2023-08-16 19:27:31 +02:00
|
|
|
// Copyright (c) 2019-2020 The Bitcoin Core developers
|
2021-05-11 17:11:07 +02:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
2022-03-24 20:28:20 +01:00
|
|
|
#include <assert.h>
|
|
|
|
#include <map>
|
2021-05-11 17:11:07 +02:00
|
|
|
#include <vector>
|
|
|
|
#include <crypto/common.h>
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2022-03-24 20:28:20 +01:00
|
|
|
constexpr uint32_t INVALID = 0xFFFFFFFF;
|
|
|
|
|
2020-01-29 22:55:40 +01:00
|
|
|
uint32_t DecodeBits(std::vector<bool>::const_iterator& bitpos, const std::vector<bool>::const_iterator& endpos, uint8_t minval, const std::vector<uint8_t> &bit_sizes)
|
2021-05-11 17:11:07 +02:00
|
|
|
{
|
|
|
|
uint32_t val = minval;
|
|
|
|
bool bit;
|
|
|
|
for (std::vector<uint8_t>::const_iterator bit_sizes_it = bit_sizes.begin();
|
|
|
|
bit_sizes_it != bit_sizes.end(); ++bit_sizes_it) {
|
|
|
|
if (bit_sizes_it + 1 != bit_sizes.end()) {
|
2020-01-29 22:55:40 +01:00
|
|
|
if (bitpos == endpos) break;
|
2021-05-11 17:11:07 +02:00
|
|
|
bit = *bitpos;
|
|
|
|
bitpos++;
|
|
|
|
} else {
|
|
|
|
bit = 0;
|
|
|
|
}
|
|
|
|
if (bit) {
|
|
|
|
val += (1 << *bit_sizes_it);
|
|
|
|
} else {
|
|
|
|
for (int b = 0; b < *bit_sizes_it; b++) {
|
2022-03-24 20:28:20 +01:00
|
|
|
if (bitpos == endpos) return INVALID; // Reached EOF in mantissa
|
2021-05-11 17:11:07 +02:00
|
|
|
bit = *bitpos;
|
|
|
|
bitpos++;
|
|
|
|
val += bit << (*bit_sizes_it - 1 - b);
|
|
|
|
}
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
}
|
2022-03-24 20:28:20 +01:00
|
|
|
return INVALID; // Reached EOF in exponent
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
|
2022-03-24 20:28:20 +01:00
|
|
|
enum class Instruction : uint32_t
|
|
|
|
{
|
|
|
|
RETURN = 0,
|
|
|
|
JUMP = 1,
|
|
|
|
MATCH = 2,
|
|
|
|
DEFAULT = 3,
|
|
|
|
};
|
|
|
|
|
2021-05-11 17:11:07 +02:00
|
|
|
const std::vector<uint8_t> TYPE_BIT_SIZES{0, 0, 1};
|
2022-03-24 20:28:20 +01:00
|
|
|
Instruction DecodeType(std::vector<bool>::const_iterator& bitpos, const std::vector<bool>::const_iterator& endpos)
|
2021-05-11 17:11:07 +02:00
|
|
|
{
|
2022-03-24 20:28:20 +01:00
|
|
|
return Instruction(DecodeBits(bitpos, endpos, 0, TYPE_BIT_SIZES));
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
const std::vector<uint8_t> ASN_BIT_SIZES{15, 16, 17, 18, 19, 20, 21, 22, 23, 24};
|
2020-01-29 22:55:40 +01:00
|
|
|
uint32_t DecodeASN(std::vector<bool>::const_iterator& bitpos, const std::vector<bool>::const_iterator& endpos)
|
2021-05-11 17:11:07 +02:00
|
|
|
{
|
2020-01-29 22:55:40 +01:00
|
|
|
return DecodeBits(bitpos, endpos, 1, ASN_BIT_SIZES);
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
const std::vector<uint8_t> MATCH_BIT_SIZES{1, 2, 3, 4, 5, 6, 7, 8};
|
2020-01-29 22:55:40 +01:00
|
|
|
uint32_t DecodeMatch(std::vector<bool>::const_iterator& bitpos, const std::vector<bool>::const_iterator& endpos)
|
2021-05-11 17:11:07 +02:00
|
|
|
{
|
2020-01-29 22:55:40 +01:00
|
|
|
return DecodeBits(bitpos, endpos, 2, MATCH_BIT_SIZES);
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
const std::vector<uint8_t> JUMP_BIT_SIZES{5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30};
