1 /* io.c - ber general i/o routines */
3 * Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1990 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
25 #include <ac/socket.h>
26 #include <ac/string.h>
27 #include <ac/unistd.h>
35 static long BerRead LDAP_P(( Sockbuf *sb, char *buf, long len ));
36 static int ber_realloc LDAP_P(( BerElement *ber, unsigned long len ));
40 /* probably far too large... */
41 #define MAX_BERBUFSIZE (128*1024)
43 #if defined( DOS ) && !defined( _WIN32 ) && (MAX_BERBUFSIZE > 65535)
44 # undef MAX_BERBUFSIZE
45 # define MAX_BERBUFSIZE 65535
49 BerRead( Sockbuf *sb, char *buf, long len )
55 assert( buf != NULL );
57 assert( SOCKBUF_VALID( sb ) );
60 if ( (c = ber_pvt_sb_read( sb, buf, len )) <= 0 ) {
74 ber_read( BerElement *ber, char *buf, unsigned long len )
76 unsigned long actuallen, nleft;
78 assert( ber != NULL );
79 assert( buf != NULL );
81 assert( BER_VALID( ber ) );
83 nleft = ber->ber_end - ber->ber_ptr;
84 actuallen = nleft < len ? nleft : len;
86 SAFEMEMCPY( buf, ber->ber_ptr, (size_t)actuallen );
88 ber->ber_ptr += actuallen;
90 return( (long)actuallen );
100 assert( ber != NULL );
101 assert( buf != NULL );
103 assert( BER_VALID( ber ) );
105 if ( nosos || ber->ber_sos == NULL ) {
106 if ( ber->ber_ptr + len > ber->ber_end ) {
107 if ( ber_realloc( ber, len ) != 0 )
110 SAFEMEMCPY( ber->ber_ptr, buf, (size_t)len );
114 if ( ber->ber_sos->sos_ptr + len > ber->ber_end ) {
115 if ( ber_realloc( ber, len ) != 0 )
118 SAFEMEMCPY( ber->ber_sos->sos_ptr, buf, (size_t)len );
119 ber->ber_sos->sos_ptr += len;
120 ber->ber_sos->sos_clen += len;
126 ber_realloc( BerElement *ber, unsigned long len )
128 unsigned long need, have, total;
133 assert( ber != NULL );
136 assert( BER_VALID( ber ) );
138 have = (ber->ber_end - ber->ber_buf) / EXBUFSIZ;
139 need = (len < EXBUFSIZ ? 1 : (len + (EXBUFSIZ - 1)) / EXBUFSIZ);
140 total = have * EXBUFSIZ + need * EXBUFSIZ;
142 oldbuf = ber->ber_buf;
144 if ( ber->ber_buf == NULL ) {
145 if ( (ber->ber_buf = (char *) malloc( (size_t)total )) == NULL )
147 } else if ( (ber->ber_buf = (char *) realloc( ber->ber_buf,
148 (size_t)total )) == NULL )
151 ber->ber_end = ber->ber_buf + total;
154 * If the stinking thing was moved, we need to go through and
155 * reset all the sos and ber pointers. Offsets would've been
156 * a better idea... oh well.
159 if ( ber->ber_buf != oldbuf ) {
160 ber->ber_ptr = ber->ber_buf + (ber->ber_ptr - oldbuf);
162 for ( s = ber->ber_sos; s != NULLSEQORSET; s = s->sos_next ) {
163 off = s->sos_first - oldbuf;
164 s->sos_first = ber->ber_buf + off;
166 off = s->sos_ptr - oldbuf;
167 s->sos_ptr = ber->ber_buf + off;
175 ber_free( BerElement *ber, int freebuf )
177 assert( ber != NULL );
178 assert( BER_VALID( ber ) );
180 if ( freebuf && ber->ber_buf != NULL )
181 free( ber->ber_buf );
183 ber->ber_valid = LBER_UNINITIALIZED;
184 free( (char *) ber );
188 ber_flush( Sockbuf *sb, BerElement *ber, int freeit )
190 long nwritten, towrite, rc;
192 assert( sb != NULL );
193 assert( ber != NULL );
195 assert( SOCKBUF_VALID( ber ) );
196 assert( BER_VALID( ber ) );
198 if ( ber->ber_rwptr == NULL ) {
199 ber->ber_rwptr = ber->ber_buf;
201 towrite = ber->ber_ptr - ber->ber_rwptr;
203 if ( sb->sb_debug ) {
204 ber_log_printf( LDAP_DEBUG_ANY, sb->sb_debug,
205 "ber_flush: %ld bytes to sd %ld%s\n", towrite,
206 (long) sb->sb_sd, ber->ber_rwptr != ber->ber_buf ? " (re-flush)"
208 ber_log_bprint( LDAP_DEBUG_PACKETS, sb->sb_debug,
209 ber->ber_rwptr, towrite );
