int r;
if (size == 0)
return -1; /* no place for the NUL */
+ if (size > SIZE_T_CEILING)
+ return -1;
#ifdef MS_WINDOWS
r = _vsnprintf(str, size, format, args);
#else
*/
if (destlen < ((srclen/48)+1)*66)
return -1;
+ if (destlen > SIZE_T_CEILING)
+ return -1;
EVP_EncodeInit(&ctx);
EVP_EncodeUpdate(&ctx, dest, &len, (char*) src, srclen);
*/
if (destlen < ((srclen/64)+1)*49)
return -1;
+ if (destlen > SIZE_T_CEILING)
+ return -1;
EVP_DecodeInit(&ctx);
EVP_DecodeUpdate(&ctx, dest, &len, (char*) src, srclen);
tor_assert((nbits%5) == 0); /* We need an even multiple of 5 bits. */
tor_assert((nbits/5)+1 <= destlen); /* We need enough space. */
+ tor_assert(destlen < SIZE_T_CEILING);
for (i=0,bit=0; bit < nbits; ++i, bit+=5) {
/* set v to the 16-bit value starting at src[bits/8], 0-padded. */
uint8_t c;
size_t count;
char *tmp;
+ tor_assert(key_out_len < SIZE_T_CEILING);
#define EXPBIAS 6
c = s2k_specifier[8];
#endif
#endif
+/* Any size_t larger than this amount is likely to be an underflow. */
+#define SIZE_T_CEILING (1u<<(sizeof(size_t)*8 - 1))
+
#endif /* __TORINT_H */
#include "util.h"
#include "log.h"
#include "crypto.h"
+#include "torint.h"
#ifdef MS_WINDOWS
#include <io.h>
tor_assert(s);
tor_assert(insert);
tor_assert(n > 0);
+ tor_assert(n < SIZE_T_CEILING);
+ tor_assert(dest_len < SIZE_T_CEILING);
len_in = strlen(s);
len_ins = strlen(insert);
len_out = len_in + (len_in/n)*len_ins;
char *cp;
tor_assert(destlen >= srclen*2+1);
+ tor_assert(destlen < SIZE_T_CEILING);
cp = dest;
end = src+srclen;
int v1,v2;
if ((srclen % 2) != 0)
return -1;
- if (destlen < srclen/2)
+ if (destlen < srclen/2 || destlen > SIZE_T_CEILING)
return -1;
end = src+srclen;
while (src<end) {
size_t numread = 0;
int result;
+ if (count > SIZE_T_CEILING)
+ return -1;
+
while (numread != count) {
if (isSocket)
result = recv(fd, buf+numread, count-numread, 0);