Secured Active-COV-Subscriptions property encoding. (#763)

This commit is contained in:
Tomasz Kazimierz Motyl
2024-09-21 15:22:08 +01:00
committed by GitHub
parent 44757c755e
commit 869a827d55
2 changed files with 29 additions and 12 deletions
+6 -1
View File
@@ -1497,7 +1497,12 @@ int Device_Read_Property_Local(BACNET_READ_PROPERTY_DATA *rpdata)
break;
#endif
case PROP_ACTIVE_COV_SUBSCRIPTIONS:
apdu_len = handler_cov_encode_subscriptions(&apdu[0], apdu_max);
if ((apdu_len = handler_cov_encode_subscriptions(
&apdu[0], apdu_max)) < 0) {
rpdata->error_code =
ERROR_CODE_ABORT_SEGMENTATION_NOT_SUPPORTED;
apdu_len = BACNET_STATUS_ABORT;
}
break;
default:
rpdata->error_class = ERROR_CLASS_PROPERTY;
+23 -11
View File
@@ -271,34 +271,46 @@ static int cov_encode_subscription(
* Invoked by a request to read the Device object's
* PROP_ACTIVE_COV_SUBSCRIPTIONS. Loops through the list of COV Subscriptions,
* and, for each valid one, adds its description to the APDU.
* @note This function needs some work to better handle buffer overruns.
* @param apdu [out] Buffer in which the APDU contents are built.
* @param max_apdu [in] Max length of the APDU buffer.
* @return How many bytes were encoded in the buffer, or -2 if the response
* would not fit within the buffer.
*/
/* Maximume length for an encoded COV subscription - 27 bytes for BACNET IP6
* 31 bytes for IPv4 (longest MAC) and lets round it up to the machine word
* alignment */
#define MAX_COV_SUB_SIZE (32)
int handler_cov_encode_subscriptions(uint8_t *apdu, int max_apdu)
{
int len = 0;
int apdu_len = 0;
unsigned index = 0;
if (apdu) {
uint8_t cov_sub[MAX_COV_SUB_SIZE] = {
0,
};
unsigned index = 0;
int apdu_len = 0;
for (index = 0; index < MAX_COV_SUBCRIPTIONS; index++) {
if (COV_Subscriptions[index].flag.valid) {
len = cov_encode_subscription(
&apdu[apdu_len], max_apdu - apdu_len,
/* Lets encode a COV subscription into an intermediate buffer
* that can hold it */
int len = cov_encode_subscription(
&cov_sub[0], max_apdu - apdu_len,
&COV_Subscriptions[index]);
apdu_len += len;
/* TODO: too late here to notice that we overran the buffer */
if (apdu_len > max_apdu) {
if ((apdu_len + len) > max_apdu) {
return -2;
}
/* Lets copy if and only if it fits in the buffer */
memcpy(&apdu[apdu_len], cov_sub, len);
apdu_len += len;
}
}
return apdu_len;
}
return apdu_len;
return 0;
}
/** Handler to initialize the COV list, clearing and disabling each entry.