|
|
@@ -87,7 +87,7 @@ int stun_method_str(u16bits method, char *smethod)
|
|
|
};
|
|
|
|
|
|
if(smethod) {
|
|
|
- ns_bcopy(s,smethod,strlen(s)+1);
|
|
|
+ bcopy(s,smethod,strlen(s)+1);
|
|
|
}
|
|
|
|
|
|
return ret;
|
|
|
@@ -264,7 +264,7 @@ static void generate_enc_password(const char* pwd, char *result, const unsigned
|
|
|
if(!orig_salt) {
|
|
|
generate_random_nonce(salt, PWD_SALT_SIZE);
|
|
|
} else {
|
|
|
- ns_bcopy(orig_salt,salt,PWD_SALT_SIZE);
|
|
|
+ bcopy(orig_salt,salt,PWD_SALT_SIZE);
|
|
|
salt[PWD_SALT_SIZE]=0;
|
|
|
}
|
|
|
unsigned char rsalt[PWD_SALT_SIZE*2+1];
|
|
|
@@ -272,7 +272,7 @@ static void generate_enc_password(const char* pwd, char *result, const unsigned
|
|
|
result[0]='$';
|
|
|
result[1]='5';
|
|
|
result[2]='$';
|
|
|
- ns_bcopy((char*)rsalt,result+3,PWD_SALT_SIZE+PWD_SALT_SIZE);
|
|
|
+ bcopy((char*)rsalt,result+3,PWD_SALT_SIZE+PWD_SALT_SIZE);
|
|
|
result[3+PWD_SALT_SIZE+PWD_SALT_SIZE]='$';
|
|
|
unsigned char* out = (unsigned char*)(result+3+PWD_SALT_SIZE+PWD_SALT_SIZE+1);
|
|
|
{
|
|
|
@@ -491,7 +491,7 @@ int stun_is_error_response_str(const u08bits* buf, size_t len, int *err_code, u0
|
|
|
size_t msg_len = stun_attr_get_len(sar) - 4;
|
|
|
if(msg_len>(err_msg_size-1))
|
|
|
msg_len=err_msg_size - 1;
|
|
|
- ns_bcopy(val+4, err_msg, msg_len);
|
|
|
+ bcopy(val+4, err_msg, msg_len);
|
|
|
err_msg[msg_len]=0;
|
|
|
}
|
|
|
}
|
|
|
@@ -518,7 +518,7 @@ int stun_is_challenge_response_str(const u08bits* buf, size_t len, int *err_code
|
|
|
const u08bits *value = stun_attr_get_value(sar);
|
|
|
if(value) {
|
|
|
size_t vlen = (size_t)stun_attr_get_len(sar);
|
|
|
- ns_bcopy(value,realm,vlen);
|
|
|
+ bcopy(value,realm,vlen);
|
|
|
realm[vlen]=0;
|
|
|
|
|
|
{
|
|
|
@@ -529,7 +529,7 @@ int stun_is_challenge_response_str(const u08bits* buf, size_t len, int *err_code
|
|
|
size_t vlen = (size_t)stun_attr_get_len(sar);
|
|
|
if(vlen>0) {
|
|
|
if(server_name) {
|
|
|
- ns_bcopy(value,server_name,vlen);
|
|
|
+ bcopy(value,server_name,vlen);
|
|
|
}
|
|
|
found_oauth = 1;
|
|
|
}
|
|
|
@@ -542,7 +542,7 @@ int stun_is_challenge_response_str(const u08bits* buf, size_t len, int *err_code
|
|
|
value = stun_attr_get_value(sar);
|
|
|
if(value) {
|
|
|
vlen = (size_t)stun_attr_get_len(sar);
|
|
|
- ns_bcopy(value,nonce,vlen);
|
|
|
+ bcopy(value,nonce,vlen);
|
|
|
nonce[vlen]=0;
|
|
|
if(oauth) {
|
|
|
*oauth = found_oauth;
|
|
|
@@ -589,7 +589,7 @@ u16bits stun_make_error_response(u16bits method) {
|
|
|
|
|
|
void stun_init_buffer_str(u08bits *buf, size_t *len) {
|
|
|
*len=STUN_HEADER_LENGTH;
|
|
|
- ns_bzero(buf,*len);
|
|
|
+ bzero(buf,*len);
|
|
|
}
|
|
|
|
|
|
