diff options
author | Samuel Pitoiset <samuel.pitoiset@gmail.com> | 2012-05-23 18:55:34 +0200 |
---|---|---|
committer | Martin Storsjö <martin@martin.st> | 2012-05-24 00:25:35 +0300 |
commit | 08e93f5b46c8ddb5939e6f2a47c19c2c152772c3 (patch) | |
tree | f8ed8988d8e42b33f2c08a07bb1e233039cc971a | |
parent | f645f1d6eadae8d67c832125186ad5b209e8ba03 (diff) | |
download | ffmpeg-08e93f5b46c8ddb5939e6f2a47c19c2c152772c3.tar.gz |
rtmp: Check malloc calls
Signed-off-by: Martin Storsjö <martin@martin.st>
-rw-r--r-- | libavformat/rtmpproto.c | 78 |
1 files changed, 58 insertions, 20 deletions
diff --git a/libavformat/rtmpproto.c b/libavformat/rtmpproto.c index 2c7e0b2c88..d00f44af27 100644 --- a/libavformat/rtmpproto.c +++ b/libavformat/rtmpproto.c @@ -488,14 +488,16 @@ static int gen_bytes_read(URLContext *s, RTMPContext *rt, uint32_t ts) * @param keylen digest key length * @param dst buffer where calculated digest will be stored (32 bytes) */ -static void rtmp_calc_digest(const uint8_t *src, int len, int gap, - const uint8_t *key, int keylen, uint8_t *dst) +static int rtmp_calc_digest(const uint8_t *src, int len, int gap, + const uint8_t *key, int keylen, uint8_t *dst) { struct AVSHA *sha; uint8_t hmac_buf[64+32] = {0}; int i; sha = av_mallocz(av_sha_size); + if (!sha) + return AVERROR(ENOMEM); if (keylen < 64) { memcpy(hmac_buf, key, keylen); @@ -524,6 +526,8 @@ static void rtmp_calc_digest(const uint8_t *src, int len, int gap, av_sha_final(sha, dst); av_free(sha); + + return 0; } /** @@ -536,14 +540,18 @@ static void rtmp_calc_digest(const uint8_t *src, int len, int gap, static int rtmp_handshake_imprint_with_digest(uint8_t *buf) { int i, digest_pos = 0; + int ret; for (i = 8; i < 12; i++) digest_pos += buf[i]; digest_pos = (digest_pos % 728) + 12; - rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos, - rtmp_player_key, PLAYER_KEY_OPEN_PART_LEN, - buf + digest_pos); + ret = rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos, + rtmp_player_key, PLAYER_KEY_OPEN_PART_LEN, + buf + digest_pos); + if (ret < 0) + return ret; + return digest_pos; } @@ -558,14 +566,18 @@ static int rtmp_validate_digest(uint8_t *buf, int off) { int i, digest_pos = 0; uint8_t digest[32]; + int ret; for (i = 0; i < 4; i++) digest_pos += buf[i + off]; digest_pos = (digest_pos % 728) + off + 4; - rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos, - rtmp_server_key, SERVER_KEY_OPEN_PART_LEN, - digest); + ret = rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos, + rtmp_server_key, SERVER_KEY_OPEN_PART_LEN, + digest); + if (ret < 0) + return ret; + if (!memcmp(digest, buf + digest_pos, 32)) return digest_pos; return 0; @@ -593,6 +605,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) int i; int server_pos, client_pos; uint8_t digest[32]; + int ret; av_log(s, AV_LOG_DEBUG, "Handshaking...\n"); @@ -601,6 +614,8 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) for (i = 9; i <= RTMP_HANDSHAKE_PACKET_SIZE; i++) tosend[i] = av_lfg_get(&rnd) >> 24; client_pos = rtmp_handshake_imprint_with_digest(tosend + 1); + if (client_pos < 0) + return client_pos; ffurl_write(rt->stream, tosend, RTMP_HANDSHAKE_PACKET_SIZE + 1); i = ffurl_read_complete(rt->stream, serverdata, RTMP_HANDSHAKE_PACKET_SIZE + 1); @@ -619,20 +634,30 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) if (rt->is_input && serverdata[5] >= 3) { server_pos = rtmp_validate_digest(serverdata + 1, 772); + if (server_pos < 0) + return server_pos; + if (!server_pos) { server_pos = rtmp_validate_digest(serverdata + 1, 8); + if (server_pos < 0) + return server_pos; + if (!server_pos) { av_log(s, AV_LOG_ERROR, "Server response validating failed\n"); return -1; } } - rtmp_calc_digest(tosend + 1 + client_pos, 32, 0, - rtmp_server_key, sizeof(rtmp_server_key), - digest); - rtmp_calc_digest(clientdata, RTMP_HANDSHAKE_PACKET_SIZE-32, 0, - digest, 32, - digest); + ret = rtmp_calc_digest(tosend + 1 + client_pos, 32, 0, rtmp_server_key, + sizeof(rtmp_server_key), digest); + if (ret < 0) + return ret; + + ret = rtmp_calc_digest(clientdata, RTMP_HANDSHAKE_PACKET_SIZE - 32, 0, + digest, 32, digest); + if (ret < 0) + return ret; + if (memcmp(digest, clientdata + RTMP_HANDSHAKE_PACKET_SIZE - 32, 32)) { av_log(s, AV_LOG_ERROR, "Signature mismatch\n"); return -1; @@ -640,12 +665,17 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) for (i = 0; i < RTMP_HANDSHAKE_PACKET_SIZE; i++) tosend[i] = av_lfg_get(&rnd) >> 24; - rtmp_calc_digest(serverdata + 1 + server_pos, 32, 0, - rtmp_player_key, sizeof(rtmp_player_key), - digest); - rtmp_calc_digest(tosend, RTMP_HANDSHAKE_PACKET_SIZE - 32, 0, - digest, 32, - tosend + RTMP_HANDSHAKE_PACKET_SIZE - 32); + ret = rtmp_calc_digest(serverdata + 1 + server_pos, 32, 0, + rtmp_player_key, sizeof(rtmp_player_key), + digest); + if (ret < 0) + return ret; + + ret = rtmp_calc_digest(tosend, RTMP_HANDSHAKE_PACKET_SIZE - 32, 0, + digest, 32, + tosend + RTMP_HANDSHAKE_PACKET_SIZE - 32); + if (ret < 0) + return ret; // write reply back to the server ffurl_write(rt->stream, tosend, RTMP_HANDSHAKE_PACKET_SIZE); @@ -1016,12 +1046,20 @@ static int rtmp_open(URLContext *s, const char *uri, int flags) if (!rt->tcurl) { rt->tcurl = av_malloc(TCURL_MAX_LENGTH); + if (!rt->tcurl) { + ret = AVERROR(ENOMEM); + goto fail; + } ff_url_join(rt->tcurl, TCURL_MAX_LENGTH, proto, NULL, hostname, port, "/%s", rt->app); } if (!rt->flashver) { rt->flashver = av_malloc(FLASHVER_MAX_LENGTH); + if (!rt->flashver) { + ret = AVERROR(ENOMEM); + goto fail; + } if (rt->is_input) { snprintf(rt->flashver, FLASHVER_MAX_LENGTH, "%s %d,%d,%d,%d", RTMP_CLIENT_PLATFORM, RTMP_CLIENT_VER1, RTMP_CLIENT_VER2, |