|
18 | 18 |
|
19 | 19 | /** |
20 | 20 | Decode a SSH sequence using a VA list |
21 | | - @param out [out] Destination for data |
22 | | - @param outlen [in/out] Length of buffer and resulting length of output |
| 21 | + @param in Data to decode |
| 22 | + @param inlen Length of buffer to decode |
23 | 23 | @remark <...> is of the form <type, data> (int, void*) except for string <type, data, size> |
24 | 24 | @return CRYPT_OK on success |
25 | 25 | */ |
26 | 26 | int ssh_decode_sequence_multi(const unsigned char *in, unsigned long inlen, ...) |
27 | 27 | { |
| 28 | + const unsigned char *sentinel = in + inlen; |
28 | 29 | int err; |
29 | | - ssh_data_type type; |
30 | | - void *data; |
31 | 30 | va_list args; |
| 31 | + ssh_data_type type; |
| 32 | + void *vdata; |
| 33 | + unsigned char *cdata; |
| 34 | + char *sdata; |
| 35 | + ulong32 *u32data; |
| 36 | + ulong64 *u64data; |
32 | 37 | unsigned long size, bufsize; |
33 | 38 |
|
34 | 39 | LTC_ARGCHK(in != NULL); |
35 | 40 |
|
36 | 41 | /* Decode values from buffer */ |
37 | 42 | va_start(args, inlen); |
38 | | - for (;;) { |
39 | | - type = (ssh_data_type)va_arg(args, int); |
40 | | - data = va_arg(args, void*); |
41 | | - LTC_UNUSED_PARAM(data); |
42 | | - |
43 | | - if (type == LTC_SSHDATA_EOL) { |
44 | | - break; |
45 | | - } |
46 | | - |
| 43 | + while ((type = (ssh_data_type)va_arg(args, int)) != LTC_SSHDATA_EOL) { |
47 | 44 | switch (type) { |
48 | 45 | case LTC_SSHDATA_BYTE: |
49 | | - size = ((unsigned long)in[0]); |
50 | | - in++; |
51 | | - *(unsigned long *)data = size; |
| 46 | + cdata = va_arg(args, unsigned char*); |
| 47 | + *cdata = *in++; |
52 | 48 | break; |
53 | 49 | case LTC_SSHDATA_BOOLEAN: |
54 | | - size = ((unsigned long)in[0]); |
55 | | - in++; |
| 50 | + cdata = va_arg(args, unsigned char*); |
56 | 51 | /* |
57 | 52 | The value 0 represents FALSE, and the value 1 represents TRUE. All non-zero values MUST be |
58 | 53 | interpreted as TRUE; however, applications MUST NOT store values other than 0 and 1. |
59 | 54 | */ |
60 | | - *(unsigned long *)data = (size)?1:0; |
| 55 | + *cdata = (*in++)?1:0; |
61 | 56 | break; |
62 | 57 | case LTC_SSHDATA_UINT32: |
63 | | - size = ((unsigned long)in[0] << 24) | |
64 | | - ((unsigned long)in[1] << 16) | |
65 | | - ((unsigned long)in[2] << 8) | |
66 | | - ((unsigned long)in[3]); |
| 58 | + u32data = va_arg(args, ulong32*); |
| 59 | + LOAD32H(*u32data, in); |
67 | 60 | in += 4; |
68 | | - *(unsigned long *)data = size; |
69 | 61 | break; |
70 | 62 | case LTC_SSHDATA_UINT64: |
71 | | - size = ((unsigned long)in[0] << 56) | |
72 | | - ((unsigned long)in[1] << 48) | |
73 | | - ((unsigned long)in[2] << 40) | |
74 | | - ((unsigned long)in[3] << 32) | |
75 | | - ((unsigned long)in[4] << 24) | |
76 | | - ((unsigned long)in[5] << 16) | |
