Check os_snprintf() result more consistently - automatic 1
This converts os_snprintf() result validation cases to use os_snprintf_error() where the exact rule used in os_snprintf_error() was used. These changes were done automatically with spatch using the following semantic patch: @@ identifier E1; expression E2,E3,E4,E5,E6; statement S1; @@ ( E1 = os_snprintf(E2, E3, ...); | int E1 = os_snprintf(E2, E3, ...); | if (E5) E1 = os_snprintf(E2, E3, ...); else E1 = os_snprintf(E2, E3, ...); | if (E5) E1 = os_snprintf(E2, E3, ...); else if (E6) E1 = os_snprintf(E2, E3, ...); else E1 = 0; | if (E5) { ... E1 = os_snprintf(E2, E3, ...); } else { ... return -1; } | if (E5) { ... E1 = os_snprintf(E2, E3, ...); } else if (E6) { ... E1 = os_snprintf(E2, E3, ...); } else { ... return -1; } | if (E5) { ... E1 = os_snprintf(E2, E3, ...); } else { ... E1 = os_snprintf(E2, E3, ...); } ) ? os_free(E4); - if (E1 < 0 || \( E1 >= E3 \| (size_t) E1 >= E3 \| (unsigned int) E1 >= E3 \| E1 >= (int) E3 \)) + if (os_snprintf_error(E3, E1)) ( S1 | { ... } ) Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
a80ba67a26
commit
d85e1fc8a5
49 changed files with 343 additions and 343 deletions
|
@ -246,14 +246,14 @@ static int hostapd_ctrl_iface_wps_check_pin(
|
|||
if (!wps_pin_valid(pin_val)) {
|
||||
wpa_printf(MSG_DEBUG, "WPS: Invalid checksum digit");
|
||||
ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n");
|
||||
if (ret < 0 || (size_t) ret >= buflen)
|
||||
if (os_snprintf_error(buflen, ret))
|
||||
return -1;
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
ret = os_snprintf(buf, buflen, "%s", pin);
|
||||
if (ret < 0 || (size_t) ret >= buflen)
|
||||
if (os_snprintf_error(buflen, ret))
|
||||
return -1;
|
||||
|
||||
return ret;
|
||||
|
@ -584,7 +584,7 @@ static int hostapd_ctrl_iface_wps_get_status(struct hostapd_data *hapd,
|
|||
ret = os_snprintf(pos, end - pos, "PBC Status: %s\n",
|
||||
pbc_status_str(hapd->wps_stats.pbc_status));
|
||||
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -594,7 +594,7 @@ static int hostapd_ctrl_iface_wps_get_status(struct hostapd_data *hapd,
|
|||
(hapd->wps_stats.status == WPS_STATUS_FAILURE ?
|
||||
"Failed" : "None")));
|
||||
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -605,7 +605,7 @@ static int hostapd_ctrl_iface_wps_get_status(struct hostapd_data *hapd,
|
|||
"Failure Reason: %s\n",
|
||||
wps_ei_str(hapd->wps_stats.failure_reason));
|
||||
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -614,7 +614,7 @@ static int hostapd_ctrl_iface_wps_get_status(struct hostapd_data *hapd,
|
|||
ret = os_snprintf(pos, end - pos, "Peer Address: " MACSTR "\n",
|
||||
MAC2STR(hapd->wps_stats.peer_addr));
|
||||
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1067,7 +1067,7 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
MAC2STR(hapd->own_addr),
|
||||
wpa_ssid_txt(hapd->conf->ssid.ssid,
|
||||
hapd->conf->ssid.ssid_len));
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -1076,7 +1076,7 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
hapd->conf->wps_state == 0 ? "disabled" :
|
||||
(hapd->conf->wps_state == 1 ? "not configured" :
|
||||
"configured"));
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -1084,7 +1084,7 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
hapd->conf->ssid.wpa_passphrase) {
|
||||
ret = os_snprintf(pos, end - pos, "passphrase=%s\n",
|
||||
hapd->conf->ssid.wpa_passphrase);
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1096,7 +1096,7 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
wpa_snprintf_hex(hex, sizeof(hex),
|
||||
hapd->conf->ssid.wpa_psk->psk, PMK_LEN);
|
||||
ret = os_snprintf(pos, end - pos, "psk=%s\n", hex);
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1104,39 +1104,39 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
|
||||
if (hapd->conf->wpa && hapd->conf->wpa_key_mgmt) {
|
||||
ret = os_snprintf(pos, end - pos, "key_mgmt=");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK) {
|
||||
ret = os_snprintf(pos, end - pos, "WPA-PSK ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X) {
|
||||
ret = os_snprintf(pos, end - pos, "WPA-EAP ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
#ifdef CONFIG_IEEE80211R
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_PSK) {
|
||||
ret = os_snprintf(pos, end - pos, "FT-PSK ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X) {
|
||||
ret = os_snprintf(pos, end - pos, "FT-EAP ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
#ifdef CONFIG_SAE
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_SAE) {
|
||||
ret = os_snprintf(pos, end - pos, "FT-SAE ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1145,13 +1145,13 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
#ifdef CONFIG_IEEE80211W
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK_SHA256) {
