| // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     https://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | #include <openssl/buf.h> | 
 |  | 
 | #include <string.h> | 
 |  | 
 | #include <openssl/err.h> | 
 | #include <openssl/mem.h> | 
 |  | 
 | #include "../internal.h" | 
 |  | 
 |  | 
 | BUF_MEM *BUF_MEM_new(void) { | 
 |   return reinterpret_cast<BUF_MEM *>(OPENSSL_zalloc(sizeof(BUF_MEM))); | 
 | } | 
 |  | 
 | void BUF_MEM_free(BUF_MEM *buf) { | 
 |   if (buf == nullptr) { | 
 |     return; | 
 |   } | 
 |   OPENSSL_free(buf->data); | 
 |   OPENSSL_free(buf); | 
 | } | 
 |  | 
 | int BUF_MEM_reserve(BUF_MEM *buf, size_t cap) { | 
 |   if (buf->max >= cap) { | 
 |     return 1; | 
 |   } | 
 |  | 
 |   size_t n = cap + 3; | 
 |   if (n < cap) { | 
 |     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW); | 
 |     return 0; | 
 |   } | 
 |   n = n / 3; | 
 |   size_t alloc_size = n * 4; | 
 |   if (alloc_size / 4 != n) { | 
 |     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW); | 
 |     return 0; | 
 |   } | 
 |  | 
 |   char *new_buf = | 
 |       reinterpret_cast<char *>(OPENSSL_realloc(buf->data, alloc_size)); | 
 |   if (new_buf == NULL) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   buf->data = new_buf; | 
 |   buf->max = alloc_size; | 
 |   return 1; | 
 | } | 
 |  | 
 | size_t BUF_MEM_grow(BUF_MEM *buf, size_t len) { | 
 |   if (!BUF_MEM_reserve(buf, len)) { | 
 |     return 0; | 
 |   } | 
 |   if (buf->length < len) { | 
 |     OPENSSL_memset(&buf->data[buf->length], 0, len - buf->length); | 
 |   } | 
 |   buf->length = len; | 
 |   return len; | 
 | } | 
 |  | 
 | size_t BUF_MEM_grow_clean(BUF_MEM *buf, size_t len) { | 
 |   return BUF_MEM_grow(buf, len); | 
 | } | 
 |  | 
 | int BUF_MEM_append(BUF_MEM *buf, const void *in, size_t len) { | 
 |   // Work around a C language bug. See https://crbug.com/1019588. | 
 |   if (len == 0) { | 
 |     return 1; | 
 |   } | 
 |   size_t new_len = buf->length + len; | 
 |   if (new_len < len) { | 
 |     OPENSSL_PUT_ERROR(BUF, ERR_R_OVERFLOW); | 
 |     return 0; | 
 |   } | 
 |   if (!BUF_MEM_reserve(buf, new_len)) { | 
 |     return 0; | 
 |   } | 
 |   OPENSSL_memcpy(buf->data + buf->length, in, len); | 
 |   buf->length = new_len; | 
 |   return 1; | 
 | } | 
 |  | 
 | char *BUF_strdup(const char *str) { return OPENSSL_strdup(str); } | 
 |  | 
 | size_t BUF_strnlen(const char *str, size_t max_len) { | 
 |   return OPENSSL_strnlen(str, max_len); | 
 | } | 
 |  | 
 | char *BUF_strndup(const char *str, size_t size) { | 
 |   return OPENSSL_strndup(str, size); | 
 | } | 
 |  | 
 | size_t BUF_strlcpy(char *dst, const char *src, size_t dst_size) { | 
 |   return OPENSSL_strlcpy(dst, src, dst_size); | 
 | } | 
 |  | 
 | size_t BUF_strlcat(char *dst, const char *src, size_t dst_size) { | 
 |   return OPENSSL_strlcat(dst, src, dst_size); | 
 | } | 
 |  | 
 | void *BUF_memdup(const void *data, size_t size) { | 
 |   return OPENSSL_memdup(data, size); | 
 | } |