1 /* io.c - ber general i/o routines */
3 * Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1990 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
25 #include <ac/socket.h>
26 #include <ac/string.h>
27 #include <ac/unistd.h>
35 static long BerRead LDAP_P(( Sockbuf *sb, char *buf, long len ));
36 static int ber_realloc LDAP_P(( BerElement *ber, unsigned long len ));
40 /* probably far too large... */
41 #define MAX_BERBUFSIZE (128*1024)
43 #if defined( DOS ) && !defined( _WIN32 ) && (MAX_BERBUFSIZE > 65535)
44 # undef MAX_BERBUFSIZE
45 # define MAX_BERBUFSIZE 65535
49 BerRead( Sockbuf *sb, char *buf, long len )
55 assert( buf != NULL );
58 if ( (c = ber_pvt_sb_read( sb, buf, len )) <= 0 ) {
72 ber_read( BerElement *ber, char *buf, unsigned long len )
74 unsigned long actuallen, nleft;
76 assert( ber != NULL );
77 assert( buf != NULL );
79 nleft = ber->ber_end - ber->ber_ptr;
80 actuallen = nleft < len ? nleft : len;
82 SAFEMEMCPY( buf, ber->ber_ptr, (size_t)actuallen );
84 ber->ber_ptr += actuallen;
86 return( (long)actuallen );
96 assert( ber != NULL );
97 assert( buf != NULL );
99 if ( nosos || ber->ber_sos == NULL ) {
100 if ( ber->ber_ptr + len > ber->ber_end ) {
101 if ( ber_realloc( ber, len ) != 0 )
104 SAFEMEMCPY( ber->ber_ptr, buf, (size_t)len );
108 if ( ber->ber_sos->sos_ptr + len > ber->ber_end ) {
109 if ( ber_realloc( ber, len ) != 0 )
112 SAFEMEMCPY( ber->ber_sos->sos_ptr, buf, (size_t)len );
113 ber->ber_sos->sos_ptr += len;
114 ber->ber_sos->sos_clen += len;
120 ber_realloc( BerElement *ber, unsigned long len )
122 unsigned long need, have, total;
127 assert( ber != NULL );
130 have = (ber->ber_end - ber->ber_buf) / EXBUFSIZ;
131 need = (len < EXBUFSIZ ? 1 : (len + (EXBUFSIZ - 1)) / EXBUFSIZ);
132 total = have * EXBUFSIZ + need * EXBUFSIZ;
134 oldbuf = ber->ber_buf;
136 if ( ber->ber_buf == NULL ) {
137 if ( (ber->ber_buf = (char *) malloc( (size_t)total )) == NULL )
139 } else if ( (ber->ber_buf = (char *) realloc( ber->ber_buf,
140 (size_t)total )) == NULL )
143 ber->ber_end = ber->ber_buf + total;
146 * If the stinking thing was moved, we need to go through and
147 * reset all the sos and ber pointers. Offsets would've been
148 * a better idea... oh well.
