no rwptr but
|
|
* a tag already
|
|
*/
|
|
if ( ber->ber_tag == LBER_DEFAULT ) {
|
|
if ( (tag = get_buffer_tag( &sb )) == LBER_DEFAULT ) {
|
|
goto premature_exit;
|
|
}
|
|
ber->ber_tag = tag;
|
|
}
|
|
|
|
if((sock->sb_options & LBER_SOCKBUF_OPT_VALID_TAG) &&
|
|
(tag != sock->sb_valid_tag)) {
|
|
*Bytes_Scanned=0;
|
|
return( LBER_DEFAULT);
|
|
}
|
|
|
|
/*
|
|
* Next, read the length. The first byte contains the length
|
|
* of the length. If bit 8 is set, the length is the long
|
|
* form, otherwise it's the short form. We don't allow a
|
|
* length that's greater than what we can hold in an unsigned
|
|
* long.
|
|
*/
|
|
|
|
/* if the length is in long form and we don't get it in one
|
|
* fragment, we should handle this (TBD).
|
|
*/
|
|
|
|
*len = netlen = 0;
|
|
if ( read_bytes( &sb, &lc, 1 ) != 1 ) {
|
|
goto premature_exit;
|
|
}
|
|
if ( lc & 0x80 ) {
|
|
noctets = (lc & 0x7f);
|
|
if ( noctets > sizeof(unsigned long) )
|
|
goto premature_exit;
|
|
diff = sizeof(unsigned long) - noctets;
|
|
if ( read_bytes( &sb, (unsigned char *)&netlen + diff,
|
|
noctets ) != noctets ) {
|
|
goto premature_exit;
|
|
}
|
|
*len = LBER_NTOHL( netlen );
|
|
} else {
|
|
*len = lc;
|
|
}
|
|
ber->ber_len = *len;
|
|
|
|
/*
|
|
* Finally, malloc a buffer for the contents and read it in.
|
|
* It's this buffer that's passed to all the other ber decoding
|
|
* routines.
|
|
*/
|
|
|
|
#if defined( DOS ) && !defined( _WIN32 )
|
|
if ( *len > 65535 ) { /* DOS can't allocate > 64K */
|
|
goto premature_exit;
|
|
}
|
|
#endif /* DOS && !_WIN32 */
|
|
|
|
if ( (sock != NULL) &&
|
|
( sock->sb_options & LBER_SOCKBUF_OPT_MAX_INCOMING_SIZE )
|
|
&& (*len > sock->sb_max_incoming) ) {
|
|
return( LBER_DEFAULT );
|
|
}
|
|
|
|
if ( ber->ber_buf + *len > ber->ber_end ) {
|
|
if ( nslberi_ber_realloc( ber, *len ) != 0 )
|
|
goto premature_exit;
|
|
}
|
|
ber->ber_ptr = ber->ber_buf;
|
|
ber->ber_end = ber->ber_buf + *len;
|
|
ber->ber_rwptr = ber->ber_buf;
|
|
}
|
|
|
|
toread = (unsigned long)ber->ber_end - (unsigned long)ber->ber_rwptr;
|
|
do {
|
|
if ( (rc = read_bytes( &sb, (unsigned char *)ber->ber_rwptr,
|
|
(long)toread )) <= 0 ) {
|
|
goto premature_exit;
|
|
}
|
|
|
|
toread -= rc;
|
|
ber->ber_rwptr += rc;
|
|
} while ( toread > 0 );
|
|
|
|
*len = ber->ber_len;
|
|
*Bytes_Scanned = sb.offset;
|
|
return( ber->ber_tag );
|
|
|
|
premature_exit:
|
|
/*
|
|
* we're here because we hit the end of the buffer before seeing
|
|
* all of the PDU
|
|
*/
|
|
*Bytes_Scanned = sb.offset;
|
|
return(LBER_DEFAULT);
|
|
}
|
|
|
|
|
|
/* The ber_flatten routine allocates a struct berval whose contents
|
|
* are a BER encoding taken from the ber argument. The bvPtr pointer
|
|
* points to the returned berval, which must be freed using
|
|
* ber_bvfree(). This routine returns 0 on success and -1 on error.
|
|
* The use of ber_flatten on a BerElement in which all '{' and '}'
|
|
* format modifiers have not been properly matched can result in a
|
|
* berval whose contents are not a valid BER encoding.
|
|
* Note that the ber_ptr is not modified.
|
|
*/
|
|
int
|
|
LDAP_CALL
|
|
ber_flatten( BerElement *ber, struct berval **bvPtr )
|
|
{
|
|
struct berval *new;
|
|
unsigned long len;
|
|
|
|
/* allocate a struct berval */
|
|
if ( (new = (struct berval *)NSLBERI_MALLOC( sizeof(struct berval) ))
|
|
== NULL ) {
|
|
return( -1 );
|
|
}
|
|
|
|
/*
|
|
* Copy everything from the BerElement's ber_buf to ber_ptr
|
|
* into the berval structure.
