diff options
author | Colin Watson <cjwatson@debian.org> | 2017-10-04 11:23:58 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2017-10-04 11:23:58 +0100 |
commit | 62f54f20bf351468e0124f63cc2902ee40d9b0e9 (patch) | |
tree | 3e090f2711b94ca5029d3fa3e8047b1ed1448b1f /openbsd-compat | |
parent | 6fabaf6fd9b07cc8bc6a17c9c4a5b76849cfc874 (diff) | |
parent | 66bf74a92131b7effe49fb0eefe5225151869dc5 (diff) |
Import openssh_7.6p1.orig.tar.gz
Diffstat (limited to 'openbsd-compat')
-rw-r--r-- | openbsd-compat/Makefile.in | 4 | ||||
-rw-r--r-- | openbsd-compat/bsd-err.c | 6 | ||||
-rw-r--r-- | openbsd-compat/bsd-getpagesize.c | 23 | ||||
-rw-r--r-- | openbsd-compat/bsd-malloc.c | 55 | ||||
-rw-r--r-- | openbsd-compat/bsd-misc.c | 10 | ||||
-rw-r--r-- | openbsd-compat/bsd-misc.h | 4 | ||||
-rw-r--r-- | openbsd-compat/explicit_bzero.c | 4 | ||||
-rw-r--r-- | openbsd-compat/fmt_scaled.c | 18 | ||||
-rw-r--r-- | openbsd-compat/freezero.c | 29 | ||||
-rw-r--r-- | openbsd-compat/openbsd-compat.h | 12 | ||||
-rw-r--r-- | openbsd-compat/port-tun.c | 93 | ||||
-rw-r--r-- | openbsd-compat/port-tun.h | 5 | ||||
-rw-r--r-- | openbsd-compat/recallocarray.c | 90 |
13 files changed, 297 insertions, 56 deletions
diff --git a/openbsd-compat/Makefile.in b/openbsd-compat/Makefile.in index d51eacf65..ac8ae4305 100644 --- a/openbsd-compat/Makefile.in +++ b/openbsd-compat/Makefile.in | |||
@@ -16,9 +16,9 @@ RANLIB=@RANLIB@ | |||
16 | INSTALL=@INSTALL@ | 16 | INSTALL=@INSTALL@ |
17 | LDFLAGS=-L. @LDFLAGS@ | 17 | LDFLAGS=-L. @LDFLAGS@ |
18 | 18 | ||
19 | OPENBSD=base64.o basename.o bcrypt_pbkdf.o bindresvport.o blowfish.o daemon.o dirname.o fmt_scaled.o getcwd.o getgrouplist.o getopt_long.o getrrsetbyname.o glob.o inet_aton.o inet_ntoa.o inet_ntop.o mktemp.o pwcache.o readpassphrase.o reallocarray.o realpath.o rresvport.o setenv.o setproctitle.o sha1.o sha2.o rmd160.o md5.o sigact.o strcasestr.o strlcat.o strlcpy.o strmode.o strnlen.o strptime.o strsep.o strtonum.o strtoll.o strtoul.o strtoull.o timingsafe_bcmp.o vis.o blowfish.o bcrypt_pbkdf.o explicit_bzero.o | 19 | OPENBSD=base64.o basename.o bcrypt_pbkdf.o bindresvport.o blowfish.o daemon.o dirname.o fmt_scaled.o getcwd.o getgrouplist.o getopt_long.o getrrsetbyname.o glob.o inet_aton.o inet_ntoa.o inet_ntop.o mktemp.o pwcache.o readpassphrase.o reallocarray.o realpath.o recallocarray.o rresvport.o setenv.o setproctitle.o sha1.o sha2.o rmd160.o md5.o sigact.o strcasestr.o strlcat.o strlcpy.o strmode.o strnlen.o strptime.o strsep.o strtonum.o strtoll.o strtoul.o strtoull.o timingsafe_bcmp.o vis.o blowfish.o bcrypt_pbkdf.o explicit_bzero.o freezero.o |
20 | 20 | ||