151 if ( ber->ber_buf != oldbuf ) {
152 ber->ber_ptr = ber->ber_buf + (ber->ber_ptr - oldbuf);
154 for ( s = ber->ber_sos; s != NULLSEQORSET; s = s->sos_next ) {
155 off = s->sos_first - oldbuf;
156 s->sos_first = ber->ber_buf + off;
158 off = s->sos_ptr - oldbuf;
159 s->sos_ptr = ber->ber_buf + off;
167 ber_free( BerElement *ber, int freebuf )
169 assert( ber != NULL );
171 if ( freebuf && ber->ber_buf != NULL )
172 free( ber->ber_buf );
174 free( (char *) ber );
178 ber_flush( Sockbuf *sb, BerElement *ber, int freeit )
180 long nwritten, towrite, rc;
182 assert( sb != NULL );
183 assert( ber != NULL );
185 if ( ber->ber_rwptr == NULL ) {
186 ber->ber_rwptr = ber->ber_buf;
188 towrite = ber->ber_ptr - ber->ber_rwptr;
190 if ( sb->sb_debug ) {
191 ber_log_printf( LDAP_DEBUG_ANY, sb->sb_debug,
192 "ber_flush: %ld bytes to sd %ld%s\n", towrite,
193 (long) sb->sb_sd, ber->ber_rwptr != ber->ber_buf ? " (re-flush)"
195 ber_log_bprint( LDAP_DEBUG_PACKETS, sb->sb_debug,
196 ber->ber_rwptr, towrite );
199 #if !defined(MACOS) && !defined(DOS)
200 if ( sb->sb_options & (LBER_TO_FILE | LBER_TO_FILE_ONLY) ) {
201 rc = write( sb->sb_fd, ber->ber_rwptr, towrite );
202 if ( sb->sb_options & LBER_TO_FILE_ONLY ) {
210 rc = ber_pvt_sb_write( sb, ber->ber_rwptr, towrite );
216 ber->ber_rwptr += rc;
217 } while ( towrite > 0 );
226 ber_alloc_t( int options )
230 ber = (BerElement *) calloc( 1, sizeof(BerElement) );
232 if ( ber == NULLBER )
235 ber->ber_tag = LBER_DEFAULT;
236 ber->ber_options = options;
237 ber->ber_debug = ber_int_debug;
245 return( ber_alloc_t( 0 ) );
251 return( ber_alloc_t( LBER_USE_DER ) );
255 ber_dup( LDAP_CONST BerElement *ber )
259 assert( ber != NULL );
261 if ( (new = ber_alloc()) == NULL )
270 /* OLD U-Mich ber_init() */
272 ber_init_w_nullc( BerElement *ber, int options )
274 assert( ber != NULL );
276 (void) memset( (char *)ber, '\0', sizeof( BerElement ));
277 ber->ber_tag = LBER_DEFAULT;
278 ber->ber_options = (char) options;
281 /* New C-API ber_init() */
282 /* This function constructs a BerElement containing a copy
283 ** of the data in the bv argument.
286 ber_init( struct berval *bv )
290 assert( bv != NULL );
296 ber = ber_alloc_t( 0 );
298 if( ber == NULLBER ) {
299 /* allocation failed */
304 if ( ( (unsigned int) ber_write ( ber, bv->bv_val, bv->bv_len, 0 )) != bv->bv_len ) {
305 /* write failed, so free and return NULL */
310 ber_reset( ber, 1 ); /* reset the pointer to the start of the buffer */
315 /* New C-API ber_flatten routine */
316 /* This routine allocates a struct berval whose contents are a BER
317 ** encoding taken from the ber argument. The bvPtr pointer pointers to
318 ** the returned berval.
321 LDAP_CONST BerElement *ber,
322 struct berval **bvPtr)
326 assert( bvPtr != NULL );
332 if ( (bv = malloc( sizeof(struct berval))) == NULL ) {
337 /* ber is null, create an empty berval */
342 /* copy the berval */
343 ptrdiff_t len = ber->ber_ptr - ber->ber_buf;
345 if ( (bv->bv_val = (char *) malloc( len + 1 )) == NULL ) {
350 SAFEMEMCPY( bv->bv_val, ber->ber_buf, (size_t)len );
351 bv->bv_val[len] = '\0';
360 ber_reset( BerElement *ber, int was_writing )
362 assert( ber != NULL );
365 ber->ber_end = ber->ber_ptr;
366 ber->ber_ptr = ber->ber_buf;
368 ber->ber_ptr = ber->ber_end;
371 ber->ber_rwptr = NULL;
375 /* return the tag - LBER_DEFAULT returned means trouble */
377 get_tag( Sockbuf *sb )
384 assert( sb != NULL );
386 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
387 return( LBER_DEFAULT );
389 if ( (xbyte & LBER_BIG_TAG_MASK) != LBER_BIG_TAG_MASK )
390 return( (unsigned long) xbyte );
392 tagp = (char *) &tag;
394 for ( i = 1; i < sizeof(long); i++ ) {
395 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
396 return( LBER_DEFAULT );
400 if ( ! (xbyte & LBER_MORE_TAG_MASK) )
405 if ( i == sizeof(long) )
406 return( LBER_DEFAULT );
408 /* want leading, not trailing 0's */
409 return( tag >> (sizeof(long) - i - 1) );
414 * A rewrite of ber_get_next that can safely be called multiple times
415 * for the same packet. It will simply continue were it stopped until
416 * a full packet is read.