|
2020-01-29 22:55:40 +01:00
|
|
|
uint32_t DecodeJump(std::vector<bool>::const_iterator& bitpos, const std::vector<bool>::const_iterator& endpos)
|
2021-05-11 17:11:07 +02:00
|
|
|
{
|
2020-01-29 22:55:40 +01:00
|
|
|
return DecodeBits(bitpos, endpos, 17, JUMP_BIT_SIZES);
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t Interpret(const std::vector<bool> &asmap, const std::vector<bool> &ip)
|
|
|
|
{
|
|
|
|
std::vector<bool>::const_iterator pos = asmap.begin();
|
2020-01-29 22:55:40 +01:00
|
|
|
const std::vector<bool>::const_iterator endpos = asmap.end();
|
2021-05-11 17:11:07 +02:00
|
|
|
uint8_t bits = ip.size();
|
2020-01-29 22:55:40 +01:00
|
|
|
uint32_t default_asn = 0;
|
2022-03-24 20:28:20 +01:00
|
|
|
uint32_t jump, match, matchlen;
|
|
|
|
Instruction opcode;
|
2020-01-29 22:55:40 +01:00
|
|
|
while (pos != endpos) {
|
|
|
|
opcode = DecodeType(pos, endpos);
|
2022-03-24 20:28:20 +01:00
|
|
|
if (opcode == Instruction::RETURN) {
|
|
|
|
default_asn = DecodeASN(pos, endpos);
|
|
|
|
if (default_asn == INVALID) break; // ASN straddles EOF
|
|
|
|
return default_asn;
|
|
|
|
} else if (opcode == Instruction::JUMP) {
|
2020-01-29 22:55:40 +01:00
|
|
|
jump = DecodeJump(pos, endpos);
|
2022-03-24 20:28:20 +01:00
|
|
|
if (jump == INVALID) break; // Jump offset straddles EOF
|
|
|
|
if (bits == 0) break; // No input bits left
|
Merge bitcoin/bitcoin#21802: refactor: Avoid UB in util/asmap (advance a dereferenceable iterator outside its valid range)
fa098713201a6999ec4c12d0a8bde0adcf47b095 refactor: Avoid sign-compare compiler warning in util/asmap (MarcoFalke)
Pull request description:
Can be reproduced on current master with `D_GLIBCXX_DEBUG`:
```
/usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/debug/safe_iterator.h:883:
In function:
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::_Self __gnu_debug::operator+(const
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::_Self &,
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::difference_type)
Error: attempt to advance a dereferenceable iterator 369 steps, which falls
outside its valid range.
Objects involved in the operation:
iterator @ 0x0x7ffd3d613138 {
type = std::__cxx1998::_Bit_const_iterator (constant iterator);
state = dereferenceable;
references sequence with type 'std::__debug::vector<bool, std::allocator<bool> >' @ 0x0x7ffd3d663590
}
==65050== ERROR: libFuzzer: deadly signal
#0 0x559ab9787690 in __sanitizer_print_stack_trace (/bitcoin/src/test/fuzz/fuzz+0x5a1690)
#1 0x559ab9733998 in fuzzer::PrintStackTrace() (/bitcoin/src/test/fuzz/fuzz+0x54d998)
#2 0x559ab9718ae3 in fuzzer::Fuzzer::CrashCallback() (/bitcoin/src/test/fuzz/fuzz+0x532ae3)
#3 0x7f70a0e723bf (/lib/x86_64-linux-gnu/libpthread.so.0+0x153bf)
#4 0x7f70a0b3418a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4618a)
#5 0x7f70a0b13858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x25858)
#6 0x7f70a0f21148 (/lib/x86_64-linux-gnu/libstdc++.so.6+0xa1148)