77 | | - ((unsigned long)in[6] << 8) | |
78 | | - ((unsigned long)in[7]); |
| 63 | + u64data = va_arg(args, ulong64*); |
| 64 | + LOAD64H(*u64data, in); |
79 | 65 | in += 8; |
80 | | - *(unsigned long *)data = size; |
81 | 66 | break; |
82 | 67 | case LTC_SSHDATA_STRING: |
83 | 68 | case LTC_SSHDATA_NAMELIST: |
| 69 | + sdata = va_arg(args, char*); |
84 | 70 | bufsize = va_arg(args, unsigned long); |
85 | | - size = ((unsigned long)in[0] << 24) | |
86 | | - ((unsigned long)in[1] << 16) | |
87 | | - ((unsigned long)in[2] << 8) | |
88 | | - ((unsigned long)in[3]); |
| 71 | + LOAD32H(size, in); |
89 | 72 | in += 4; |
90 | 73 | if (size > 0) { |
91 | 74 | if (size >= bufsize) { |
92 | | - va_end(args); |
93 | | - return CRYPT_BUFFER_OVERFLOW; |
| 75 | + err = CRYPT_BUFFER_OVERFLOW; |
| 76 | + goto error; |
94 | 77 | } |
95 | | - strncpy((char *)data, (const char *)in, size); |
96 | | - ((char *)data)[size] = 0; /* strncpy doesn't null terminate */ |
| 78 | + XSTRNCPY(sdata, (const char *)in, size); |
| 79 | + sdata[size] = '\0'; /* strncpy doesn't NUL-terminate */ |
97 | 80 | } else { |
98 | | - *(char *)data = 0; |
| 81 | + *sdata = '\0'; |
99 | 82 | } |
100 | 83 | in += size; |
101 | 84 | break; |
102 | 85 | case LTC_SSHDATA_MPINT: |
103 | | - size = ((unsigned long)in[0] << 24) | |
104 | | - ((unsigned long)in[1] << 16) | |
105 | | - ((unsigned long)in[2] << 8) | |
106 | | - ((unsigned long)in[3]); |
| 86 | + vdata = va_arg(args, void*); |
| 87 | + LOAD32H(size, in); |
107 | 88 | in += 4; |
108 | 89 | if (size == 0) { |
109 | | - if ((err = mp_set(data, 0)) != CRYPT_OK) { |
110 | | - va_end(args); |
111 | | - return CRYPT_ERROR; |
112 | | - } |
| 90 | + if ((err = mp_set(vdata, 0)) != CRYPT_OK) { goto error; } |
113 | 91 | } else { |
114 | | - if ((err = mp_read_unsigned_bin(data, (unsigned char *)in, size)) != CRYPT_OK) { |
115 | | - va_end(args); |
116 | | - return CRYPT_ERROR; |
117 | | - } |
| 92 | + if ((err = mp_read_unsigned_bin(vdata, (unsigned char *)in, size)) != CRYPT_OK) { goto error; } |
118 | 93 | } |
119 | 94 | in += size; |
120 | 95 | break; |
121 | 96 |
|
122 | | - case LTC_SSHDATA_EOL: /* Should never get here */ |
123 | | - va_end(args); |
124 | | - return CRYPT_INVALID_ARG; |
125 | | - } |
| 97 | + case LTC_SSHDATA_EOL: |
| 98 | + /* Should never get here */ |
| 99 | + err = CRYPT_INVALID_ARG; |
| 100 | + goto error; |
| 101 | + } |
| 102 | + |
| 103 | + /* Check we've not read too far */ |
| 104 | + if (in > sentinel) { |
| 105 | + err = CRYPT_BUFFER_OVERFLOW; |
| 106 | + goto error; |
| 107 | + } |
126 | 108 | } |
127 | | - va_end(args); |
| 109 | + err = CRYPT_OK; |
128 | 110 |
|
129 | | - return CRYPT_OK; |
| 111 | +error: |
| 112 | + va_end(args); |
| 113 | + return err; |
130 | 114 | } |
131 | 115 |
|
132 | 116 | #endif |
|
0 commit comments