21 | COMPAT=arc4random.o bsd-asprintf.o bsd-closefrom.o bsd-cray.o bsd-cygwin_util.o bsd-getpeereid.o getrrsetbyname-ldns.o bsd-err.o bsd-misc.o bsd-nextstep.o bsd-openpty.o bsd-poll.o bsd-setres_id.o bsd-snprintf.o bsd-statvfs.o bsd-waitpid.o fake-rfc2553.o openssl-compat.o xcrypt.o kludge-fd_set.o | 21 | COMPAT=arc4random.o bsd-asprintf.o bsd-closefrom.o bsd-cray.o bsd-cygwin_util.o bsd-getpeereid.o getrrsetbyname-ldns.o bsd-err.o bsd-getpagesize.o bsd-misc.o bsd-nextstep.o bsd-openpty.o bsd-poll.o bsd-malloc.o bsd-setres_id.o bsd-snprintf.o bsd-statvfs.o bsd-waitpid.o fake-rfc2553.o openssl-compat.o xcrypt.o kludge-fd_set.o |
22 | 22 | ||
23 | PORTS=port-aix.o port-irix.o port-linux.o port-solaris.o port-tun.o port-uw.o | 23 | PORTS=port-aix.o port-irix.o port-linux.o port-solaris.o port-tun.o port-uw.o |
24 | 24 | ||
diff --git a/openbsd-compat/bsd-err.c b/openbsd-compat/bsd-err.c index ab10646f0..e4ed22b86 100644 --- a/openbsd-compat/bsd-err.c +++ b/openbsd-compat/bsd-err.c | |||
@@ -27,6 +27,12 @@ | |||
27 | 27 | ||
28 | #include "includes.h" | 28 | #include "includes.h" |
29 | 29 | ||
30 | #include <errno.h> | ||
31 | #include <stdarg.h> | ||
32 | #include <stdio.h> | ||
33 | #include <stdlib.h> | ||
34 | #include <string.h> | ||
35 | |||
30 | #ifndef HAVE_ERR | 36 | #ifndef HAVE_ERR |
31 | void | 37 | void |
32 | err(int r, const char *fmt, ...) | 38 | err(int r, const char *fmt, ...) |
diff --git a/openbsd-compat/bsd-getpagesize.c b/openbsd-compat/bsd-getpagesize.c new file mode 100644 index 000000000..9daddfbd3 --- /dev/null +++ b/openbsd-compat/bsd-getpagesize.c | |||
@@ -0,0 +1,23 @@ | |||
1 | /* Placed in the public domain */ | ||
2 | |||
3 | #ifndef HAVE_GETPAGESIZE | ||
4 | |||
5 | #include <unistd.h> | ||
6 | #include <limits.h> | ||
7 | |||
8 | int | ||
9 | getpagesize(void) | ||
10 | { | ||
11 | #if defined(HAVE_SYSCONF) && defined(_SC_PAGESIZE) | ||
12 | long r = sysconf(_SC_PAGESIZE); | ||
13 | if (r > 0 && r < INT_MAX) | ||
14 | return (int)r; | ||
15 | #endif | ||
16 | /* | ||
17 | * This is at the lower end of common values and appropriate for | ||
18 | * our current use of getpagesize() in recallocarray(). | ||
19 | */ | ||
20 | return 4096; | ||
21 | } | ||
22 | |||
23 | #endif /* HAVE_GETPAGESIZE */ | ||
diff --git a/openbsd-compat/bsd-malloc.c b/openbsd-compat/bsd-malloc.c new file mode 100644 index 000000000..6402ab588 --- /dev/null +++ b/openbsd-compat/bsd-malloc.c | |||
@@ -0,0 +1,55 @@ | |||
1 | /* | ||
2 | * Copyright (c) 2017 Darren Tucker (dtucker at zip com au). | ||
3 | * | ||
4 | * Permission to use, copy, modify, and distribute this software for any | ||
5 | * purpose with or without fee is hereby granted, provided that the above | ||
6 | * copyright notice and this permission notice appear in all copies. | ||
7 | * | ||
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
15 | */ | ||
16 | |||
17 | #include "config.h" | ||
18 | #undef malloc | ||
19 | #undef calloc | ||
20 | #undef realloc | ||
21 | |||
22 | #include <sys/types.h> | ||
23 | #include <stdlib.h> | ||
24 | |||
25 | #if defined(HAVE_MALLOC) && HAVE_MALLOC == 0 | ||