#7 0x559ab9f60a96 in __gnu_debug::operator+(__gnu_debug::_Safe_iterator<std::__cxx1998::_Bit_const_iterator, std::__debug::vector<bool, std::allocator<bool> >, std::random_access_iterator_tag> const&, long) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/debug/safe_iterator.h:881:2
#8 0x559ab9f61062 in SanityCheckASMap(std::__debug::vector<bool, std::allocator<bool> > const&, int) util/asmap.cpp:159:21
#9 0x559ab9e4fdfa in SanityCheckASMap(std::__debug::vector<bool, std::allocator<bool> > const&) netaddress.cpp:1242:12
#10 0x559ab9793fcb in addrman_fuzz_target(Span<unsigned char const>) test/fuzz/addrman.cpp:43:14
#11 0x559ab978a03c in std::_Function_handler<void (Span<unsigned char const>), void (*)(Span<unsigned char const>)>::_M_invoke(std::_Any_data const&, Span<unsigned char const>&&) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:300:2
#12 0x559aba2692c7 in std::function<void (Span<unsigned char const>)>::operator()(Span<unsigned char const>) const /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:688:14
#13 0x559aba269132 in LLVMFuzzerTestOneInput test/fuzz/fuzz.cpp:63:5
#14 0x559ab971a1a1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/bitcoin/src/test/fuzz/fuzz+0x5341a1)
#15 0x559ab97198e5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/bitcoin/src/test/fuzz/fuzz+0x5338e5)
#16 0x559ab971bb87 in fuzzer::Fuzzer::MutateAndTestOne() (/bitcoin/src/test/fuzz/fuzz+0x535b87)
#17 0x559ab971c885 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/bitcoin/src/test/fuzz/fuzz+0x536885)
#18 0x559ab970b23e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/bitcoin/src/test/fuzz/fuzz+0x52523e)
#19 0x559ab9734082 in main (/bitcoin/src/test/fuzz/fuzz+0x54e082)
#20 0x7f70a0b150b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#21 0x559ab96dffdd in _start (/bitcoin/src/test/fuzz/fuzz+0x4f9fdd)
ACKs for top commit:
sipa:
utACK fa098713201a6999ec4c12d0a8bde0adcf47b095
vasild:
ACK fa098713201a6999ec4c12d0a8bde0adcf47b095
Tree-SHA512: 802fda33bda40fe2521f1e3be075ceddc5fd9ba185bd494286e50019931dfd688da7a6513601138b1dc7bb8e80ae47c8572902406eb59f68990619ddb2656748
2021-05-07 10:27:37 +02:00
|
|
|
if (int64_t{jump} >= int64_t{endpos - pos}) break; // Jumping past EOF
|
2021-05-11 17:11:07 +02:00
|
|
|
if (ip[ip.size() - bits]) {
|
|
|
|
pos += jump;
|
|
|
|
}
|
|
|
|
bits--;
|
2022-03-24 20:28:20 +01:00
|
|
|
} else if (opcode == Instruction::MATCH) {
|
2020-01-29 22:55:40 +01:00
|
|
|
match = DecodeMatch(pos, endpos);
|
2022-03-24 20:28:20 +01:00
|
|
|
if (match == INVALID) break; // Match bits straddle EOF
|
2021-05-11 17:11:07 +02:00
|
|
|
matchlen = CountBits(match) - 1;
|
2022-03-24 20:28:20 +01:00
|
|
|
if (bits < matchlen) break; // Not enough input bits
|
2021-05-11 17:11:07 +02:00
|
|
|
for (uint32_t bit = 0; bit < matchlen; bit++) {
|
|
|
|
if ((ip[ip.size() - bits]) != ((match >> (matchlen - 1 - bit)) & 1)) {
|
|
|
|
return default_asn;
|
|
|
|
}
|
|
|
|
bits--;
|
|
|
|
}
|
2022-03-24 20:28:20 +01:00
|
|
|
} else if (opcode == Instruction::DEFAULT) {
|
2020-01-29 22:55:40 +01:00
|
|
|
default_asn = DecodeASN(pos, endpos);
|
2022-03-24 20:28:20 +01:00
|
|
|
if (default_asn == INVALID) break; // ASN straddles EOF
|
2021-05-11 17:11:07 +02:00
|
|
|
} else {
|
2022-03-24 20:28:20 +01:00