|
|
*/
|
|
if ( ber == NULL ) {
|
|
new->bv_val = NULL;
|
|
new->bv_len = 0;
|
|
} else {
|
|
len = ber->ber_ptr - ber->ber_buf;
|
|
if ( ( new->bv_val = (char *)NSLBERI_MALLOC( len + 1 )) == NULL ) {
|
|
ber_bvfree( new );
|
|
return( -1 );
|
|
}
|
|
SAFEMEMCPY( new->bv_val, ber->ber_buf, (size_t)len );
|
|
new->bv_val[len] = '\0';
|
|
new->bv_len = len;
|
|
}
|
|
|
|
/* set bvPtr pointer to point to the returned berval */
|
|
*bvPtr = new;
|
|
|
|
return( 0 );
|
|
}
|
|
|
|
|
|
/*
|
|
* The ber_init function constructs and returns a new BerElement
|
|
* containing a copy of the data in the bv argument. ber_init
|
|
* returns the null pointer on error.
|
|
*/
|
|
BerElement *
|
|
LDAP_CALL
|
|
ber_init( const struct berval *bv )
|
|
{
|
|
BerElement *ber;
|
|
|
|
/* construct BerElement */
|
|
if (( ber = ber_alloc_t( 0 )) != NULLBER ) {
|
|
/* copy data from the bv argument into BerElement */
|
|
/* XXXmcs: had to cast unsigned long bv_len to long */
|
|
if ( (ber_write ( ber, bv->bv_val, bv->bv_len, 0 ))
|
|
!= (long)bv->bv_len ) {
|
|
ber_free( ber, 1 );
|
|
return( NULL );
|
|
}
|
|
}
|
|
|
|
/*
|
|
* reset ber_ptr back to the beginning of buffer so that this new
|
|
* and initialized ber element can be READ
|
|
*/
|
|
ber_reset( ber, 1);
|
|
|
|
/*
|
|
* return a ptr to a new BerElement containing a copy of the data
|
|
* in the bv argument or a null pointer on error
|
|
*/
|
|
return( ber );
|
|
}
|
|
|
|
|
|
/*
|
|
* memory allocation functions.
|
|
*/
|
|
void *
|
|
nslberi_malloc( size_t size )
|
|
{
|
|
return( nslberi_memalloc_fns.lbermem_malloc == NULL ?
|
|
malloc( size ) :
|
|
nslberi_memalloc_fns.lbermem_malloc( size ));
|
|
}
|
|
|
|
|
|
void *
|
|
nslberi_calloc( size_t nelem, size_t elsize )
|
|
{
|
|
return( nslberi_memalloc_fns.lbermem_calloc == NULL ?
|
|
calloc( nelem, elsize ) :
|
|
nslberi_memalloc_fns.lbermem_calloc( nelem, elsize ));
|
|
}
|
|
|
|
|
|
void *
|
|
nslberi_realloc( void *ptr, size_t size )
|
|
{
|
|
return( nslberi_memalloc_fns.lbermem_realloc == NULL ?
|
|
realloc( ptr, size ) :
|
|
nslberi_memalloc_fns.lbermem_realloc( ptr, size ));
|
|
}
|
|
|
|
|
|
void
|
|
nslberi_free( void *ptr )
|
|
{
|
|
if ( nslberi_memalloc_fns.lbermem_free == NULL ) {
|
|
free( ptr );
|
|
} else {
|
|
nslberi_memalloc_fns.lbermem_free( ptr );
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
******************************************************************************
|
|
* functions to bridge the gap between new extended I/O functions that are
|
|
* installed using ber_sockbuf_set_option( ..., LBER_SOCKBUF_OPT_EXT_IO_FNS,
|
|
* ... ).
|
|
*
|
|
* the basic strategy is to use the new extended arg to hold a pointer to the
|
|
* Sockbuf itself so we can find the old functions and call them.
|
|
* note that the integer socket s passed in is not used. we use the sb_sd
|
|
* from the Sockbuf itself because it is the correct type.
|
|
*/
|
|
static int
|
|
nslberi_extread_compat( int s, void *buf, int len,
|
|
struct lextiof_socket_private *arg )
|
|
{
|
|
Sockbuf *sb = (Sockbuf *)arg;
|
|
|
|
return( sb->sb_io_fns.lbiof_read( sb->sb_sd, buf, len ));
|
|
}
|
|
|
|
|
|
static int
|
|
nslberi_extwrite_compat( int s, const void *buf, int len,
|
|
struct lextiof_socket_private *arg )
|
|
{
|
|
Sockbuf *sb = (Sockbuf *)arg;
|
|
|
|
return( sb->sb_io_fns.lbiof_write( sb->sb_sd, buf, len ));
|
|
}
|
|
|
|
|
|
/*
|
|
* Install I/O compatiblity functions. This can't fail.
|
|
*/
|
|
static void
|
|
nslberi_install_compat_io_fns( Sockbuf *sb )
|
|
{
|
|
sb->sb_ext_io_fns.lbextiofn_size = LBER_X_EXTIO_FNS_SIZE;
|
|
sb->sb_ext_io_fns.lbextiofn_read = nslberi_extread_compat;
|
|
sb->sb_ext_io_fns.lbextiofn_write = nslberi_extwrite_compat;
|
|
sb->sb_ext_io_fns.lbextiofn_writev = NULL;
|
|
sb->sb_ext_io_fns.lbextiofn_socket_arg = (void *)sb;
|
|
}
|
|
/*
|
|
* end of compat I/O functions
|
|
******************************************************************************
|
|
*/
|