void stun_init_command_str(u16bits message_type, u08bits* buf, size_t *len) {
|
|
|
@@ -1079,7 +1079,7 @@ u16bits stun_set_channel_bind_request_str(u08bits* buf, size_t *len,
|
|
|
|
|
|
if(!peer_addr) {
|
|
|
ioa_addr ca;
|
|
|
- ns_bzero(&ca,sizeof(ioa_addr));
|
|
|
+ bzero(&ca,sizeof(ioa_addr));
|
|
|
|
|
|
if(stun_attr_add_addr_str(buf,len,STUN_ATTRIBUTE_XOR_PEER_ADDRESS, &ca)<0) return 0;
|
|
|
} else {
|
|
|
@@ -1174,18 +1174,18 @@ int stun_tid_equals(const stun_tid *id1, const stun_tid *id2) {
|
|
|
void stun_tid_cpy(stun_tid *id1, const stun_tid *id2) {
|
|
|
if(!id1) return;
|
|
|
if(!id2) return;
|
|
|
- ns_bcopy((const void*)(id2->tsx_id),(void*)(id1->tsx_id),STUN_TID_SIZE);
|
|
|
+ bcopy((const void*)(id2->tsx_id),(void*)(id1->tsx_id),STUN_TID_SIZE);
|
|
|
}
|
|
|
|
|
|
static void stun_tid_string_cpy(u08bits* s, const stun_tid* id) {
|
|
|
if(s && id) {
|
|
|
- ns_bcopy((const void*)(id->tsx_id),s,STUN_TID_SIZE);
|
|
|
+ bcopy((const void*)(id->tsx_id),s,STUN_TID_SIZE);
|
|
|
}
|
|
|
}
|
|
|
|
|
|
static void stun_tid_from_string(const u08bits* s, stun_tid* id) {
|
|
|
if(s && id) {
|
|
|
- ns_bcopy(s,(void*)(id->tsx_id),STUN_TID_SIZE);
|
|
|
+ bcopy(s,(void*)(id->tsx_id),STUN_TID_SIZE);
|
|
|
}
|
|
|
}
|
|
|
|
|
|
@@ -1297,7 +1297,7 @@ u64bits stun_attr_get_reservation_token_value(stun_attr_ref attr) {
|
|
|
const u08bits* value = stun_attr_get_value(attr);
|
|
|
if(value && (stun_attr_get_len(attr) == 8)) {
|
|
|
u64bits token;
|
|
|
- ns_bcopy(value, &token, sizeof(u64bits));
|
|
|
+ bcopy(value, &token, sizeof(u64bits));
|
|
|
return nswap64(token);
|
|
|
}
|
|
|
}
|
|
|
@@ -1400,7 +1400,7 @@ int stun_attr_add_str(u08bits* buf, size_t *len, u16bits attr, const u08bits* av
|
|
|
|
|
|
attr_start_16t[0]=nswap16(attr);
|
|
|
attr_start_16t[1]=nswap16(alen);
|
|
|
- if(alen>0) ns_bcopy(avalue,attr_start+4,alen);
|
|
|
+ if(alen>0) bcopy(avalue,attr_start+4,alen);
|
|
|
return 0;
|
|
|
}
|
|
|
}
|
|
|
@@ -1993,7 +1993,7 @@ int stun_attr_get_padding_len_str(stun_attr_ref attr) {
|
|
|
int stun_attr_add_padding_str(u08bits *buf, size_t *len, u16bits padding_len)
|
|
|
{
|
|
|
u08bits avalue[0xFFFF];
|
|
|
- ns_bzero(avalue,padding_len);
|
|
|
+ bzero(avalue,padding_len);
|
|
|
|
|
|
return stun_attr_add_str(buf, len, STUN_ATTRIBUTE_PADDING, avalue, padding_len);
|
|
|
}
|
|
|
@@ -2081,7 +2081,7 @@ int calculate_key(char *key, size_t key_size,
|
|
|
{
|
|
|
UNUSED_ARG(key_size);
|
|
|
|
|
|
- ns_bcopy(key,new_key,new_key_size);
|
|
|
+ bcopy(key,new_key,new_key_size);
|
|
|
|
|
|
return 0;
|
|
|
}
|
|
|
@@ -2091,7 +2091,7 @@ int convert_oauth_key_data(const oauth_key_data *oakd0, oauth_key *key, char *er