|
|
|
break; // Instruction straddles EOF
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
|
|
|
}
|
2022-03-24 20:28:20 +01:00
|
|
|
assert(false); // Reached EOF without RETURN, or aborted (see any of the breaks above) - should have been caught by SanityCheckASMap below
|
2020-01-29 22:55:40 +01:00
|
|
|
return 0; // 0 is not a valid ASN
|
2021-05-11 17:11:07 +02:00
|
|
|
}
|
2022-03-24 20:28:20 +01:00
|
|
|
|
|
|
|
bool SanityCheckASMap(const std::vector<bool>& asmap, int bits)
|
|
|
|
{
|
|
|
|
const std::vector<bool>::const_iterator begin = asmap.begin(), endpos = asmap.end();
|
|
|
|
std::vector<bool>::const_iterator pos = begin;
|
|
|
|
std::vector<std::pair<uint32_t, int>> jumps; // All future positions we may jump to (bit offset in asmap -> bits to consume left)
|
|
|
|
jumps.reserve(bits);
|
|
|
|
Instruction prevopcode = Instruction::JUMP;
|
|
|
|
bool had_incomplete_match = false;
|
|
|
|
while (pos != endpos) {
|
|
|
|
uint32_t offset = pos - begin;
|
|
|
|
if (!jumps.empty() && offset >= jumps.back().first) return false; // There was a jump into the middle of the previous instruction
|
|
|
|
Instruction opcode = DecodeType(pos, endpos);
|
|
|
|
if (opcode == Instruction::RETURN) {
|
|
|
|
if (prevopcode == Instruction::DEFAULT) return false; // There should not be any RETURN immediately after a DEFAULT (could be combined into just RETURN)
|
|
|
|
uint32_t asn = DecodeASN(pos, endpos);
|
|
|
|
if (asn == INVALID) return false; // ASN straddles EOF
|
|
|
|
if (jumps.empty()) {
|
|
|
|
// Nothing to execute anymore
|
|
|
|
if (endpos - pos > 7) return false; // Excessive padding
|
|
|
|
while (pos != endpos) {
|
|
|
|
if (*pos) return false; // Nonzero padding bit
|
|
|
|
++pos;
|
|
|
|
}
|
|
|
|
return true; // Sanely reached EOF
|
|
|
|
} else {
|
|
|
|
// Continue by pretending we jumped to the next instruction
|
|
|
|
offset = pos - begin;
|
|
|
|
if (offset != jumps.back().first) return false; // Unreachable code
|
|
|
|
bits = jumps.back().second; // Restore the number of bits we would have had left after this jump
|
|
|
|
jumps.pop_back();
|
|
|
|
prevopcode = Instruction::JUMP;
|
|
|
|
}
|
|
|
|
} else if (opcode == Instruction::JUMP) {
|
|
|
|
uint32_t jump = DecodeJump(pos, endpos);
|
|
|
|
if (jump == INVALID) return false; // Jump offset straddles EOF
|
Merge bitcoin/bitcoin#21802: refactor: Avoid UB in util/asmap (advance a dereferenceable iterator outside its valid range)
fa098713201a6999ec4c12d0a8bde0adcf47b095 refactor: Avoid sign-compare compiler warning in util/asmap (MarcoFalke)
Pull request description:
Can be reproduced on current master with `D_GLIBCXX_DEBUG`:
```
/usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/debug/safe_iterator.h:883:
In function:
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::_Self __gnu_debug::operator+(const
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::_Self &,
__gnu_debug::_Safe_iterator<type-parameter-0-0, type-parameter-0-1,
std::random_access_iterator_tag>::difference_type)
Error: attempt to advance a dereferenceable iterator 369 steps, which falls
outside its valid range.