26 | void * | ||
27 | rpl_malloc(size_t size) | ||
28 | { | ||
29 | if (size == 0) | ||
30 | size = 1; | ||
31 | return malloc(size); | ||
32 | } | ||
33 | #endif | ||
34 | |||
35 | #if defined(HAVE_CALLOC) && HAVE_CALLOC == 0 | ||
36 | void * | ||
37 | rpl_calloc(size_t nmemb, size_t size) | ||
38 | { | ||
39 | if (nmemb == 0) | ||
40 | nmemb = 1; | ||
41 | if (size == 0) | ||
42 | size = 1; | ||
43 | return calloc(nmemb, size); | ||
44 | } | ||
45 | #endif | ||
46 | |||
47 | #if defined (HAVE_REALLOC) && HAVE_REALLOC == 0 | ||
48 | void * | ||
49 | rpl_realloc(void *ptr, size_t size) | ||
50 | { | ||
51 | if (size == 0) | ||
52 | size = 1; | ||
53 | return realloc(ptr, size); | ||
54 | } | ||
55 | #endif | ||
diff --git a/openbsd-compat/bsd-misc.c b/openbsd-compat/bsd-misc.c index cfd73260a..29f6ad38c 100644 --- a/openbsd-compat/bsd-misc.c +++ b/openbsd-compat/bsd-misc.c | |||
@@ -104,6 +104,16 @@ const char *strerror(int e) | |||
104 | } | 104 | } |
105 | #endif | 105 | #endif |
106 | 106 | ||
107 | #if !defined(HAVE_STRSIGNAL) | ||
108 | char *strsignal(int sig) | ||
109 | { | ||
110 | static char buf[16]; | ||
111 | |||
112 | (void)snprintf(buf, sizeof(buf), "%d", sig); | ||
113 | return buf; | ||
114 | } | ||
115 | #endif | ||
116 | |||
107 | #ifndef HAVE_UTIMES | 117 | #ifndef HAVE_UTIMES |
108 | int utimes(char *filename, struct timeval *tvp) | 118 | int utimes(char *filename, struct timeval *tvp) |
109 | { | 119 | { |
diff --git a/openbsd-compat/bsd-misc.h b/openbsd-compat/bsd-misc.h index 70a538f04..0b1a3504f 100644 --- a/openbsd-compat/bsd-misc.h +++ b/openbsd-compat/bsd-misc.h | |||
@@ -49,6 +49,10 @@ int setegid(uid_t); | |||
49 | const char *strerror(int); | 49 | const char *strerror(int); |
50 | #endif | 50 | #endif |
51 | 51 | ||
52 | #if !defined(HAVE_STRSIGNAL) | ||
53 | char *strsignal(int); | ||
54 | #endif | ||
55 | |||
52 | #if !defined(HAVE_SETLINEBUF) | 56 | #if !defined(HAVE_SETLINEBUF) |
53 | #define setlinebuf(a) (setvbuf((a), NULL, _IOLBF, 0)) | 57 | #define setlinebuf(a) (setvbuf((a), NULL, _IOLBF, 0)) |
54 | #endif | 58 | #endif |
diff --git a/openbsd-compat/explicit_bzero.c b/openbsd-compat/explicit_bzero.c index 5078134d1..53a003472 100644 --- a/openbsd-compat/explicit_bzero.c +++ b/openbsd-compat/explicit_bzero.c | |||
@@ -20,6 +20,8 @@ | |||
20 | void | 20 | void |
21 | explicit_bzero(void *p, size_t n) | 21 | explicit_bzero(void *p, size_t n) |
22 | { | 22 | { |
23 | if (n == 0) | ||
24 | return; | ||
23 | (void)memset_s(p, n, 0, n); | 25 | (void)memset_s(p, n, 0, n); |
24 | } | 26 | } |
25 | 27 | ||
@@ -34,6 +36,8 @@ static void (* volatile ssh_bzero)(void *, size_t) = bzero; | |||
34 | void | 36 | void |
35 | explicit_bzero(void *p, size_t n) | 37 | explicit_bzero(void *p, size_t n) |
36 | { | 38 | { |
39 | if (n == 0) | ||
40 | return; | ||
37 | /* | 41 | /* |