|
||||
ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256) {
|
||||
ret = os_snprintf(pos, end - pos, "WPA-EAP-SHA256 ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1159,20 +1159,20 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
#ifdef CONFIG_SAE
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_SAE) {
|
||||
ret = os_snprintf(pos, end - pos, "SAE ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
#endif /* CONFIG_SAE */
|
||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X_SUITE_B) {
|
||||
ret = os_snprintf(pos, end - pos, "WPA-EAP-SUITE-B ");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
||||
ret = os_snprintf(pos, end - pos, "\n");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1180,14 +1180,14 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
if (hapd->conf->wpa) {
|
||||
ret = os_snprintf(pos, end - pos, "group_cipher=%s\n",
|
||||
wpa_cipher_txt(hapd->conf->wpa_group));
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
||||
if ((hapd->conf->wpa & WPA_PROTO_RSN) && hapd->conf->rsn_pairwise) {
|
||||
ret = os_snprintf(pos, end - pos, "rsn_pairwise_cipher=");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -1198,14 +1198,14 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
pos += ret;
|
||||
|
||||
ret = os_snprintf(pos, end - pos, "\n");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
||||
if ((hapd->conf->wpa & WPA_PROTO_WPA) && hapd->conf->wpa_pairwise) {
|
||||
ret = os_snprintf(pos, end - pos, "wpa_pairwise_cipher=");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
|
||||
|
@ -1216,7 +1216,7 @@ static int hostapd_ctrl_iface_get_config(struct hostapd_data *hapd,
|
|||
pos += ret;
|
||||
|
||||
ret = os_snprintf(pos, end - pos, "\n");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (os_snprintf_error(end - pos, ret))
|
||||
return pos - buf;
|
||||
pos += ret;
|
||||
}
|
||||
|
@ -1323,7 +1323,7 @@ static int hostapd_ctrl_iface_get(struct hostapd_data *hapd, char *cmd,
|
|||
|
||||
if (os_strcmp(cmd, "version") == 0) {
|
||||
res = os_snprintf(buf, buflen, "%s", VERSION_STR);
|
||||
if (res < 0 || (unsigned int) res >= buflen)
|
||||
if (os_snprintf_error(buflen, res))
|
||||
return -1;
|
||||
return res;
|
||||
}
|
||||
|
|
|
@ -711,7 +711,7 @@ static int gsm_auth_req(char *imsi, char *resp, size_t resp_len)
|
|||
rend = resp + resp_len;
|
||||
rpos = resp;
|
||||
ret = os_snprintf(rpos, rend - rpos, "GSM-AUTH-RESP %s", imsi);
|
||||
if (ret < 0 || ret >= rend - rpos)
|
||||
if (os_snprintf_error(rend - rpos, ret))
|
||||
return -1;
|
||||
rpos += ret;
|
||||
|
||||
|
@ -737,7 +737,7 @@ static int gsm_auth_req(char *imsi, char *resp, size_t resp_len)
|
|||
|
||||
printf("No GSM triplets found for %s\n", imsi);
|
||||
ret = os_snprintf(rpos, rend - rpos, " FAILURE");
|
||||
if (ret < 0 || ret >= rend - rpos)
|
||||
if (os_snprintf_error(rend - rpos, ret))
|
||||
return -1;
|
||||
rpos += ret;
|
||||
|
||||
|
|
|
@ -596,7 +596,7 @@ static int hostapd_cli_cmd_disassoc_imminent(struct wpa_ctrl *ctrl, int argc,
|
|||
|
||||
res = os_snprintf(buf, sizeof(buf), "DISASSOC_IMMINENT %s %s",
|
||||
argv[0], argv[1]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
@ -616,7 +616,7 @@ static int hostapd_cli_cmd_ess_disassoc(struct wpa_ctrl *ctrl, int argc,
|
|||
|
||||
res = os_snprintf(buf, sizeof(buf), "ESS_DISASSOC %s %s %s",
|
||||
argv[0], argv[1], argv[2]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
@ -634,7 +634,7 @@ static int hostapd_cli_cmd_bss_tm_req(struct wpa_ctrl *ctrl, int argc,
|
|||
}
|
||||
|
||||
res = os_snprintf(buf, sizeof(buf), "BSS_TM_REQ %s", argv[0]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
|
||||
total = res;
|
||||
|
@ -736,7 +736,7 @@ static int hostapd_cli_cmd_set_qos_map_set(struct wpa_ctrl *ctrl,
|
|||
}
|
||||
|
||||
res = os_snprintf(buf, sizeof(buf), "SET_QOS_MAP_SET %s", argv[0]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
@ -755,7 +755,7 @@ static int hostapd_cli_cmd_send_qos_map_conf(struct wpa_ctrl *ctrl,
|
|||
}
|
||||
|
||||
res = os_snprintf(buf, sizeof(buf), "SEND_QOS_MAP_CONF %s", argv[0]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
@ -775,7 +775,7 @@ static int hostapd_cli_cmd_hs20_wnm_notif(struct wpa_ctrl *ctrl, int argc,
|
|||
|
||||
res = os_snprintf(buf, sizeof(buf), "HS20_WNM_NOTIF %s %s",
|
||||
argv[0], argv[1]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
@ -800,7 +800,7 @@ static int hostapd_cli_cmd_hs20_deauth_req(struct wpa_ctrl *ctrl, int argc,
|
|||
res = os_snprintf(buf, sizeof(buf),
|
||||
"HS20_DEAUTH_REQ %s %s %s",
|
||||
argv[0], argv[1], argv[2]);
|
||||
if (res < 0 || res >= (int) sizeof(buf))
|
||||
if (os_snprintf_error(sizeof(buf), res))
|
||||
return -1;
|
||||
return wpa_ctrl_command(ctrl, buf);
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue