1 /* io.c - ber general i/o routines */
3 * Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1990 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
22 #include <ac/stdlib.h>
26 #include <ac/socket.h>
27 #include <ac/string.h>
28 #include <ac/unistd.h>
35 #define LDAP_F_PRE LDAP_F_EXPORT
39 static long BerRead LDAP_P(( Sockbuf *sb, char *buf, long len ));
40 static int ber_realloc LDAP_P(( BerElement *ber, unsigned long len ));
44 /* probably far too large... */
45 #define MAX_BERBUFSIZE (128*1024)
47 #if defined( DOS ) && !defined( _WIN32 ) && (MAX_BERBUFSIZE > 65535)
48 # undef MAX_BERBUFSIZE
49 # define MAX_BERBUFSIZE 65535
53 BerRead( Sockbuf *sb, char *buf, long len )
59 assert( buf != NULL );
61 assert( SOCKBUF_VALID( sb ) );
64 if ( (c = ber_pvt_sb_read( sb, buf, len )) <= 0 ) {
78 ber_read( BerElement *ber, char *buf, unsigned long len )
80 unsigned long actuallen, nleft;
82 assert( ber != NULL );
83 assert( buf != NULL );
85 assert( BER_VALID( ber ) );
87 nleft = ber->ber_end - ber->ber_ptr;
88 actuallen = nleft < len ? nleft : len;
90 SAFEMEMCPY( buf, ber->ber_ptr, (size_t)actuallen );
92 ber->ber_ptr += actuallen;
94 return( (long)actuallen );
100 LDAP_CONST char *buf,
104 assert( ber != NULL );
105 assert( buf != NULL );
107 assert( BER_VALID( ber ) );
109 if ( nosos || ber->ber_sos == NULL ) {
110 if ( ber->ber_ptr + len > ber->ber_end ) {
111 if ( ber_realloc( ber, len ) != 0 )
114 SAFEMEMCPY( ber->ber_ptr, buf, (size_t)len );
118 if ( ber->ber_sos->sos_ptr + len > ber->ber_end ) {
119 if ( ber_realloc( ber, len ) != 0 )
122 SAFEMEMCPY( ber->ber_sos->sos_ptr, buf, (size_t)len );
123 ber->ber_sos->sos_ptr += len;
124 ber->ber_sos->sos_clen += len;
130 ber_realloc( BerElement *ber, unsigned long len )
132 unsigned long need, have, total;
137 assert( ber != NULL );
140 assert( BER_VALID( ber ) );
142 have = (ber->ber_end - ber->ber_buf) / EXBUFSIZ;
143 need = (len < EXBUFSIZ ? 1 : (len + (EXBUFSIZ - 1)) / EXBUFSIZ);
144 total = have * EXBUFSIZ + need * EXBUFSIZ;
146 oldbuf = ber->ber_buf;
148 ber->ber_buf = (char *) LBER_REALLOC( ber->ber_buf, total );
150 if ( ber->ber_buf == NULL ) {
151 ber->ber_buf = oldbuf;
155 ber->ber_end = ber->ber_buf + total;
158 * If the stinking thing was moved, we need to go through and
159 * reset all the sos and ber pointers. Offsets would've been
160 * a better idea... oh well.
163 if ( ber->ber_buf != oldbuf ) {
164 ber->ber_ptr = ber->ber_buf + (ber->ber_ptr - oldbuf);
166 for ( s = ber->ber_sos; s != NULLSEQORSET; s = s->sos_next ) {
167 off = s->sos_first - oldbuf;
168 s->sos_first = ber->ber_buf + off;
170 off = s->sos_ptr - oldbuf;
171 s->sos_ptr = ber->ber_buf + off;
179 ber_free( BerElement *ber, int freebuf )
181 assert( ber != NULL );
182 assert( BER_VALID( ber ) );
184 if ( freebuf && ber->ber_buf != NULL )
185 LBER_FREE( ber->ber_buf );
188 ber->ber_valid = LBER_UNINITIALIZED;
190 LBER_FREE( (char *) ber );
194 ber_flush( Sockbuf *sb, BerElement *ber, int freeit )
196 long nwritten, towrite, rc;
198 assert( sb != NULL );
199 assert( ber != NULL );
201 assert( SOCKBUF_VALID( ber ) );
202 assert( BER_VALID( ber ) );
204 if ( ber->ber_rwptr == NULL ) {
205 ber->ber_rwptr = ber->ber_buf;
207 towrite = ber->ber_ptr - ber->ber_rwptr;
209 if ( sb->sb_debug ) {
210 ber_log_printf( LDAP_DEBUG_ANY, sb->sb_debug,
211 "ber_flush: %ld bytes to sd %ld%s\n", towrite,
212 (long) sb->sb_sd, ber->ber_rwptr != ber->ber_buf ? " (re-flush)"
214 ber_log_bprint( LDAP_DEBUG_PACKETS, sb->sb_debug,
215 ber->ber_rwptr, towrite );
218 #if !defined(MACOS) && !defined(DOS)
219 if ( sb->sb_options & (LBER_TO_FILE | LBER_TO_FILE_ONLY) ) {