38 | * clang -fsanitize=memory needs to intercept memset-like functions | 42 | * clang -fsanitize=memory needs to intercept memset-like functions |
39 | * to correctly detect memory initialisation. Make sure one is called | 43 | * to correctly detect memory initialisation. Make sure one is called |
diff --git a/openbsd-compat/fmt_scaled.c b/openbsd-compat/fmt_scaled.c index e5533b2de..7c5193e26 100644 --- a/openbsd-compat/fmt_scaled.c +++ b/openbsd-compat/fmt_scaled.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: fmt_scaled.c,v 1.13 2017/03/11 23:37:23 djm Exp $ */ | 1 | /* $OpenBSD: fmt_scaled.c,v 1.16 2017/03/16 02:40:46 dtucker Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2001, 2002, 2003 Ian F. Darwin. All rights reserved. | 4 | * Copyright (c) 2001, 2002, 2003 Ian F. Darwin. All rights reserved. |
@@ -125,22 +125,30 @@ scan_scaled(char *scaled, long long *result) | |||
125 | /* ignore extra fractional digits */ | 125 | /* ignore extra fractional digits */ |
126 | continue; | 126 | continue; |
127 | fract_digits++; /* for later scaling */ | 127 | fract_digits++; /* for later scaling */ |
128 | if (fpart >= LLONG_MAX / 10) { | 128 | if (fpart > LLONG_MAX / 10) { |
129 | errno = ERANGE; | 129 | errno = ERANGE; |
130 | return -1; | 130 | return -1; |
131 | } | 131 | } |
132 | fpart *= 10; | 132 | fpart *= 10; |
133 | if (i > LLONG_MAX - fpart) { | ||
134 | errno = ERANGE; | ||
135 | return -1; | ||
136 | } | ||
133 | fpart += i; | 137 | fpart += i; |
134 | } else { /* normal digit */ | 138 | } else { /* normal digit */ |
135 | if (++ndigits >= MAX_DIGITS) { | 139 | if (++ndigits >= MAX_DIGITS) { |
136 | errno = ERANGE; | 140 | errno = ERANGE; |
137 | return -1; | 141 | return -1; |
138 | } | 142 | } |
139 | if (whole >= LLONG_MAX / 10) { | 143 | if (whole > LLONG_MAX / 10) { |
140 | errno = ERANGE; | 144 | errno = ERANGE; |
141 | return -1; | 145 | return -1; |
142 | } | 146 | } |
143 | whole *= 10; | 147 | whole *= 10; |
148 | if (i > LLONG_MAX - whole) { | ||
149 | errno = ERANGE; | ||
150 | return -1; | ||
151 | } | ||
144 | whole += i; | 152 | whole += i; |
145 | } | 153 | } |
146 | } | 154 | } |
@@ -170,7 +178,9 @@ scan_scaled(char *scaled, long long *result) | |||
170 | } | 178 | } |
171 | scale_fact = scale_factors[i]; | 179 | scale_fact = scale_factors[i]; |
172 | 180 | ||
173 | if (whole >= LLONG_MAX / scale_fact) { | 181 | /* check for overflow and underflow after scaling */ |
182 | if (whole > LLONG_MAX / scale_fact || | ||
183 | whole < LLONG_MIN / scale_fact) { | ||
174 | errno = ERANGE; | 184 | errno = ERANGE; |
175 | return -1; | 185 | return -1; |
176 | } | 186 | } |
diff --git a/openbsd-compat/freezero.c b/openbsd-compat/freezero.c new file mode 100644 index 000000000..3af8f4a73 --- /dev/null +++ b/openbsd-compat/freezero.c | |||
@@ -0,0 +1,29 @@ | |||
1 | /* | ||
2 | * Copyright (c) 2008, 2010, 2011, 2016 Otto Moerbeek <otto@drijf.net> | ||
