|
18 | 18 |
|
19 | 19 | /**
|
20 | 20 | Decode a SSH sequence using a VA list
|
21 |
| - @param out [out] Destination for data |
22 |
| - @param outlen [in/out] Length of buffer and resulting length of output |
| 21 | + @param in Data to decode |
| 22 | + @param inlen Length of buffer to decode |
23 | 23 | @remark <...> is of the form <type, data> (int, void*) except for string <type, data, size>
|
24 | 24 | @return CRYPT_OK on success
|
25 | 25 | */
|
26 | 26 | int ssh_decode_sequence_multi(const unsigned char *in, unsigned long inlen, ...)
|
27 | 27 | {
|
| 28 | + const unsigned char *sentinel = in + inlen; |
28 | 29 | int err;
|
29 |
| - ssh_data_type type; |
30 |
| - void *data; |
31 | 30 | va_list args;
|
| 31 | + ssh_data_type type; |
| 32 | + void *vdata; |
| 33 | + unsigned char *cdata; |
| 34 | + char *sdata; |
| 35 | + ulong32 *u32data; |
| 36 | + ulong64 *u64data; |
32 | 37 | unsigned long size, bufsize;
|
33 | 38 |
|
34 | 39 | LTC_ARGCHK(in != NULL);
|
35 | 40 |
|
36 | 41 | /* Decode values from buffer */
|
37 | 42 | va_start(args, inlen);
|
38 |
| - for (;;) { |
39 |
| - type = (ssh_data_type)va_arg(args, int); |
40 |
| - data = va_arg(args, void*); |
41 |
| - LTC_UNUSED_PARAM(data); |
42 |
| - |
43 |
| - if (type == LTC_SSHDATA_EOL) { |
44 |
| - break; |
45 |
| - } |
46 |
| - |
| 43 | + while ((type = (ssh_data_type)va_arg(args, int)) != LTC_SSHDATA_EOL) { |
47 | 44 | switch (type) {
|
48 | 45 | case LTC_SSHDATA_BYTE:
|
49 |
| - size = ((unsigned long)in[0]); |
50 |
| - in++; |
51 |
| - *(unsigned long *)data = size; |
| 46 | + cdata = va_arg(args, unsigned char*); |
| 47 | + *cdata = *in++; |
52 | 48 | break;
|
53 | 49 | case LTC_SSHDATA_BOOLEAN:
|
54 |
| - size = ((unsigned long)in[0]); |
55 |
| - in++; |
| 50 | + cdata = va_arg(args, unsigned char*); |
56 | 51 | /*
|
57 | 52 | The value 0 represents FALSE, and the value 1 represents TRUE. All non-zero values MUST be
|
58 | 53 | interpreted as TRUE; however, applications MUST NOT store values other than 0 and 1.
|
59 | 54 | */
|
60 |
| - *(unsigned long *)data = (size)?1:0; |
| 55 | + *cdata = (*in++)?1:0; |
61 | 56 | break;
|
62 | 57 | case LTC_SSHDATA_UINT32:
|
63 |
| - size = ((unsigned long)in[0] << 24) | |
64 |
| - ((unsigned long)in[1] << 16) | |
65 |
| - ((unsigned long)in[2] << 8) | |
66 |
| - ((unsigned long)in[3]); |
| 58 | + u32data = va_arg(args, ulong32*); |
| 59 | + LOAD32H(*u32data, in); |
67 | 60 | in += 4;
|
68 |
| - *(unsigned long *)data = size; |
69 | 61 | break;
|
70 | 62 | case LTC_SSHDATA_UINT64:
|
71 |
| - size = ((unsigned long)in[0] << 56) | |
72 |
| - ((unsigned long)in[1] << 48) | |
73 |
| - ((unsigned long)in[2] << 40) | |
74 |
| - ((unsigned long)in[3] << 32) | |
75 |
| - ((unsigned long)in[4] << 24) | |
76 |
| - ((unsigned long)in[5] << 16) | |
77 |
