Files
libssh/src/gzip.c
Jakub Jelen 0cd749a533 zlib: Move conditional compilation inside of the gzip.c
This implements stub for the compression functions and includes the
gzip.c in the compilation target uncoditionally, keeping the WITH_ZLIB
conditional compilation only in the gzip.c

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2025-01-14 14:47:44 +01:00

303 lines
7.3 KiB
C

/*
* gzip.c - hooks for compression of packets
*
* This file is part of the SSH Library
*
* Copyright (c) 2003 by Aris Adamantiadis
* Copyright (c) 2009 by Andreas Schneider <asn@cryptomilk.org>
*
* The SSH Library is free software; you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation; either version 2.1 of the License, or (at your
* option) any later version.
*
* The SSH Library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with the SSH Library; see the file COPYING. If not, write to
* the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
* MA 02111-1307, USA.
*/
#include "config.h"
#include <stdlib.h>
#include <string.h>
#include "libssh/buffer.h"
#include "libssh/crypto.h"
#include "libssh/priv.h"
#include "libssh/session.h"
#ifdef WITH_ZLIB
#include <zlib.h>
#ifndef BLOCKSIZE
#define BLOCKSIZE 4092
#endif
static z_stream *
initcompress(ssh_session session, int level)
{
z_stream *stream = NULL;
int status;
stream = calloc(1, sizeof(z_stream));
if (stream == NULL) {
return NULL;
}
status = deflateInit(stream, level);
if (status != Z_OK) {
deflateEnd(stream);
SAFE_FREE(stream);
ssh_set_error(session,
SSH_FATAL,
"status %d initialising zlib deflate",
status);
return NULL;
}
return stream;
}
static ssh_buffer
gzip_compress(ssh_session session, ssh_buffer source, int level)
{
struct ssh_crypto_struct *crypto = NULL;
z_stream *zout = NULL;
void *in_ptr = ssh_buffer_get(source);
uint32_t in_size = ssh_buffer_get_len(source);
ssh_buffer dest = NULL;
unsigned char out_buf[BLOCKSIZE] = {0};
uint32_t len;
int status;
crypto = ssh_packet_get_current_crypto(session, SSH_DIRECTION_OUT);
if (crypto == NULL) {
return NULL;
}
zout = crypto->compress_out_ctx;
if (zout == NULL) {
zout = crypto->compress_out_ctx = initcompress(session, level);
if (zout == NULL) {
return NULL;
}
}
dest = ssh_buffer_new();
if (dest == NULL) {
return NULL;
}
zout->next_out = out_buf;
zout->next_in = in_ptr;
zout->avail_in = in_size;
do {
zout->avail_out = BLOCKSIZE;
status = deflate(zout, Z_PARTIAL_FLUSH);
if (status != Z_OK) {
SSH_BUFFER_FREE(dest);
ssh_set_error(session,
SSH_FATAL,
"status %d deflating zlib packet",
status);
return NULL;
}
len = BLOCKSIZE - zout->avail_out;
if (ssh_buffer_add_data(dest, out_buf, len) < 0) {
SSH_BUFFER_FREE(dest);
return NULL;
}
zout->next_out = out_buf;
} while (zout->avail_out == 0);
return dest;
}
int
compress_buffer(ssh_session session, ssh_buffer buf)
{
ssh_buffer dest = NULL;
int rv;
dest = gzip_compress(session, buf, session->opts.compressionlevel);
if (dest == NULL) {
return -1;
}
if (ssh_buffer_reinit(buf) < 0) {
SSH_BUFFER_FREE(dest);
return -1;
}