3 | * | ||
4 | * Permission to use, copy, modify, and distribute this software for any | ||
5 | * purpose with or without fee is hereby granted, provided that the above | ||
6 | * copyright notice and this permission notice appear in all copies. | ||
7 | * | ||
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
15 | */ | ||
16 | |||
17 | #include "includes.h" | ||
18 | |||
19 | #ifndef HAVE_FREEZERO | ||
20 | |||
21 | void | ||
22 | freezero(void *ptr, size_t sz) | ||
23 | { | ||
24 | explicit_bzero(ptr, sz); | ||
25 | free(ptr); | ||
26 | } | ||
27 | |||
28 | #endif /* HAVE_FREEZERO */ | ||
29 | |||
diff --git a/openbsd-compat/openbsd-compat.h b/openbsd-compat/openbsd-compat.h index cff547745..cac799e84 100644 --- a/openbsd-compat/openbsd-compat.h +++ b/openbsd-compat/openbsd-compat.h | |||
@@ -60,6 +60,10 @@ int bindresvport_sa(int sd, struct sockaddr *sa); | |||
60 | void closefrom(int); | 60 | void closefrom(int); |
61 | #endif | 61 | #endif |
62 | 62 | ||
63 | #ifndef HAVE_GETPAGESIZE | ||
64 | int getpagesize(void); | ||
65 | #endif | ||
66 | |||
63 | #ifndef HAVE_GETCWD | 67 | #ifndef HAVE_GETCWD |
64 | char *getcwd(char *pt, size_t size); | 68 | char *getcwd(char *pt, size_t size); |
65 | #endif | 69 | #endif |
@@ -68,6 +72,10 @@ char *getcwd(char *pt, size_t size); | |||
68 | void *reallocarray(void *, size_t, size_t); | 72 | void *reallocarray(void *, size_t, size_t); |
69 | #endif | 73 | #endif |
70 | 74 | ||
75 | #ifndef HAVE_RECALLOCARRAY | ||
76 | void *recallocarray(void *, size_t, size_t, size_t); | ||
77 | #endif | ||
78 | |||
71 | #if !defined(HAVE_REALPATH) || defined(BROKEN_REALPATH) | 79 | #if !defined(HAVE_REALPATH) || defined(BROKEN_REALPATH) |
72 | /* | 80 | /* |
73 | * glibc's FORTIFY_SOURCE can redefine this and prevent us picking up the | 81 | * glibc's FORTIFY_SOURCE can redefine this and prevent us picking up the |
@@ -296,6 +304,10 @@ int bcrypt_pbkdf(const char *, size_t, const u_int8_t *, size_t, | |||
296 | void explicit_bzero(void *p, size_t n); | 304 | void explicit_bzero(void *p, size_t n); |
297 | #endif | 305 | #endif |
298 | 306 | ||
307 | #ifndef HAVE_FREEZERO | ||
308 | void freezero(void *, size_t); | ||
309 | #endif | ||
310 | |||
299 | char *xcrypt(const char *password, const char *salt); | 311 | char *xcrypt(const char *password, const char *salt); |
300 | char *shadow_pw(struct passwd *pw); | 312 | char *shadow_pw(struct passwd *pw); |
301 | 313 | ||
diff --git a/openbsd-compat/port-tun.c b/openbsd-compat/port-tun.c index a444adf1d..7579c6084 100644 --- a/openbsd-compat/port-tun.c +++ b/openbsd-compat/port-tun.c | |||
@@ -199,84 +199,81 @@ sys_tun_open(int tun, int mode) | |||
199 | */ | 199 | */ |
200 | 200 | ||
201 | #if defined(SSH_TUN_FILTER) | 201 | #if defined(SSH_TUN_FILTER) |
202 | /* | ||
203 | * The tunnel forwarding protocol prepends the address family of forwarded | ||
