void m_add(struct mproc *p, const void *data, size_t len) { size_t alloc; void *tmp; if (p->m_pos + len + IMSG_HEADER_SIZE > MAX_IMSGSIZE) { log_warnx("warn: message to large"); fatal(NULL); } alloc = p->m_alloc ? p->m_alloc : 128; while (p->m_pos + len > alloc) alloc *= 2; if (alloc != p->m_alloc) { log_trace(TRACE_MPROC, "mproc: %s -> %s: realloc %zu -> %zu", proc_name(smtpd_process), proc_name(p->proc), p->m_alloc, alloc); tmp = recallocarray(p->m_buf, p->m_alloc, alloc, 1); if (tmp == NULL) fatal("realloc"); p->m_alloc = alloc; p->m_buf = tmp; } memmove(p->m_buf + p->m_pos, data, len); p->m_pos += len; }
/* * Records a public key used in authentication. This is used for logging * and to ensure that the same key is not subsequently accepted again for * multiple authentication. */ void auth2_record_key(Authctxt *authctxt, int authenticated, const struct sshkey *key) { struct sshkey **tmp, *dup; int r; if ((r = sshkey_from_private(key, &dup)) != 0) fatal("%s: copy key: %s", __func__, ssh_err(r)); sshkey_free(authctxt->auth_method_key); authctxt->auth_method_key = dup; if (!authenticated) return; /* If authenticated, make sure we don't accept this key again */ if ((r = sshkey_from_private(key, &dup)) != 0) fatal("%s: copy key: %s", __func__, ssh_err(r)); if (authctxt->nprev_keys >= INT_MAX || (tmp = recallocarray(authctxt->prev_keys, authctxt->nprev_keys, authctxt->nprev_keys + 1, sizeof(*authctxt->prev_keys))) == NULL) fatal("%s: reallocarray failed", __func__); authctxt->prev_keys = tmp; authctxt->prev_keys[authctxt->nprev_keys] = dup; authctxt->nprev_keys++; }
void * mandoc_recallocarray(void *ptr, size_t oldnum, size_t num, size_t size) { ptr = recallocarray(ptr, oldnum, num, size); if (ptr == NULL) err((int)MANDOCLEVEL_SYSERR, NULL); return ptr; }
struct sshauthopt * sshauthopt_parse(const char *opts, const char **errstrp) { char **oarray, *opt, *cp, *tmp, *host; int r; struct sshauthopt *ret = NULL; const char *errstr = "unknown error"; uint64_t valid_before; if (errstrp != NULL) *errstrp = NULL; if ((ret = sshauthopt_new_with_keys_defaults()) == NULL) goto alloc_fail; if (opts == NULL) return ret; while (*opts && *opts != ' ' && *opts != '\t') { /* flag options */ if ((r = opt_flag("restrict", 0, &opts)) != -1) { ret->restricted = 1; ret->permit_port_forwarding_flag = 0; ret->permit_agent_forwarding_flag = 0; ret->permit_x11_forwarding_flag = 0; ret->permit_pty_flag = 0; ret->permit_user_rc = 0; } else if ((r = opt_flag("cert-authority", 0, &opts)) != -1) { ret->cert_authority = r; } else if ((r = opt_flag("port-forwarding", 1, &opts)) != -1) { ret->permit_port_forwarding_flag = r == 1; } else if ((r = opt_flag("agent-forwarding", 1, &opts)) != -1) { ret->permit_agent_forwarding_flag = r == 1; } else if ((r = opt_flag("x11-forwarding", 1, &opts)) != -1) { ret->permit_x11_forwarding_flag = r == 1; } else if ((r = opt_flag("pty", 1, &opts)) != -1) { ret->permit_pty_flag = r == 1; } else if ((r = opt_flag("user-rc", 1, &opts)) != -1) { ret->permit_user_rc = r == 1; } else if (opt_match(&opts, "command")) { if (ret->force_command != NULL) { errstr = "multiple \"command\" clauses"; goto fail; } ret->force_command = opt_dequote(&opts, &errstr); if (ret->force_command == NULL) goto fail; } else if (opt_match(&opts, "principals")) { if (ret->cert_principals != NULL) { errstr = "multiple \"principals\" clauses"; goto fail; } ret->cert_principals = opt_dequote(&opts, &errstr); if (ret->cert_principals == NULL) goto fail; } else if (opt_match(&opts, "from")) { if (ret->required_from_host_keys != NULL) { errstr = "multiple \"from\" clauses"; goto fail; } ret->required_from_host_keys = opt_dequote(&opts, &errstr); if (ret->required_from_host_keys == NULL) goto fail; } else if (opt_match(&opts, "expiry-time")) { if ((opt = opt_dequote(&opts, &errstr)) == NULL) goto fail; if (parse_absolute_time(opt, &valid_before) != 0 || valid_before == 0) { free(opt); errstr = "invalid expires time"; goto fail; } free(opt); if (ret->valid_before == 0 || valid_before < ret->valid_before) ret->valid_before = valid_before; } else if (opt_match(&opts, "environment")) { if (ret->nenv > INT_MAX) { errstr = "too many environment strings"; goto fail; } if ((opt = opt_dequote(&opts, &errstr)) == NULL) goto fail; /* env name must be alphanumeric and followed by '=' */ if ((tmp = strchr(opt, '=')) == NULL) { free(opt); errstr = "invalid environment string"; goto fail; } for (cp = opt; cp < tmp; cp++) { if (!isalnum((u_char)*cp)) { free(opt); errstr = "invalid environment string"; goto fail; } } /* Append it. */ oarray = ret->env; if ((ret->env = recallocarray(ret->env, ret->nenv, ret->nenv + 1, sizeof(*ret->env))) == NULL) { free(opt); ret->env = oarray; /* put it back for cleanup */ goto alloc_fail; } ret->env[ret->nenv++] = opt; } else if (opt_match(&opts, "permitopen")) { if (ret->npermitopen > INT_MAX) { errstr = "too many permitopens"; goto fail; } if ((opt = opt_dequote(&opts, &errstr)) == NULL) goto fail; if ((tmp = strdup(opt)) == NULL) { free(opt); goto alloc_fail; } cp = tmp; /* validate syntax of permitopen before recording it. */ host = hpdelim(&cp); if (host == NULL || strlen(host) >= NI_MAXHOST) { free(tmp); free(opt); errstr = "invalid permitopen hostname"; goto fail; } /* * don't want to use permitopen_port to avoid * dependency on channels.[ch] here. */ if (cp == NULL || (strcmp(cp, "*") != 0 && a2port(cp) <= 0)) { free(tmp); free(opt); errstr = "invalid permitopen port"; goto fail; } /* XXX - add streamlocal support */ free(tmp); /* Record it */ oarray = ret->permitopen; if ((ret->permitopen = recallocarray(ret->permitopen, ret->npermitopen, ret->npermitopen + 1, sizeof(*ret->permitopen))) == NULL) { free(opt); ret->permitopen = oarray; goto alloc_fail; } ret->permitopen[ret->npermitopen++] = opt; } else if (opt_match(&opts, "tunnel")) { if ((opt = opt_dequote(&opts, &errstr)) == NULL) goto fail; ret->force_tun_device = a2tun(opt, NULL); free(opt); if (ret->force_tun_device == SSH_TUNID_ERR) { errstr = "invalid tun device"; goto fail; } } /* * Skip the comma, and move to the next option * (or break out if there are no more). */ if (*opts == '\0' || *opts == ' ' || *opts == '\t') break; /* End of options. */ /* Anything other than a comma is an unknown option */ if (*opts != ',') { errstr = "unknown key option"; goto fail; } opts++; if (*opts == '\0') { errstr = "unexpected end-of-options"; goto fail; } } /* success */ if (errstrp != NULL) *errstrp = NULL; return ret; alloc_fail: errstr = "memory allocation failed"; fail: sshauthopt_free(ret); if (errstrp != NULL) *errstrp = errstr; return NULL; }