212 #if !defined(MACOS) && !defined(DOS)
213 if ( sb->sb_options & (LBER_TO_FILE | LBER_TO_FILE_ONLY) ) {
214 rc = write( sb->sb_fd, ber->ber_rwptr, towrite );
215 if ( sb->sb_options & LBER_TO_FILE_ONLY ) {
223 rc = ber_pvt_sb_write( sb, ber->ber_rwptr, towrite );
229 ber->ber_rwptr += rc;
230 } while ( towrite > 0 );
239 ber_alloc_t( int options )
243 ber = (BerElement *) calloc( 1, sizeof(BerElement) );
245 if ( ber == NULLBER )
248 ber->ber_valid = LBER_VALID_BERELEMENT;
249 ber->ber_tag = LBER_DEFAULT;
250 ber->ber_options = options;
251 ber->ber_debug = ber_int_debug;
253 assert( BER_VALID( ber ) );
258 ber_alloc( void ) /* deprecated */
260 return( ber_alloc_t( 0 ) );
264 der_alloc( void ) /* deprecated */
266 return( ber_alloc_t( LBER_USE_DER ) );
270 ber_dup( LDAP_CONST BerElement *ber )
274 assert( ber != NULL );
275 assert( BER_VALID( ber ) );
277 if ( (new = ber_alloc_t( ber->ber_options )) == NULL ) {
283 assert( BER_VALID( new ) );
288 /* OLD U-Mich ber_init() */
290 ber_init_w_nullc( BerElement *ber, int options )
292 assert( ber != NULL );
294 (void) memset( (char *)ber, '\0', sizeof( BerElement ));
295 ber->ber_valid = LBER_VALID_BERELEMENT;
296 ber->ber_tag = LBER_DEFAULT;
297 ber->ber_options = (char) options;
298 ber->ber_debug = ber_int_debug;
300 assert( BER_VALID( ber ) );
303 /* New C-API ber_init() */
304 /* This function constructs a BerElement containing a copy
305 ** of the data in the bv argument.
308 ber_init( struct berval *bv )
312 assert( bv != NULL );
318 ber = ber_alloc_t( 0 );
320 if( ber == NULLBER ) {
321 /* allocation failed */
326 if ( ( (unsigned int) ber_write ( ber, bv->bv_val, bv->bv_len, 0 )) != bv->bv_len ) {
327 /* write failed, so free and return NULL */
332 ber_reset( ber, 1 ); /* reset the pointer to the start of the buffer */
337 /* New C-API ber_flatten routine */
338 /* This routine allocates a struct berval whose contents are a BER
339 ** encoding taken from the ber argument. The bvPtr pointer pointers to
340 ** the returned berval.
343 LDAP_CONST BerElement *ber,
344 struct berval **bvPtr)
348 assert( bvPtr != NULL );
354 if ( (bv = malloc( sizeof(struct berval))) == NULL ) {
359 /* ber is null, create an empty berval */
364 /* copy the berval */
365 ptrdiff_t len = ber->ber_ptr - ber->ber_buf;
367 if ( (bv->bv_val = (char *) malloc( len + 1 )) == NULL ) {
372 SAFEMEMCPY( bv->bv_val, ber->ber_buf, (size_t)len );
373 bv->bv_val[len] = '\0';
382 ber_reset( BerElement *ber, int was_writing )
384 assert( ber != NULL );
385 assert( BER_VALID( ber ) );
388 ber->ber_end = ber->ber_ptr;
389 ber->ber_ptr = ber->ber_buf;
391 ber->ber_ptr = ber->ber_end;
394 ber->ber_rwptr = NULL;
398 /* return the tag - LBER_DEFAULT returned means trouble */
400 get_tag( Sockbuf *sb )
407 assert( sb != NULL );
408 assert( SOCKBUF_VALID( sb ) );
410 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
411 return( LBER_DEFAULT );
413 if ( (xbyte & LBER_BIG_TAG_MASK) != LBER_BIG_TAG_MASK )
414 return( (unsigned long) xbyte );
416 tagp = (char *) &tag;
418 for ( i = 1; i < sizeof(long); i++ ) {
419 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
420 return( LBER_DEFAULT );
424 if ( ! (xbyte & LBER_MORE_TAG_MASK) )
429 if ( i == sizeof(long) )
430 return( LBER_DEFAULT );
432 /* want leading, not trailing 0's */
433 return( tag >> (sizeof(long) - i - 1) );
438 * A rewrite of ber_get_next that can safely be called multiple times
439 * for the same packet. It will simply continue were it stopped until
440 * a full packet is read.