rv = ssh_buffer_add_data(buf,
ssh_buffer_get(dest),
ssh_buffer_get_len(dest));
if (rv < 0) {
SSH_BUFFER_FREE(dest);
return -1;
}
SSH_BUFFER_FREE(dest);
return 0;
}
/* decompression */
static z_stream *
initdecompress(ssh_session session)
{
z_stream *stream = NULL;
int status;
stream = calloc(1, sizeof(z_stream));
if (stream == NULL) {
return NULL;
}
status = inflateInit(stream);
if (status != Z_OK) {
inflateEnd(stream);
SAFE_FREE(stream);
ssh_set_error(session,
SSH_FATAL,
"Status = %d initiating inflate context!",
status);
return NULL;
}
return stream;
}
static ssh_buffer
gzip_decompress(ssh_session session, ssh_buffer source, size_t maxlen)
{
struct ssh_crypto_struct *crypto = NULL;
z_stream *zin = NULL;
void *in_ptr = ssh_buffer_get(source);
uint32_t in_size = ssh_buffer_get_len(source);
unsigned char out_buf[BLOCKSIZE] = {0};
ssh_buffer dest = NULL;
uint32_t len;
int status;
crypto = ssh_packet_get_current_crypto(session, SSH_DIRECTION_IN);
if (crypto == NULL) {
return NULL;
}
zin = crypto->compress_in_ctx;
if (zin == NULL) {
zin = crypto->compress_in_ctx = initdecompress(session);
if (zin == NULL) {
return NULL;
}
}
dest = ssh_buffer_new();
if (dest == NULL) {
return NULL;
}
zin->next_out = out_buf;
zin->next_in = in_ptr;
zin->avail_in = in_size;
do {
zin->avail_out = BLOCKSIZE;
status = inflate(zin, Z_PARTIAL_FLUSH);
if (status != Z_OK && status != Z_BUF_ERROR) {
ssh_set_error(session,
SSH_FATAL,
"status %d inflating zlib packet",
status);
SSH_BUFFER_FREE(dest);
return NULL;
}
len = BLOCKSIZE - zin->avail_out;
if (ssh_buffer_add_data(dest, out_buf, len) < 0) {
SSH_BUFFER_FREE(dest);
return NULL;
}
if (ssh_buffer_get_len(dest) > maxlen) {
/* Size of packet exceeded, avoid a denial of service attack */
SSH_BUFFER_FREE(dest);
return NULL;
}
zin->next_out = out_buf;
} while (zin->avail_out == 0);
return dest;
}
int
decompress_buffer(ssh_session session, ssh_buffer buf, size_t maxlen)
{
ssh_buffer dest = NULL;
int rv;
dest = gzip_decompress(session, buf, maxlen);
if (dest == NULL) {
return -1;
}
if (ssh_buffer_reinit(buf) < 0) {
SSH_BUFFER_FREE(dest);
return -1;
}
rv = ssh_buffer_add_data(buf,
ssh_buffer_get(dest),
ssh_buffer_get_len(dest));
if (rv < 0) {
SSH_BUFFER_FREE(dest);
return -1;
}
SSH_BUFFER_FREE(dest);
return 0;
}
void
compress_cleanup(struct ssh_crypto_struct *crypto)
{
if (crypto->compress_out_ctx) {
deflateEnd(crypto->compress_out_ctx);
}
SAFE_FREE(crypto->compress_out_ctx);
if (crypto->compress_in_ctx) {
inflateEnd(crypto->compress_in_ctx);
}
SAFE_FREE(crypto->compress_in_ctx);
}
#else /* WITH_ZLIB */
int
compress_buffer(UNUSED_PARAM(ssh_session session), UNUSED_PARAM(ssh_buffer buf))
{
/* without zlib compiled in, this should never happen */
return -1;
}
int
decompress_buffer(UNUSED_PARAM(ssh_session session),
UNUSED_PARAM(ssh_buffer buf),
UNUSED_PARAM(size_t maxlen))
{
/* without zlib compiled in, this should never happen */
return -1;
}
void
compress_cleanup(UNUSED_PARAM(struct ssh_crypto_struct *crypto))
{
/* no-op */
}
#endif /* WITH_ZLIB */