mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
Check os_snprintf() result more consistently - manual
This converts os_snprintf() result validation cases to use os_snprintf_error() for cases that were note covered by spatch and semantic patches. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
eeab4f2fda
commit
1f102d3bb0
@ -641,7 +641,7 @@ struct wpa_ctrl * wpa_ctrl_open(const char *ctrl_path)
|
||||
ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX "-%s",
|
||||
ctrl_path);
|
||||
#endif /* UNICODE */
|
||||
if (ret < 0 || ret >= 256) {
|
||||
if (os_snprintf_error(256, ret)) {
|
||||
os_free(ctrl);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1596,7 +1596,7 @@ static int eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf,
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
if (ret < 0 || (size_t) ret >= buflen - len)
|
||||
if (os_snprintf_error(buflen - len, ret))
|
||||
return len;
|
||||
len += ret;
|
||||
|
||||
|
@ -922,7 +922,8 @@ int eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data,
|
||||
|
||||
imsi_len = os_strlen(imsi);
|
||||
len = os_snprintf(msg, sizeof(msg), "SIM-REQ-AUTH ");
|
||||
if (len < 0 || len + imsi_len >= sizeof(msg))
|
||||
if (os_snprintf_error(sizeof(msg), len) ||
|
||||
len + imsi_len >= sizeof(msg))
|
||||
return EAP_SIM_DB_FAILURE;
|
||||
os_memcpy(msg + len, imsi, imsi_len);
|
||||
len += imsi_len;
|
||||
@ -1385,7 +1386,8 @@ int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username,
|
||||
|
||||
imsi_len = os_strlen(imsi);
|
||||
len = os_snprintf(msg, sizeof(msg), "AKA-REQ-AUTH ");
|
||||
if (len < 0 || len + imsi_len >= sizeof(msg))
|
||||
if (os_snprintf_error(sizeof(msg), len) ||
|
||||
len + imsi_len >= sizeof(msg))
|
||||
return EAP_SIM_DB_FAILURE;
|
||||
os_memcpy(msg + len, imsi, imsi_len);
|
||||
len += imsi_len;
|
||||
@ -1449,7 +1451,8 @@ int eap_sim_db_resynchronize(struct eap_sim_db_data *data,
|
||||
|
||||
imsi_len = os_strlen(imsi);
|
||||
len = os_snprintf(msg, sizeof(msg), "AKA-AUTS ");
|
||||
if (len < 0 || len + imsi_len >= sizeof(msg))
|
||||
if (os_snprintf_error(sizeof(msg), len) ||
|
||||
len + imsi_len >= sizeof(msg))
|
||||
return -1;
|
||||
os_memcpy(msg + len, imsi, imsi_len);
|
||||
len += imsi_len;
|
||||
|
@ -2042,7 +2042,7 @@ int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen)
|
||||
RSN_SUITE_ARG(wpa_cipher_to_suite(sm->proto,
|
||||
sm->group_cipher)),
|
||||
sm->dot11RSNA4WayHandshakeFailures);
|
||||
if (ret >= 0 && (size_t) ret < buflen)
|
||||
if (!os_snprintf_error(buflen - len, ret))
|
||||
len += ret;
|
||||
|
||||
return (int) len;
|
||||
|
@ -475,9 +475,6 @@ static int wpa_supplicant_ctrl_iface_get(struct wpa_supplicant *wpa_s,
|
||||
else
|
||||
enabled = wpa_s->global->wifi_display;
|
||||
res = os_snprintf(buf, buflen, "%d", enabled);
|
||||
if (os_snprintf_error(buflen, res))
|
||||
return -1;
|
||||
return res;
|
||||
#endif /* CONFIG_WIFI_DISPLAY */
|
||||
#ifdef CONFIG_TESTING_GET_GTK
|
||||
} else if (os_strcmp(cmd, "gtk") == 0) {
|
||||
@ -489,7 +486,7 @@ static int wpa_supplicant_ctrl_iface_get(struct wpa_supplicant *wpa_s,
|
||||
#endif /* CONFIG_TESTING_GET_GTK */
|
||||
}
|
||||
|
||||
if (res < 0 || (unsigned int) res >= buflen)
|
||||
if (os_snprintf_error(buflen, res))
|
||||
return -1;
|
||||
return res;
|
||||
}
|
||||
@ -1676,7 +1673,7 @@ static int wpa_supplicant_ctrl_iface_status(struct wpa_supplicant *wpa_s,
|
||||
ret = 0;
|
||||
break;
|
||||
}
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -233,7 +233,7 @@ dbus_bool_t set_network_properties(struct wpa_supplicant *wpa_s,
|
||||
|
||||
ret = os_snprintf(value, size, "\"%s\"",
|
||||
entry.str_value);
|
||||
if (ret < 0 || (size_t) ret != (size - 1))
|
||||
if (os_snprintf_error(size, ret))
|
||||
goto error;
|
||||
} else {
|
||||
value = os_strdup(entry.str_value);
|
||||
|
@ -968,7 +968,7 @@ DBusMessage * wpas_dbus_iface_set_network(DBusMessage *message,
|
||||
goto error;
|
||||
ret = os_snprintf(value, size, "\"%s\"",
|
||||
entry.str_value);
|
||||
if (ret < 0 || (size_t) ret != (size - 1))
|
||||
if (os_snprintf_error(size, ret))
|
||||
goto error;
|
||||
} else {
|
||||
value = os_strdup(entry.str_value);
|
||||
|
Loading…
Reference in New Issue
Block a user