444 ber_get_next( Sockbuf *sb, unsigned long *len, BerElement *ber )
446 assert( sb != NULL );
447 assert( len != NULL );
448 assert( ber != NULL );
450 assert( SOCKBUF_VALID( sb ) );
451 assert( BER_VALID( ber ) );
453 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
457 * Any ber element looks like this: tag length contents.
458 * Assuming everything's ok, we return the tag byte (we
459 * can assume a single byte), return the length in len,
460 * and the rest of the undecoded element in buf.
463 * 1) small tags (less than 128)
464 * 2) definite lengths
465 * 3) primitive encodings used whenever possible
468 if (ber->ber_rwptr == NULL) {
470 * dtest does like this assert.
472 /* assert( ber->ber_buf == NULL ); */
473 ber->ber_rwptr = (char *) &ber->ber_tag;
477 #define PTR_IN_VAR( ptr, var )\
478 (((ptr)>=(char *) &(var)) && ((ptr)< (char *) &(var)+sizeof(var)))
480 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_tag)) {
481 if (ber->ber_rwptr == (char *) &ber->ber_tag) {
482 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
484 if ((ber->ber_rwptr[0] & LBER_BIG_TAG_MASK)
485 != LBER_BIG_TAG_MASK) {
486 ber->ber_tag = ber->ber_rwptr[0];
487 ber->ber_rwptr = (char *) &ber->ber_usertag;
493 /* reading the tag... */
494 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
496 if (! (ber->ber_rwptr[0] & LBER_MORE_TAG_MASK) ) {
497 ber->ber_tag>>=sizeof(ber->ber_tag) -
498 ((char *) &ber->ber_tag - ber->ber_rwptr);
499 ber->ber_rwptr = (char *) &ber->ber_usertag;
502 } while (PTR_IN_VAR(ber->ber_rwptr,ber->ber_tag));
503 errno = ERANGE; /* this is a serious error. */
507 if (ber->ber_rwptr==(char *) &ber->ber_usertag) {
509 if (ber_pvt_sb_read( sb, (char *) &c, 1)<=0)
513 if ( (len==0) || ((unsigned) len>sizeof( ber->ber_len ) ) ) {
517 ber->ber_rwptr = (char *) &ber->ber_len +
518 sizeof(ber->ber_len) - len;
525 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_len)) {
528 to_go = (char *) &ber->ber_len + sizeof( ber->ber_len ) -
531 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
534 ber->ber_rwptr += res;
536 /* convert length. */
537 ber->ber_len = AC_NTOHL( ber->ber_len );
540 #if defined( EWOULDBLOCK )
542 #elif defined( EAGAIN )
549 /* now fill the buffer. */
550 if (ber->ber_buf==NULL) {
551 if (ber->ber_len > MAX_BERBUFSIZE) {
555 ber->ber_buf = (char *) malloc( ber->ber_len );
556 if (ber->ber_buf==NULL)
558 ber->ber_rwptr = ber->ber_buf;
559 ber->ber_ptr = ber->ber_buf;
560 ber->ber_end = ber->ber_buf + ber->ber_len;
562 if ((ber->ber_rwptr>=ber->ber_buf) && (ber->ber_rwptr<ber->ber_end)) {
566 to_go = ber->ber_end - ber->ber_rwptr;
569 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
575 #if defined( EWOULDBLOCK )
577 #elif defined( EAGAIN )
583 ber->ber_rwptr = NULL;
585 if ( ber->ber_debug ) {
586 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
587 "ber_get_next: tag 0x%lx len %ld contents:\n",
588 ber->ber_tag, ber->ber_len );
589 ber_log_dump( LDAP_DEBUG_BER, ber->ber_debug, ber, 1 );
591 return (ber->ber_tag);
593 assert( 0 ); /* ber structure is messed up ?*/
597 void ber_clear( BerElement *ber, int freebuf )
599 assert( ber != NULL );
600 assert( BER_VALID( ber ) );
602 if ((freebuf) && (ber->ber_buf))
603 free( ber->ber_buf );
605 ber->ber_rwptr = NULL;
608 ber->ber_valid = LBER_UNINITIALIZED;