204 | * IP packets using OpenBSD's numbers. | ||
205 | */ | ||
202 | #define OPENBSD_AF_INET 2 | 206 | #define OPENBSD_AF_INET 2 |
203 | #define OPENBSD_AF_INET6 24 | 207 | #define OPENBSD_AF_INET6 24 |
204 | 208 | ||
205 | int | 209 | int |
206 | sys_tun_infilter(struct Channel *c, char *buf, int len) | 210 | sys_tun_infilter(struct ssh *ssh, struct Channel *c, char *buf, int _len) |
207 | { | 211 | { |
212 | int r; | ||
213 | size_t len; | ||
214 | char *ptr = buf; | ||
208 | #if defined(SSH_TUN_PREPEND_AF) | 215 | #if defined(SSH_TUN_PREPEND_AF) |
209 | char rbuf[CHAN_RBUF]; | 216 | char rbuf[CHAN_RBUF]; |
210 | struct ip *iph; | 217 | struct ip iph; |
211 | #endif | 218 | #endif |
212 | u_int32_t *af; | 219 | #if defined(SSH_TUN_PREPEND_AF) || defined(SSH_TUN_COMPAT_AF) |
213 | char *ptr = buf; | 220 | u_int32_t af; |
214 | int r; | ||
215 | |||
216 | #if defined(SSH_TUN_PREPEND_AF) | ||
217 | if (len <= 0 || len > (int)(sizeof(rbuf) - sizeof(*af))) | ||
218 | return (-1); | ||
219 | ptr = (char *)&rbuf[0]; | ||
220 | bcopy(buf, ptr + sizeof(u_int32_t), len); | ||
221 | len += sizeof(u_int32_t); | ||
222 | af = (u_int32_t *)ptr; | ||
223 | |||
224 | iph = (struct ip *)(ptr + sizeof(u_int32_t)); | ||
225 | switch (iph->ip_v) { | ||
226 | case 6: | ||
227 | *af = AF_INET6; | ||
228 | break; | ||
229 | case 4: | ||
230 | default: | ||
231 | *af = AF_INET; | ||
232 | break; | ||
233 | } | ||
234 | #endif | 221 | #endif |
235 | 222 | ||
236 | #if defined(SSH_TUN_COMPAT_AF) | 223 | /* XXX update channel input filter API to use unsigned length */ |
237 | if (len < (int)sizeof(u_int32_t)) | 224 | if (_len < 0) |
238 | return (-1); | 225 | return -1; |
226 | len = _len; | ||
239 | 227 | ||
240 | af = (u_int32_t *)ptr; | 228 | #if defined(SSH_TUN_PREPEND_AF) |
241 | if (*af == htonl(AF_INET6)) | 229 | if (len <= sizeof(iph) || len > sizeof(rbuf) - 4) |
242 | *af = htonl(OPENBSD_AF_INET6); | 230 | return -1; |
243 | else | 231 | /* Determine address family from packet IP header. */ |
244 | *af = htonl(OPENBSD_AF_INET); | 232 | memcpy(&iph, buf, sizeof(iph)); |
233 | af = iph.ip_v == 6 ? OPENBSD_AF_INET6 : OPENBSD_AF_INET; | ||
234 | /* Prepend address family to packet using OpenBSD constants */ | ||
235 | memcpy(rbuf + 4, buf, len); | ||
236 | len += 4; | ||
237 | POKE_U32(rbuf, af); | ||
238 | ptr = rbuf; | ||
239 | #elif defined(SSH_TUN_COMPAT_AF) | ||
240 | /* Convert existing address family header to OpenBSD value */ | ||
241 | if (len <= 4) | ||
242 | return -1; | ||
243 | af = PEEK_U32(buf); | ||
244 | /* Put it back */ | ||
245 | POKE_U32(buf, af == AF_INET6 ? OPENBSD_AF_INET6 : OPENBSD_AF_INET); | ||
245 | #endif | 246 | #endif |
246 | 247 | ||
247 | if ((r = sshbuf_put_string(&c->input, ptr, len)) != 0) | 248 | if ((r = sshbuf_put_string(c->input, ptr, len)) != 0) |
