• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* crypto/txt_db/txt_db.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "cryptlib.h"
63 #include <openssl/buffer.h>
64 #include <openssl/txt_db.h>
65 
66 #undef BUFSIZE
67 #define BUFSIZE	512
68 
69 const char TXT_DB_version[]="TXT_DB" OPENSSL_VERSION_PTEXT;
70 
TXT_DB_read(BIO * in,int num)71 TXT_DB *TXT_DB_read(BIO *in, int num)
72 	{
73 	TXT_DB *ret=NULL;
74 	int er=1;
75 	int esc=0;
76 	long ln=0;
77 	int i,add,n;
78 	int size=BUFSIZE;
79 	int offset=0;
80 	char *p,*f;
81 	OPENSSL_STRING *pp;
82 	BUF_MEM *buf=NULL;
83 
84 	if ((buf=BUF_MEM_new()) == NULL) goto err;
85 	if (!BUF_MEM_grow(buf,size)) goto err;
86 
87 	if ((ret=OPENSSL_malloc(sizeof(TXT_DB))) == NULL)
88 		goto err;
89 	ret->num_fields=num;
90 	ret->index=NULL;
91 	ret->qual=NULL;
92 	if ((ret->data=sk_OPENSSL_PSTRING_new_null()) == NULL)
93 		goto err;
94 	if ((ret->index=OPENSSL_malloc(sizeof(*ret->index)*num)) == NULL)
95 		goto err;
96 	if ((ret->qual=OPENSSL_malloc(sizeof(*(ret->qual))*num)) == NULL)
97 		goto err;
98 	for (i=0; i<num; i++)
99 		{
100 		ret->index[i]=NULL;
101 		ret->qual[i]=NULL;
102 		}
103 
104 	add=(num+1)*sizeof(char *);
105 	buf->data[size-1]='\0';
106 	offset=0;
107 	for (;;)
108 		{
109 		if (offset != 0)
110 			{
111 			size+=BUFSIZE;
112 			if (!BUF_MEM_grow_clean(buf,size)) goto err;
113 			}
114 		buf->data[offset]='\0';
115 		BIO_gets(in,&(buf->data[offset]),size-offset);
116 		ln++;
117 		if (buf->data[offset] == '\0') break;
118 		if ((offset == 0) && (buf->data[0] == '#')) continue;
119 		i=strlen(&(buf->data[offset]));
120 		offset+=i;
121 		if (buf->data[offset-1] != '\n')
122 			continue;
123 		else
124 			{
125 			buf->data[offset-1]='\0'; /* blat the '\n' */
126 			if (!(p=OPENSSL_malloc(add+offset))) goto err;
127 			offset=0;
128 			}
129 		pp=(char **)p;
130 		p+=add;
131 		n=0;
132 		pp[n++]=p;
133 		i=0;
134 		f=buf->data;
135 
136 		esc=0;
137 		for (;;)
138 			{
139 			if (*f == '\0') break;
140 			if (*f == '\t')
141 				{
142 				if (esc)
143 					p--;
144 				else
145 					{
146 					*(p++)='\0';
147 					f++;
148 					if (n >=  num) break;
149 					pp[n++]=p;
150 					continue;
151 					}
152 				}
153 			esc=(*f == '\\');
154 			*(p++)= *(f++);
155 			}
156 		*(p++)='\0';
157 		if ((n != num) || (*f != '\0'))
158 			{
159 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)	/* temporary fix :-( */
160 			fprintf(stderr,"wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)\n",ln,num,n,f);
161 #endif
162 			er=2;
163 			goto err;
164 			}
165 		pp[n]=p;
166 		if (!sk_OPENSSL_PSTRING_push(ret->data,pp))
167 			{
168 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)	/* temporary fix :-( */
169 			fprintf(stderr,"failure in sk_push\n");
170 #endif
171 			er=2;
172 			goto err;
173 			}
174 		}
175 	er=0;
176 err:
177 	BUF_MEM_free(buf);
178 	if (er)
179 		{
180 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)
181 		if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n");
182 #endif
183 		if (ret != NULL)
184 			{
185 			if (ret->data != NULL) sk_OPENSSL_PSTRING_free(ret->data);
186 			if (ret->index != NULL) OPENSSL_free(ret->index);
187 			if (ret->qual != NULL) OPENSSL_free(ret->qual);
188 			if (ret != NULL) OPENSSL_free(ret);
189 			}
190 		return(NULL);
191 		}
192 	else
193 		return(ret);
194 	}
195 
TXT_DB_get_by_index(TXT_DB * db,int idx,OPENSSL_STRING * value)196 OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value)
197 	{
198 	OPENSSL_STRING *ret;
199 	LHASH_OF(OPENSSL_STRING) *lh;
200 
201 	if (idx >= db->num_fields)
202 		{
203 		db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
204 		return(NULL);
205 		}
206 	lh=db->index[idx];
207 	if (lh == NULL)
208 		{
209 		db->error=DB_ERROR_NO_INDEX;
210 		return(NULL);
211 		}
212 	ret=lh_OPENSSL_STRING_retrieve(lh,value);
213 	db->error=DB_ERROR_OK;
214 	return(ret);
215 	}
216 
TXT_DB_create_index(TXT_DB * db,int field,int (* qual)(OPENSSL_STRING *),LHASH_HASH_FN_TYPE hash,LHASH_COMP_FN_TYPE cmp)217 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(OPENSSL_STRING *),
218 			LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp)
219 	{
220 	LHASH_OF(OPENSSL_STRING) *idx;
