packet: elide two buffer_prepend calls into one
In packet_send2, rather than issue two separate buffer_prepend_data calls (each of which may entail realloc + memmove + memcpy), elide the prepend work into a single buffer_prepend_data: the header information is computed locally, and a single 5 byte prepend operation is now done instead of prepending 1, then 4 bytes. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Этот коммит содержится в:
родитель
04543c9dbc
Коммит
aa05248ca8
17
src/packet.c
17
src/packet.c
@ -508,11 +508,13 @@ static int packet_send2(ssh_session session) {
|
|||||||
session->current_crypto->out_cipher->blocksize : 8);
|
session->current_crypto->out_cipher->blocksize : 8);
|
||||||
uint32_t currentlen = buffer_get_rest_len(session->out_buffer);
|
uint32_t currentlen = buffer_get_rest_len(session->out_buffer);
|
||||||
unsigned char *hmac = NULL;
|
unsigned char *hmac = NULL;
|
||||||
char padstring[32] = {0};
|
char padstring[32] = { 0 };
|
||||||
int rc = SSH_ERROR;
|
int rc = SSH_ERROR;
|
||||||
uint32_t finallen,payloadsize,compsize;
|
uint32_t finallen,payloadsize,compsize;
|
||||||
uint8_t padding;
|
uint8_t padding;
|
||||||
|
|
||||||
|
uint8_t header[sizeof(padding) + sizeof(finallen)] = { 0 };
|
||||||
|
|
||||||
payloadsize = currentlen;
|
payloadsize = currentlen;
|
||||||
#ifdef WITH_ZLIB
|
#ifdef WITH_ZLIB
|
||||||
if (session->current_crypto
|
if (session->current_crypto
|
||||||
@ -532,19 +534,18 @@ static int packet_send2(ssh_session session) {
|
|||||||
|
|
||||||
if (session->current_crypto) {
|
if (session->current_crypto) {
|
||||||
ssh_get_random(padstring, padding, 0);
|
ssh_get_random(padstring, padding, 0);
|
||||||
} else {
|
|
||||||
memset(padstring,0,padding);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
finallen = htonl(currentlen + padding + 1);
|
finallen = htonl(currentlen + padding + 1);
|
||||||
|
|
||||||
if (buffer_prepend_data(session->out_buffer, &padding, sizeof(uint8_t)) < 0) {
|
memcpy(&header[0], &finallen, sizeof(finallen));
|
||||||
|
header[sizeof(finallen)] = padding;
|
||||||
|
rc = buffer_prepend_data(session->out_buffer, &header, sizeof(header));
|
||||||
|
if (rc < 0) {
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
if (buffer_prepend_data(session->out_buffer, &finallen, sizeof(uint32_t)) < 0) {
|
rc = buffer_add_data(session->out_buffer, padstring, padding);
|
||||||
goto error;
|
if (rc < 0) {
|
||||||
}
|
|
||||||
if (ssh_buffer_add_data(session->out_buffer, padstring, padding) < 0) {
|
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
#ifdef WITH_PCAP
|
#ifdef WITH_PCAP
|
||||||
|
Загрузка…
x
Ссылка в новой задаче
Block a user