|
|
|
if(oakd0 && key) {
|
|
|
|
|
|
oauth_key_data oakd_obj;
|
|
|
- ns_bcopy(oakd0,&oakd_obj,sizeof(oauth_key_data));
|
|
|
+ bcopy(oakd0,&oakd_obj,sizeof(oauth_key_data));
|
|
|
oauth_key_data *oakd = &oakd_obj;
|
|
|
|
|
|
if(!(oakd->ikm_key_size)) {
|
|
|
@@ -2114,11 +2114,11 @@ int convert_oauth_key_data(const oauth_key_data *oakd0, oauth_key *key, char *er
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- ns_bzero(key,sizeof(oauth_key));
|
|
|
+ bzero(key,sizeof(oauth_key));
|
|
|
|
|
|
STRCPY(key->kid,oakd->kid);
|
|
|
|
|
|
- ns_bcopy(oakd->ikm_key,key->ikm_key,sizeof(key->ikm_key));
|
|
|
+ bcopy(oakd->ikm_key,key->ikm_key,sizeof(key->ikm_key));
|
|
|
key->ikm_key_size = oakd->ikm_key_size;
|
|
|
|
|
|
key->timestamp = oakd->timestamp;
|
|
|
@@ -2248,13 +2248,13 @@ int encode_oauth_token_normal(const u08bits *server_name, encoded_oauth_token *e
|
|
|
if(server_name && etoken && key && dtoken && (dtoken->enc_block.key_length<=128)) {
|
|
|
|
|
|
unsigned char orig_field[MAX_ENCODED_OAUTH_TOKEN_SIZE];
|
|
|
- ns_bzero(orig_field,sizeof(orig_field));
|
|
|
+ bzero(orig_field,sizeof(orig_field));
|
|
|
|
|
|
size_t len = 0;
|
|
|
*((uint16_t*)(orig_field+len)) = nswap16(dtoken->enc_block.key_length);
|
|
|
len +=2;
|
|
|
|
|
|
- ns_bcopy(dtoken->enc_block.mac_key,orig_field+len,dtoken->enc_block.key_length);
|
|
|
+ bcopy(dtoken->enc_block.mac_key,orig_field+len,dtoken->enc_block.key_length);
|
|
|
len += dtoken->enc_block.key_length;
|
|
|
|
|
|
*((uint64_t*)(orig_field+len)) = nswap64(dtoken->enc_block.timestamp);
|
|
|
@@ -2284,7 +2284,7 @@ int encode_oauth_token_normal(const u08bits *server_name, encoded_oauth_token *e
|
|
|
EVP_CIPHER_CTX_cleanup(&ctx);
|
|
|
|
|
|
size_t sn_len = strlen((const char*)server_name);
|
|
|
- ns_bcopy(server_name,encoded_field+outl,sn_len);
|
|
|
+ bcopy(server_name,encoded_field+outl,sn_len);
|
|
|
outl += sn_len;
|
|
|
|
|
|
const EVP_MD *md = get_auth_type(key->auth_alg);
|
|
|
@@ -2298,7 +2298,7 @@ int encode_oauth_token_normal(const u08bits *server_name, encoded_oauth_token *e
|
|
|
|
|
|
update_hmac_len(key->auth_alg, &hmac_len);
|
|
|
|
|
|
- ns_bcopy(encoded_field + outl, encoded_field + outl - sn_len, hmac_len);
|
|
|
+ bcopy(encoded_field + outl, encoded_field + outl - sn_len, hmac_len);
|
|
|
outl -= sn_len;
|
|
|
outl += hmac_len; //encoded+hmac
|
|
|
|
|
|
@@ -2344,14 +2344,14 @@ int decode_oauth_token_normal(const u08bits *server_name, const encoded_oauth_to
|
|
|
}
|
|
|
unsigned char efield[MAX_ENCODED_OAUTH_TOKEN_SIZE];
|
|
|
unsigned char check_mac[MAXSHASIZE];
|
|
|
- ns_bcopy(encoded_field,efield,encoded_field_size);
|
|