420 ber_get_next( Sockbuf *sb, unsigned long *len, BerElement *ber )
422 assert( sb != NULL );
423 assert( len != NULL );
424 assert( ber != NULL );
426 if ( ber->ber_debug ) {
427 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
432 * Any ber element looks like this: tag length contents.
433 * Assuming everything's ok, we return the tag byte (we
434 * can assume a single byte), return the length in len,
435 * and the rest of the undecoded element in buf.
438 * 1) small tags (less than 128)
439 * 2) definite lengths
440 * 3) primitive encodings used whenever possible
443 if (ber->ber_rwptr == NULL) {
444 assert( ber->ber_buf == NULL );
445 ber->ber_rwptr = (char *) &ber->ber_tag;
449 #define PTR_IN_VAR( ptr, var )\
450 (((ptr)>=(char *) &(var)) && ((ptr)< (char *) &(var)+sizeof(var)))
452 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_tag)) {
453 if (ber->ber_rwptr == (char *) &ber->ber_tag) {
454 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
456 if ((ber->ber_rwptr[0] & LBER_BIG_TAG_MASK)
457 != LBER_BIG_TAG_MASK) {
458 ber->ber_tag = ber->ber_rwptr[0];
459 ber->ber_rwptr = (char *) &ber->ber_usertag;
465 /* reading the tag... */
466 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
468 if (! (ber->ber_rwptr[0] & LBER_MORE_TAG_MASK) ) {
469 ber->ber_tag>>=sizeof(ber->ber_tag) -
470 ((char *) &ber->ber_tag - ber->ber_rwptr);
471 ber->ber_rwptr = (char *) &ber->ber_usertag;
474 } while (PTR_IN_VAR(ber->ber_rwptr,ber->ber_tag));
475 errno = ERANGE; /* this is a serious error. */
479 if (ber->ber_rwptr==(char *) &ber->ber_usertag) {
481 if (ber_pvt_sb_read( sb, (char *) &c, 1)<=0)
485 if ( (len==0) || ((unsigned) len>sizeof( ber->ber_len ) ) ) {
489 ber->ber_rwptr = (char *) &ber->ber_len +
490 sizeof(ber->ber_len) - len;
497 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_len)) {
500 to_go = (char *) &ber->ber_len + sizeof( ber->ber_len ) -
503 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
506 ber->ber_rwptr += res;
508 /* convert length. */
509 ber->ber_len = AC_NTOHL( ber->ber_len );
512 #if defined( EWOULDBLOCK )
514 #elif defined( EAGAIN )
521 /* now fill the buffer. */
522 if (ber->ber_buf==NULL) {
523 if (ber->ber_len > MAX_BERBUFSIZE) {
527 ber->ber_buf = (char *) malloc( ber->ber_len );
528 if (ber->ber_buf==NULL)
530 ber->ber_rwptr = ber->ber_buf;
531 ber->ber_ptr = ber->ber_buf;
532 ber->ber_end = ber->ber_buf + ber->ber_len;
534 if ((ber->ber_rwptr>=ber->ber_buf) && (ber->ber_rwptr<ber->ber_end)) {
538 to_go = ber->ber_end - ber->ber_rwptr;
541 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
547 #if defined( EWOULDBLOCK )
549 #elif defined( EAGAIN )
555 ber->ber_rwptr = NULL;
557 if ( ber->ber_debug ) {
558 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
559 "ber_get_next: tag 0x%lx len %ld contents:\n",
560 ber->ber_tag, ber->ber_len );
561 ber_log_dump( LDAP_DEBUG_BER, ber->ber_debug, ber, 1 );
563 return (ber->ber_tag);
565 assert( 0 ); /* ber structure is messed up ?*/
569 void ber_clear( BerElement *ber, int freebuf )
571 assert( ber != NULL );
573 if ((freebuf) && (ber->ber_buf))
574 free( ber->ber_buf );
576 ber->ber_rwptr = NULL;