forked from mongodb/libmongocrypt
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmc-reader.c
More file actions
184 lines (139 loc) · 6.41 KB
/
mc-reader.c
File metadata and controls
184 lines (139 loc) · 6.41 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
/*
* Copyright 2022-present MongoDB, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "mongocrypt-private.h"
#include "mc-reader-private.h"
#define CHECK_AND_RETURN(x) \
if (!(x)) { \
return false; \
} else \
((void)0)
#define CHECK_REMAINING_BUFFER_AND_RET(read_size) \
if ((reader->pos + (read_size)) > reader->len) { \
CLIENT_ERR("%s expected byte " \
"length >= %" PRIu64 " got: %" PRIu64, \
reader->parser_name, \
reader->pos + (read_size), \
reader->len); \
return false; \
} else \
((void)0)
void mc_reader_init(mc_reader_t *reader, const uint8_t *ptr, uint64_t len, const char *parser_name) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(ptr);
BSON_ASSERT_PARAM(parser_name);
*reader = (mc_reader_t){.pos = 0u, .ptr = ptr, .len = len, .parser_name = parser_name};
}
void mc_reader_init_from_buffer(mc_reader_t *reader, const _mongocrypt_buffer_t *buf, const char *parser_name) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(buf);
BSON_ASSERT_PARAM(parser_name);
mc_reader_init(reader, buf->data, buf->len, parser_name);
}
mc_reader_t *mc_reader_new(const uint8_t *ptr, uint64_t len, const char *parser_name) {
BSON_ASSERT_PARAM(ptr);
BSON_ASSERT_PARAM(parser_name);
mc_reader_t *reader = bson_malloc(sizeof(mc_reader_t));
mc_reader_init(reader, ptr, len, parser_name);
return reader;
}
void mc_reader_destroy(mc_reader_t *reader) {
bson_free(reader);
}
bool mc_reader_has_data(const mc_reader_t *reader) {
BSON_ASSERT_PARAM(reader);
return reader->pos < reader->len;
}
uint64_t mc_reader_get_remaining_length(const mc_reader_t *reader) {
BSON_ASSERT_PARAM(reader);
return reader->len - reader->pos;
}
uint64_t mc_reader_get_consumed_length(const mc_reader_t *reader) {
BSON_ASSERT_PARAM(reader);
return reader->pos;
}
bool mc_reader_read_u8(mc_reader_t *reader, uint8_t *value, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(value);
CHECK_REMAINING_BUFFER_AND_RET(sizeof(uint8_t));
*value = *(reader->ptr + reader->pos);
reader->pos += sizeof(uint8_t);
return true;
}
bool mc_reader_read_u32(mc_reader_t *reader, uint32_t *value, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(value);
CHECK_REMAINING_BUFFER_AND_RET(sizeof(uint32_t));
uint32_t temp;
memcpy(&temp, reader->ptr + reader->pos, sizeof(uint32_t));
*value = BSON_UINT32_FROM_LE(temp);
reader->pos += sizeof(uint32_t);
return true;
}
bool mc_reader_read_u64(mc_reader_t *reader, uint64_t *value, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(value);
CHECK_REMAINING_BUFFER_AND_RET(sizeof(uint64_t));
uint64_t temp;
memcpy(&temp, reader->ptr + reader->pos, sizeof(uint64_t));
*value = BSON_UINT64_FROM_LE(temp);
reader->pos += sizeof(uint64_t);
return true;
}
bool mc_reader_read_bytes(mc_reader_t *reader, const uint8_t **ptr, uint64_t length, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(ptr);
CHECK_REMAINING_BUFFER_AND_RET(length);
*ptr = reader->ptr + reader->pos;
reader->pos += length;
return true;
}
bool mc_reader_read_buffer(mc_reader_t *reader,
_mongocrypt_buffer_t *buf,
uint64_t length,
mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(buf);
const uint8_t *ptr;
CHECK_AND_RETURN(mc_reader_read_bytes(reader, &ptr, length, status));
if (length > SIZE_MAX || !_mongocrypt_buffer_copy_from_data_and_size(buf, ptr, (size_t)length)) {
CLIENT_ERR("%s failed to copy "
"data of length %" PRIu64,
reader->parser_name,
length);
return false;
}
return true;
}
bool mc_reader_read_uuid_buffer(mc_reader_t *reader, _mongocrypt_buffer_t *buf, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(buf);
CHECK_AND_RETURN(mc_reader_read_buffer(reader, buf, 16, status));
buf->subtype = BSON_SUBTYPE_UUID;
return true;
}
bool mc_reader_read_prfblock_buffer(mc_reader_t *reader, _mongocrypt_buffer_t *buf, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(buf);
CHECK_AND_RETURN(mc_reader_read_buffer(reader, buf, 32, status));
buf->subtype = BSON_SUBTYPE_ENCRYPTED;
return true;
}
bool mc_reader_read_buffer_to_end(mc_reader_t *reader, _mongocrypt_buffer_t *buf, mongocrypt_status_t *status) {
BSON_ASSERT_PARAM(reader);
BSON_ASSERT_PARAM(buf);
uint64_t length = reader->len - reader->pos;
return mc_reader_read_buffer(reader, buf, length, status);
}