|
+ bcopy(encoded_field,efield,encoded_field_size);
|
|
|
size_t sn_len = strlen((const char*)server_name);
|
|
|
- ns_bcopy(server_name,efield+encoded_field_size,sn_len);
|
|
|
+ bcopy(server_name,efield+encoded_field_size,sn_len);
|
|
|
if (!HMAC(md, key->auth_key, key->auth_key_size, efield, encoded_field_size+sn_len, check_mac, &hmac_len)) {
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
- if(ns_bcmp(check_mac,mac,mac_size)) {
|
|
|
+ if(bcmp(check_mac,mac,mac_size)) {
|
|
|
OAUTH_ERROR("%s: token integrity check failed\n",__FUNCTION__);
|
|
|
return -1;
|
|
|
}
|
|
|
@@ -2381,7 +2381,7 @@ int decode_oauth_token_normal(const u08bits *server_name, const encoded_oauth_to
|
|
|
dtoken->enc_block.key_length = nswap16(*((uint16_t*)(decoded_field+len)));
|
|
|
len += 2;
|
|
|
|
|
|
- ns_bcopy(decoded_field+len,dtoken->enc_block.mac_key,dtoken->enc_block.key_length);
|
|
|
+ bcopy(decoded_field+len,dtoken->enc_block.mac_key,dtoken->enc_block.key_length);
|
|
|
len += dtoken->enc_block.key_length;
|
|
|
|
|
|
dtoken->enc_block.timestamp = nswap64(*((uint64_t*)(decoded_field+len)));
|
|
|
@@ -2411,11 +2411,11 @@ static int encode_oauth_token_gcm(const u08bits *server_name, encoded_oauth_toke
|
|
|
if(server_name && etoken && key && dtoken && (dtoken->enc_block.key_length<=MAXSHASIZE)) {
|
|
|
|
|
|
unsigned char orig_field[MAX_ENCODED_OAUTH_TOKEN_SIZE];
|
|
|
- ns_bzero(orig_field,sizeof(orig_field));
|
|
|
+ bzero(orig_field,sizeof(orig_field));
|
|
|
|
|
|
unsigned char nonce[OAUTH_GCM_NONCE_SIZE];
|
|
|
if(nonce0) {
|
|
|
- ns_bcopy(nonce0,nonce,sizeof(nonce));
|
|
|
+ bcopy(nonce0,nonce,sizeof(nonce));
|
|
|
} else {
|
|
|
generate_random_nonce(nonce, sizeof(nonce));
|
|
|
}
|
|
|
@@ -2425,17 +2425,17 @@ static int encode_oauth_token_gcm(const u08bits *server_name, encoded_oauth_toke
|
|
|
*((uint16_t*)(orig_field+len)) = nswap16(OAUTH_GCM_NONCE_SIZE);
|
|
|
len +=2;
|
|
|
|
|
|
- ns_bcopy(nonce,orig_field+len,OAUTH_GCM_NONCE_SIZE);
|
|
|
+ bcopy(nonce,orig_field+len,OAUTH_GCM_NONCE_SIZE);
|
|
|
len += OAUTH_GCM_NONCE_SIZE;
|
|
|
|
|
|
*((uint16_t*)(orig_field+len)) = nswap16(dtoken->enc_block.key_length);
|
|
|
len +=2;
|
|
|
|
|
|
- ns_bcopy(dtoken->enc_block.mac_key,orig_field+len,dtoken->enc_block.key_length);
|
|
|
+ bcopy(dtoken->enc_block.mac_key,orig_field+len,dtoken->enc_block.key_length);
|
|
|
len += dtoken->enc_block.key_length;
|
|
|
|
|
|
uint64_t ts = nswap64(dtoken->enc_block.timestamp);
|
|
|
- ns_bcopy( &ts, (orig_field+len), sizeof(ts));
|
|
|
+ bcopy( &ts, (orig_field+len), sizeof(ts));
|
|
|
len += sizeof(ts);
|
|
|
|
|
|
*((uint32_t*)(orig_field+len)) = nswap32(dtoken->enc_block.lifetime);