Objects involved in the operation:
iterator @ 0x0x7ffd3d613138 {
type = std::__cxx1998::_Bit_const_iterator (constant iterator);
state = dereferenceable;
references sequence with type 'std::__debug::vector<bool, std::allocator<bool> >' @ 0x0x7ffd3d663590
}
==65050== ERROR: libFuzzer: deadly signal
#0 0x559ab9787690 in __sanitizer_print_stack_trace (/bitcoin/src/test/fuzz/fuzz+0x5a1690)
#1 0x559ab9733998 in fuzzer::PrintStackTrace() (/bitcoin/src/test/fuzz/fuzz+0x54d998)
#2 0x559ab9718ae3 in fuzzer::Fuzzer::CrashCallback() (/bitcoin/src/test/fuzz/fuzz+0x532ae3)
#3 0x7f70a0e723bf (/lib/x86_64-linux-gnu/libpthread.so.0+0x153bf)
#4 0x7f70a0b3418a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4618a)
#5 0x7f70a0b13858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x25858)
#6 0x7f70a0f21148 (/lib/x86_64-linux-gnu/libstdc++.so.6+0xa1148)
#7 0x559ab9f60a96 in __gnu_debug::operator+(__gnu_debug::_Safe_iterator<std::__cxx1998::_Bit_const_iterator, std::__debug::vector<bool, std::allocator<bool> >, std::random_access_iterator_tag> const&, long) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/debug/safe_iterator.h:881:2
#8 0x559ab9f61062 in SanityCheckASMap(std::__debug::vector<bool, std::allocator<bool> > const&, int) util/asmap.cpp:159:21
#9 0x559ab9e4fdfa in SanityCheckASMap(std::__debug::vector<bool, std::allocator<bool> > const&) netaddress.cpp:1242:12
#10 0x559ab9793fcb in addrman_fuzz_target(Span<unsigned char const>) test/fuzz/addrman.cpp:43:14
#11 0x559ab978a03c in std::_Function_handler<void (Span<unsigned char const>), void (*)(Span<unsigned char const>)>::_M_invoke(std::_Any_data const&, Span<unsigned char const>&&) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:300:2
#12 0x559aba2692c7 in std::function<void (Span<unsigned char const>)>::operator()(Span<unsigned char const>) const /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:688:14
#13 0x559aba269132 in LLVMFuzzerTestOneInput test/fuzz/fuzz.cpp:63:5
#14 0x559ab971a1a1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/bitcoin/src/test/fuzz/fuzz+0x5341a1)
#15 0x559ab97198e5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/bitcoin/src/test/fuzz/fuzz+0x5338e5)
#16 0x559ab971bb87 in fuzzer::Fuzzer::MutateAndTestOne() (/bitcoin/src/test/fuzz/fuzz+0x535b87)
#17 0x559ab971c885 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/bitcoin/src/test/fuzz/fuzz+0x536885)
#18 0x559ab970b23e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/bitcoin/src/test/fuzz/fuzz+0x52523e)
#19 0x559ab9734082 in main (/bitcoin/src/test/fuzz/fuzz+0x54e082)
#20 0x7f70a0b150b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#21 0x559ab96dffdd in _start (/bitcoin/src/test/fuzz/fuzz+0x4f9fdd)
ACKs for top commit:
sipa:
utACK fa098713201a6999ec4c12d0a8bde0adcf47b095
vasild:
ACK fa098713201a6999ec4c12d0a8bde0adcf47b095
Tree-SHA512: 802fda33bda40fe2521f1e3be075ceddc5fd9ba185bd494286e50019931dfd688da7a6513601138b1dc7bb8e80ae47c8572902406eb59f68990619ddb2656748
2021-05-07 10:27:37 +02:00
|
|
|
if (int64_t{jump} > int64_t{endpos - pos}) return false; // Jump out of range
|
2022-03-24 20:28:20 +01:00
|
|
|
if (bits == 0) return false; // Consuming bits past the end of the input
|
|
|
|
--bits;
|
|
|
|
uint32_t jump_offset = pos - begin + jump;
|
|
|
|
if (!jumps.empty() && jump_offset >= jumps.back().first) return false; // Intersecting jumps
|
|
|
|
jumps.emplace_back(jump_offset, bits);
|
|
|
|
prevopcode = Instruction::JUMP;
|
|
|
|
} else if (opcode == Instruction::MATCH) {
|
|
|
|
uint32_t match = DecodeMatch(pos, endpos);
|
|
|
|
if (match == INVALID) return false; // Match bits straddle EOF
|
|
|
|
int matchlen = CountBits(match) - 1;
|
|
|
|
if (prevopcode != Instruction::MATCH) had_incomplete_match = false;
|
|
|
|
if (matchlen < 8 && had_incomplete_match) return false; // Within a sequence of matches only at most one should be incomplete
|
|
|
|
had_incomplete_match = (matchlen < 8);
|
|
|
|
if (bits < matchlen) return false; // Consuming bits past the end of the input
|
|
|
|
bits -= matchlen;
|
|
|
|
prevopcode = Instruction::MATCH;
|
|
|
|
} else if (opcode == Instruction::DEFAULT) {
|
|
|
|
if (prevopcode == Instruction::DEFAULT) return false; // There should not be two successive DEFAULTs (they could be combined into one)
|
|
|
|
uint32_t asn = DecodeASN(pos, endpos);
|
|
|
|
if (asn == INVALID) return false; // ASN straddles EOF
|
|
|
|
prevopcode = Instruction::DEFAULT;
|
|
|
|
} else {
|
|
|
|
return false; // Instruction straddles EOF
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false; // Reached EOF without RETURN instruction
|
|
|
|
}
|