220 rc = write( sb->sb_fd, ber->ber_rwptr, towrite );
221 if ( sb->sb_options & LBER_TO_FILE_ONLY ) {
229 rc = ber_pvt_sb_write( sb, ber->ber_rwptr, towrite );
235 ber->ber_rwptr += rc;
236 } while ( towrite > 0 );
245 ber_alloc_t( int options )
249 ber_int_options.lbo_valid = LBER_INITIALIZED;
251 ber = (BerElement *) LBER_CALLOC( 1, sizeof(BerElement) );
253 if ( ber == NULLBER )
256 ber->ber_valid = LBER_VALID_BERELEMENT;
257 ber->ber_tag = LBER_DEFAULT;
258 ber->ber_options = options;
259 ber->ber_debug = ber_int_debug;
261 assert( BER_VALID( ber ) );
266 ber_alloc( void ) /* deprecated */
268 return( ber_alloc_t( 0 ) );
272 der_alloc( void ) /* deprecated */
274 return( ber_alloc_t( LBER_USE_DER ) );
278 ber_dup( LDAP_CONST BerElement *ber )
282 assert( ber != NULL );
283 assert( BER_VALID( ber ) );
285 if ( (new = ber_alloc_t( ber->ber_options )) == NULL ) {
291 assert( BER_VALID( new ) );
296 /* OLD U-Mich ber_init() */
298 ber_init_w_nullc( BerElement *ber, int options )
300 assert( ber != NULL );
302 ber_int_options.lbo_valid = LBER_INITIALIZED;
304 (void) memset( (char *)ber, '\0', sizeof( BerElement ));
305 ber->ber_valid = LBER_VALID_BERELEMENT;
306 ber->ber_tag = LBER_DEFAULT;
307 ber->ber_options = (char) options;
308 ber->ber_debug = ber_int_debug;
310 assert( BER_VALID( ber ) );
313 /* New C-API ber_init() */
314 /* This function constructs a BerElement containing a copy
315 ** of the data in the bv argument.
318 ber_init( struct berval *bv )
322 assert( bv != NULL );
324 ber_int_options.lbo_valid = LBER_INITIALIZED;
330 ber = ber_alloc_t( 0 );
332 if( ber == NULLBER ) {
333 /* allocation failed */
338 if ( ( (unsigned int) ber_write ( ber, bv->bv_val, bv->bv_len, 0 )) != bv->bv_len ) {
339 /* write failed, so free and return NULL */
344 ber_reset( ber, 1 ); /* reset the pointer to the start of the buffer */
349 /* New C-API ber_flatten routine */
350 /* This routine allocates a struct berval whose contents are a BER
351 ** encoding taken from the ber argument. The bvPtr pointer pointers to
352 ** the returned berval.
355 LDAP_CONST BerElement *ber,
356 struct berval **bvPtr)
360 assert( bvPtr != NULL );
362 ber_int_options.lbo_valid = LBER_INITIALIZED;
368 if ( (bv = LBER_MALLOC( sizeof(struct berval))) == NULL ) {
373 /* ber is null, create an empty berval */
378 /* copy the berval */
379 ptrdiff_t len = ber->ber_ptr - ber->ber_buf;
381 if ( (bv->bv_val = (char *) LBER_MALLOC( len + 1 )) == NULL ) {
386 SAFEMEMCPY( bv->bv_val, ber->ber_buf, (size_t)len );
387 bv->bv_val[len] = '\0';
396 ber_reset( BerElement *ber, int was_writing )
398 assert( ber != NULL );
399 assert( BER_VALID( ber ) );
402 ber->ber_end = ber->ber_ptr;
403 ber->ber_ptr = ber->ber_buf;
405 ber->ber_ptr = ber->ber_end;
408 ber->ber_rwptr = NULL;
412 /* return the tag - LBER_DEFAULT returned means trouble */
414 get_tag( Sockbuf *sb )
421 assert( sb != NULL );
422 assert( SOCKBUF_VALID( sb ) );
424 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
425 return( LBER_DEFAULT );
427 if ( (xbyte & LBER_BIG_TAG_MASK) != LBER_BIG_TAG_MASK )
428 return( (unsigned long) xbyte );
430 tagp = (char *) &tag;
432 for ( i = 1; i < sizeof(long); i++ ) {
433 if ( ber_pvt_sb_read( sb, (char *) &xbyte, 1 ) != 1 )
434 return( LBER_DEFAULT );
438 if ( ! (xbyte & LBER_MORE_TAG_MASK) )
443 if ( i == sizeof(long) )
444 return( LBER_DEFAULT );
446 /* want leading, not trailing 0's */
447 return( tag >> (sizeof(long) - i - 1) );
452 * A rewrite of ber_get_next that can safely be called multiple times
453 * for the same packet. It will simply continue were it stopped until
454 * a full packet is read.