|
|
|
@@ -2478,7 +2478,7 @@ static int encode_oauth_token_gcm(const u08bits *server_name, encoded_oauth_toke
|
|
|
|
|
|
outl=0;
|
|
|
unsigned char *encoded_field = (unsigned char*)etoken->token;
|
|
|
- ns_bcopy(orig_field,encoded_field,OAUTH_GCM_NONCE_SIZE + 2);
|
|
|
+ bcopy(orig_field,encoded_field,OAUTH_GCM_NONCE_SIZE + 2);
|
|
|
encoded_field += OAUTH_GCM_NONCE_SIZE + 2;
|
|
|
unsigned char *start_field = orig_field + OAUTH_GCM_NONCE_SIZE + 2;
|
|
|
len -= OAUTH_GCM_NONCE_SIZE + 2;
|
|
|
@@ -2511,7 +2511,7 @@ static int decode_oauth_token_gcm(const u08bits *server_name, const encoded_oaut
|
|
|
if(server_name && etoken && key && dtoken) {
|
|
|
|
|
|
unsigned char snl[2];
|
|
|
- ns_bcopy((const unsigned char*)(etoken->token),snl,2);
|
|
|
+ bcopy((const unsigned char*)(etoken->token),snl,2);
|
|
|
const unsigned char *csnl = snl;
|
|
|
|
|
|
uint16_t nonce_len = nswap16(*((const uint16_t*)csnl));
|
|
|
@@ -2526,10 +2526,10 @@ static int decode_oauth_token_gcm(const u08bits *server_name, const encoded_oaut
|
|
|
const unsigned char* encoded_field = (const unsigned char*)(etoken->token + nonce_len + 2);
|
|
|
unsigned int encoded_field_size = (unsigned int)etoken->size - nonce_len - 2 - OAUTH_GCM_TAG_SIZE;
|
|
|
const unsigned char* nonce = ((const unsigned char*)etoken->token + 2);
|
|
|
- ns_bcopy(nonce,dtoken->enc_block.nonce,nonce_len);
|
|
|
+ bcopy(nonce,dtoken->enc_block.nonce,nonce_len);
|
|
|
|
|
|
unsigned char tag[OAUTH_GCM_TAG_SIZE];
|
|
|
- ns_bcopy(((const unsigned char*)etoken->token) + nonce_len + 2 + encoded_field_size, tag ,sizeof(tag));
|
|
|
+ bcopy(((const unsigned char*)etoken->token) + nonce_len + 2 + encoded_field_size, tag ,sizeof(tag));
|
|
|
|
|
|
unsigned char decoded_field[MAX_ENCODED_OAUTH_TOKEN_SIZE];
|
|
|
|
|
|
@@ -2608,16 +2608,16 @@ static int decode_oauth_token_gcm(const u08bits *server_name, const encoded_oaut
|
|
|
dtoken->enc_block.key_length = nswap16(*((uint16_t*)(decoded_field+len)));
|
|
|
len += 2;
|
|
|
|
|
|
- ns_bcopy(decoded_field+len,dtoken->enc_block.mac_key,dtoken->enc_block.key_length);
|
|
|
+ bcopy(decoded_field+len,dtoken->enc_block.mac_key,dtoken->enc_block.key_length);
|
|
|
len += dtoken->enc_block.key_length;
|
|
|
|
|
|
uint64_t ts;
|
|
|
- ns_bcopy((decoded_field+len),&ts,sizeof(ts));
|
|
|
+ bcopy((decoded_field+len),&ts,sizeof(ts));
|
|
|
dtoken->enc_block.timestamp = nswap64(ts);
|
|
|
len += sizeof(ts);
|
|
|
|
|
|
uint32_t lt;
|
|
|
- ns_bcopy((decoded_field+len),<,sizeof(lt));
|
|
|
+ bcopy((decoded_field+len),<,sizeof(lt));
|
|
|
dtoken->enc_block.lifetime = nswap32(lt);
|
|
|
len += sizeof(lt);
|
|
|
|