221 	OPENSSL_STRING *r;
222 	int i,n;
223 
224 	if (field >= db->num_fields)
225 		{
226 		db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
227 		return(0);
228 		}
229 	/* FIXME: we lose type checking at this point */
230 	if ((idx=(LHASH_OF(OPENSSL_STRING) *)lh_new(hash,cmp)) == NULL)
231 		{
232 		db->error=DB_ERROR_MALLOC;
233 		return(0);
234 		}
235 	n=sk_OPENSSL_PSTRING_num(db->data);
236 	for (i=0; i<n; i++)
237 		{
238 		r=sk_OPENSSL_PSTRING_value(db->data,i);
239 		if ((qual != NULL) && (qual(r) == 0)) continue;
240 		if ((r=lh_OPENSSL_STRING_insert(idx,r)) != NULL)
241 			{
242 			db->error=DB_ERROR_INDEX_CLASH;
243 			db->arg1=sk_OPENSSL_PSTRING_find(db->data,r);
244 			db->arg2=i;
245 			lh_OPENSSL_STRING_free(idx);
246 			return(0);
247 			}
248 		}
249 	if (db->index[field] != NULL) lh_OPENSSL_STRING_free(db->index[field]);
250 	db->index[field]=idx;
251 	db->qual[field]=qual;
252 	return(1);
253 	}
254 
TXT_DB_write(BIO * out,TXT_DB * db)255 long TXT_DB_write(BIO *out, TXT_DB *db)
256 	{
257 	long i,j,n,nn,l,tot=0;
258 	char *p,**pp,*f;
259 	BUF_MEM *buf=NULL;
260 	long ret= -1;
261 
262 	if ((buf=BUF_MEM_new()) == NULL)
263 		goto err;
264 	n=sk_OPENSSL_PSTRING_num(db->data);
265 	nn=db->num_fields;
266 	for (i=0; i<n; i++)
267 		{
268 		pp=sk_OPENSSL_PSTRING_value(db->data,i);
269 
270 		l=0;
271 		for (j=0; j<nn; j++)
272 			{
273 			if (pp[j] != NULL)
274 				l+=strlen(pp[j]);
275 			}
276 		if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err;
277 
278 		p=buf->data;
279 		for (j=0; j<nn; j++)
280 			{
281 			f=pp[j];
282 			if (f != NULL)
283 				for (;;)
284 					{
285 					if (*f == '\0') break;
286 					if (*f == '\t') *(p++)='\\';
287 					*(p++)= *(f++);
288 					}
289 			*(p++)='\t';
290 			}
291 		p[-1]='\n';
292 		j=p-buf->data;
293 		if (BIO_write(out,buf->data,(int)j) != j)
294 			goto err;
295 		tot+=j;
296 		}
297 	ret=tot;
298 err:
299 	if (buf != NULL) BUF_MEM_free(buf);
300 	return(ret);
301 	}
302 
TXT_DB_insert(TXT_DB * db,OPENSSL_STRING * row)303 int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row)
304 	{
305 	int i;
306 	OPENSSL_STRING *r;
307 
308 	for (i=0; i<db->num_fields; i++)
309 		{
310 		if (db->index[i] != NULL)
311 			{
312 			if ((db->qual[i] != NULL) &&
313 				(db->qual[i](row) == 0)) continue;
314 			r=lh_OPENSSL_STRING_retrieve(db->index[i],row);
315 			if (r != NULL)
316 				{
317 				db->error=DB_ERROR_INDEX_CLASH;
318 				db->arg1=i;
319 				db->arg_row=r;
320 				goto err;
321 				}
322 			}
323 		}
324 	/* We have passed the index checks, now just append and insert */
325 	if (!sk_OPENSSL_PSTRING_push(db->data,row))
326 		{
327 		db->error=DB_ERROR_MALLOC;
328 		goto err;
329 		}
330 
331 	for (i=0; i<db->num_fields; i++)
332 		{
333 		if (db->index[i] != NULL)
334 			{
335 			if ((db->qual[i] != NULL) &&
336 				(db->qual[i](row) == 0)) continue;
337 			(void)lh_OPENSSL_STRING_insert(db->index[i],row);
338 			}
339 		}
340 	return(1);
341 err:
342 	return(0);
343 	}
344 
TXT_DB_free(TXT_DB * db)345 void TXT_DB_free(TXT_DB *db)
346 	{
347 	int i,n;
348 	char **p,*max;
349 
350 	if(db == NULL)
351 	    return;
352 
353 	if (db->index != NULL)
354 		{
355 		for (i=db->num_fields-1; i>=0; i--)
356 			if (db->index[i] != NULL) lh_OPENSSL_STRING_free(db->index[i]);
357 		OPENSSL_free(db->index);
358 		}
359 	if (db->qual != NULL)
360 		OPENSSL_free(db->qual);
361 	if (db->data != NULL)
362 		{
363 		for (i=sk_OPENSSL_PSTRING_num(db->data)-1; i>=0; i--)
364 			{
365 			/* check if any 'fields' have been allocated
366 			 * from outside of the initial block */
367 			p=sk_OPENSSL_PSTRING_value(db->data,i);
368 			max=p[db->num_fields]; /* last address */
369 			if (max == NULL) /* new row */
370 				{
371 				for (n=0; n<db->num_fields; n++)
372 					if (p[n] != NULL) OPENSSL_free(p[n]);
373 				}
374 			else
375 				{
376 				for (n=0; n<db->num_fields; n++)
377 					{
378 					if (((p[n] < (char *)p) || (p[n] > max))
379 						&& (p[n] != NULL))
380 						OPENSSL_free(p[n]);
381 					}
382 				}
383 			OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data,i));
384 			}
385 		sk_OPENSSL_PSTRING_free(db->data);
386 		}
387 	OPENSSL_free(db);
388 	}
389