| - ((unsigned long)in[6] << 8) | |
78 |
| - ((unsigned long)in[7]); |
| 63 | + u64data = va_arg(args, ulong64*); |
| 64 | + LOAD64H(*u64data, in); |
79 | 65 | in += 8;
|
80 |
| - *(unsigned long *)data = size; |
81 | 66 | break;
|
82 | 67 | case LTC_SSHDATA_STRING:
|
83 | 68 | case LTC_SSHDATA_NAMELIST:
|
| 69 | + sdata = va_arg(args, char*); |
84 | 70 | bufsize = va_arg(args, unsigned long);
|
85 |
| - size = ((unsigned long)in[0] << 24) | |
86 |
| - ((unsigned long)in[1] << 16) | |
87 |
| - ((unsigned long)in[2] << 8) | |
88 |
| - ((unsigned long)in[3]); |
| 71 | + LOAD32H(size, in); |
89 | 72 | in += 4;
|
90 | 73 | if (size > 0) {
|
91 | 74 | if (size >= bufsize) {
|
92 |
| - va_end(args); |
93 |
| - return CRYPT_BUFFER_OVERFLOW; |
| 75 | + err = CRYPT_BUFFER_OVERFLOW; |
| 76 | + goto error; |
94 | 77 | }
|
95 |
| - strncpy((char *)data, (const char *)in, size); |
96 |
| - ((char *)data)[size] = 0; /* strncpy doesn't null terminate */ |
| 78 | + XSTRNCPY(sdata, (const char *)in, size); |
| 79 | + sdata[size] = '\0'; /* strncpy doesn't NUL-terminate */ |
97 | 80 | } else {
|
98 |
| - *(char *)data = 0; |
| 81 | + *sdata = '\0'; |
99 | 82 | }
|
100 | 83 | in += size;
|
101 | 84 | break;
|
102 | 85 | case LTC_SSHDATA_MPINT:
|
103 |
| - size = ((unsigned long)in[0] << 24) | |
104 |
| - ((unsigned long)in[1] << 16) | |
105 |
| - ((unsigned long)in[2] << 8) | |
106 |
| - ((unsigned long)in[3]); |
| 86 | + vdata = va_arg(args, void*); |
| 87 | + LOAD32H(size, in); |
107 | 88 | in += 4;
|
108 | 89 | if (size == 0) {
|
109 |
| - if ((err = mp_set(data, 0)) != CRYPT_OK) { |
110 |
| - va_end(args); |
111 |
| - return CRYPT_ERROR; |
112 |
| - } |
| 90 | + if ((err = mp_set(vdata, 0)) != CRYPT_OK) { goto error; } |
113 | 91 | } else {
|
114 |
| - if ((err = mp_read_unsigned_bin(data, (unsigned char *)in, size)) != CRYPT_OK) { |
115 |
| - va_end(args); |
116 |
| - return CRYPT_ERROR; |
117 |
| - } |
| 92 | + if ((err = mp_read_unsigned_bin(vdata, (unsigned char *)in, size)) != CRYPT_OK) { goto error; } |
118 | 93 | }
|
119 | 94 | in += size;
|
120 | 95 | break;
|
121 | 96 |
|
122 |
| - case LTC_SSHDATA_EOL: /* Should never get here */ |
123 |
| - va_end(args); |
124 |
| - return CRYPT_INVALID_ARG; |
125 |
| - } |
| 97 | + case LTC_SSHDATA_EOL: |
| 98 | + /* Should never get here */ |
| 99 | + err = CRYPT_INVALID_ARG; |
| 100 | + goto error; |
| 101 | + } |
| 102 | + |
| 103 | + /* Check we've not read too far */ |
| 104 | + if (in > sentinel) { |
| 105 | + err = CRYPT_BUFFER_OVERFLOW; |
| 106 | + goto error; |
| 107 | + } |
126 | 108 | }
|
127 |
| - va_end(args); |
| 109 | + err = CRYPT_OK; |
128 | 110 |
|
129 |
| - return CRYPT_OK; |
| 111 | +error: |
| 112 | + va_end(args); |
| 113 | + return err; |
130 | 114 | }
|
131 | 115 |
|
132 | 116 | #endif
|
|
0 commit comments