248 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); | 249 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
249 | return (0); | 250 | return (0); |
250 | } | 251 | } |
251 | 252 | ||
252 | u_char * | 253 | u_char * |
253 | sys_tun_outfilter(struct Channel *c, u_char **data, u_int *dlen) | 254 | sys_tun_outfilter(struct ssh *ssh, struct Channel *c, |
255 | u_char **data, size_t *dlen) | ||
254 | { | 256 | { |
255 | u_char *buf; | 257 | u_char *buf; |
256 | u_int32_t *af; | 258 | u_int32_t af; |
257 | int r; | 259 | int r; |
258 | size_t xxx_dlen; | ||
259 | 260 | ||
260 | /* XXX new API is incompatible with this signature. */ | 261 | /* XXX new API is incompatible with this signature. */ |
261 | if ((r = sshbuf_get_string(&c->output, data, &xxx_dlen)) != 0) | 262 | if ((r = sshbuf_get_string(c->output, data, dlen)) != 0) |
262 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); | 263 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
263 | if (dlen != NULL) | 264 | if (*dlen < sizeof(af)) |
264 | *dlen = xxx_dlen; | ||
265 | if (*dlen < sizeof(*af)) | ||
266 | return (NULL); | 265 | return (NULL); |
267 | buf = *data; | 266 | buf = *data; |
268 | 267 | ||
269 | #if defined(SSH_TUN_PREPEND_AF) | 268 | #if defined(SSH_TUN_PREPEND_AF) |
270 | *dlen -= sizeof(u_int32_t); | 269 | /* skip address family */ |
271 | buf = *data + sizeof(u_int32_t); | 270 | *dlen -= sizeof(af); |
271 | buf = *data + sizeof(af); | ||
272 | #elif defined(SSH_TUN_COMPAT_AF) | 272 | #elif defined(SSH_TUN_COMPAT_AF) |
273 | af = ntohl(*(u_int32_t *)buf); | 273 | /* translate address family */ |
274 | if (*af == OPENBSD_AF_INET6) | 274 | af = (PEEK_U32(buf) == OPENBSD_AF_INET6) ? AF_INET6 : AF_INET; |
275 | *af = htonl(AF_INET6); | 275 | POKE_U32(buf, af); |
276 | else | ||
277 | *af = htonl(AF_INET); | ||
278 | #endif | 276 | #endif |
279 | |||
280 | return (buf); | 277 | return (buf); |
281 | } | 278 | } |
282 | #endif /* SSH_TUN_FILTER */ | 279 | #endif /* SSH_TUN_FILTER */ |
diff --git a/openbsd-compat/port-tun.h b/openbsd-compat/port-tun.h index c53df01fc..103514370 100644 --- a/openbsd-compat/port-tun.h +++ b/openbsd-compat/port-tun.h | |||
@@ -18,6 +18,7 @@ | |||
18 | #define _PORT_TUN_H | 18 | #define _PORT_TUN_H |
19 | 19 | ||
20 | struct Channel; | 20 | struct Channel; |
21 | struct ssh; | ||
21 | 22 | ||
22 | #if defined(SSH_TUN_LINUX) || defined(SSH_TUN_FREEBSD) | 23 | #if defined(SSH_TUN_LINUX) || defined(SSH_TUN_FREEBSD) |
23 | # define CUSTOM_SYS_TUN_OPEN | 24 | # define CUSTOM_SYS_TUN_OPEN |
@@ -26,8 +27,8 @@ int sys_tun_open(int, int); | |||
26 | 27 | ||
27 | #if defined(SSH_TUN_COMPAT_AF) || defined(SSH_TUN_PREPEND_AF) | 28 | #if defined(SSH_TUN_COMPAT_AF) || defined(SSH_TUN_PREPEND_AF) |
28 | # define SSH_TUN_FILTER | 29 | # define SSH_TUN_FILTER |
29 | int sys_tun_infilter(struct Channel *, char *, int); | 30 | int sys_tun_infilter(struct ssh *, struct Channel *, char *, int); |