458 ber_get_next( Sockbuf *sb, unsigned long *len, BerElement *ber )
460 assert( sb != NULL );
461 assert( len != NULL );
462 assert( ber != NULL );
464 assert( SOCKBUF_VALID( sb ) );
465 assert( BER_VALID( ber ) );
467 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
471 * Any ber element looks like this: tag length contents.
472 * Assuming everything's ok, we return the tag byte (we
473 * can assume a single byte), return the length in len,
474 * and the rest of the undecoded element in buf.
477 * 1) small tags (less than 128)
478 * 2) definite lengths
479 * 3) primitive encodings used whenever possible
482 if (ber->ber_rwptr == NULL) {
484 * dtest does like this assert.
486 /* assert( ber->ber_buf == NULL ); */
487 ber->ber_rwptr = (char *) &ber->ber_tag;
491 #define PTR_IN_VAR( ptr, var )\
492 (((ptr)>=(char *) &(var)) && ((ptr)< (char *) &(var)+sizeof(var)))
494 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_tag)) {
495 if (ber->ber_rwptr == (char *) &ber->ber_tag) {
496 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
498 if ((ber->ber_rwptr[0] & LBER_BIG_TAG_MASK)
499 != LBER_BIG_TAG_MASK) {
500 ber->ber_tag = ber->ber_rwptr[0];
501 ber->ber_rwptr = (char *) &ber->ber_usertag;
507 /* reading the tag... */
508 if (ber_pvt_sb_read( sb, ber->ber_rwptr, 1)<=0)
510 if (! (ber->ber_rwptr[0] & LBER_MORE_TAG_MASK) ) {
511 ber->ber_tag>>=sizeof(ber->ber_tag) -
512 ((char *) &ber->ber_tag - ber->ber_rwptr);
513 ber->ber_rwptr = (char *) &ber->ber_usertag;
516 } while (PTR_IN_VAR(ber->ber_rwptr,ber->ber_tag));
517 errno = ERANGE; /* this is a serious error. */
521 if (ber->ber_rwptr==(char *) &ber->ber_usertag) {
523 if (ber_pvt_sb_read( sb, (char *) &c, 1)<=0)
527 if ( (len==0) || ((unsigned) len>sizeof( ber->ber_len ) ) ) {
531 ber->ber_rwptr = (char *) &ber->ber_len +
532 sizeof(ber->ber_len) - len;
539 if (PTR_IN_VAR(ber->ber_rwptr, ber->ber_len)) {
542 to_go = (char *) &ber->ber_len + sizeof( ber->ber_len ) -
545 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
548 ber->ber_rwptr += res;
550 /* convert length. */
551 ber->ber_len = AC_NTOHL( ber->ber_len );
554 #if defined( EWOULDBLOCK )
556 #elif defined( EAGAIN )
563 /* now fill the buffer. */
564 if (ber->ber_buf==NULL) {
565 if (ber->ber_len > MAX_BERBUFSIZE) {
569 ber->ber_buf = (char *) LBER_MALLOC( ber->ber_len );
570 if (ber->ber_buf==NULL)
572 ber->ber_rwptr = ber->ber_buf;
573 ber->ber_ptr = ber->ber_buf;
574 ber->ber_end = ber->ber_buf + ber->ber_len;
576 if ((ber->ber_rwptr>=ber->ber_buf) && (ber->ber_rwptr<ber->ber_end)) {
580 to_go = ber->ber_end - ber->ber_rwptr;
583 res = ber_pvt_sb_read( sb, ber->ber_rwptr, to_go );
589 #if defined( EWOULDBLOCK )
591 #elif defined( EAGAIN )
597 ber->ber_rwptr = NULL;
599 if ( ber->ber_debug ) {
600 ber_log_printf( LDAP_DEBUG_TRACE, ber->ber_debug,
601 "ber_get_next: tag 0x%lx len %ld contents:\n",
602 ber->ber_tag, ber->ber_len );
603 ber_log_dump( LDAP_DEBUG_BER, ber->ber_debug, ber, 1 );
605 return (ber->ber_tag);
607 assert( 0 ); /* ber structure is messed up ?*/