30 | u_char *sys_tun_outfilter(struct Channel *, u_char **, u_int *); | 31 | u_char *sys_tun_outfilter(struct ssh *, struct Channel *, u_char **, size_t *); |
31 | #endif | 32 | #endif |
32 | 33 | ||
33 | #endif | 34 | #endif |
diff --git a/openbsd-compat/recallocarray.c b/openbsd-compat/recallocarray.c new file mode 100644 index 000000000..3e1156ce2 --- /dev/null +++ b/openbsd-compat/recallocarray.c | |||
@@ -0,0 +1,90 @@ | |||
1 | /* $OpenBSD: recallocarray.c,v 1.1 2017/03/06 18:44:21 otto Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2008, 2017 Otto Moerbeek <otto@drijf.net> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | /* OPENBSD ORIGINAL: lib/libc/stdlib/recallocarray.c */ | ||
19 | |||
20 | #include "includes.h" | ||
21 | #ifndef HAVE_RECALLOCARRAY | ||
22 | |||
23 | #include <errno.h> | ||
24 | #include <stdlib.h> | ||
25 | #ifdef HAVE_STDINT_H | ||
26 | #include <stdint.h> | ||
27 | #endif | ||
28 | #include <string.h> | ||
29 | #include <unistd.h> | ||
30 | |||
31 | /* | ||
32 | * This is sqrt(SIZE_MAX+1), as s1*s2 <= SIZE_MAX | ||
33 | * if both s1 < MUL_NO_OVERFLOW and s2 < MUL_NO_OVERFLOW | ||
34 | */ | ||
35 | #define MUL_NO_OVERFLOW ((size_t)1 << (sizeof(size_t) * 4)) | ||
36 | |||
37 | void * | ||
38 | recallocarray(void *ptr, size_t oldnmemb, size_t newnmemb, size_t size) | ||
39 | { | ||
40 | size_t oldsize, newsize; | ||
41 | void *newptr; | ||
42 | |||
43 | if (ptr == NULL) | ||
44 | return calloc(newnmemb, size); | ||
45 | |||
46 | if ((newnmemb >= MUL_NO_OVERFLOW || size >= MUL_NO_OVERFLOW) && | ||
47 | newnmemb > 0 && SIZE_MAX / newnmemb < size) { | ||
48 | errno = ENOMEM; | ||
49 | return NULL; | ||
50 | } | ||
51 | newsize = newnmemb * size; | ||
52 | |||
53 | if ((oldnmemb >= MUL_NO_OVERFLOW || size >= MUL_NO_OVERFLOW) && | ||
54 | oldnmemb > 0 && SIZE_MAX / oldnmemb < size) { | ||
55 | errno = EINVAL; | ||
56 | return NULL; | ||
57 | } | ||
58 | oldsize = oldnmemb * size; | ||
59 | |||
60 | /* | ||
61 | * Don't bother too much if we're shrinking just a bit, | ||
62 | * we do not shrink for series of small steps, oh well. | ||
63 | */ | ||
64 | if (newsize <= oldsize) { | ||
65 | size_t d = oldsize - newsize; | ||
66 | |||
67 | if (d < oldsize / 2 && d < (size_t)getpagesize()) { | ||
68 | memset((char *)ptr + newsize, 0, d); | ||
69 | return ptr; | ||
70 | } | ||
71 | } | ||
72 | |||
73 | newptr = malloc(newsize); | ||
74 | if (newptr == NULL) | ||
75 | return NULL; | ||
76 | |||
77 | if (newsize > oldsize) { | ||
78 | memcpy(newptr, ptr, oldsize); | ||
79 | memset((char *)newptr + oldsize, 0, newsize - oldsize); | ||
80 | } else | ||
81 | memcpy(newptr, ptr, newsize); | ||
82 | |||
83 | explicit_bzero(ptr, oldsize); | ||
84 | free(ptr); | ||
85 | |||
86 | return newptr; | ||
87 | } | ||
88 | /* DEF_WEAK(recallocarray); */ | ||
89 | |||
90 | #endif /* HAVE_RECALLOCARRAY */ | ||