1 /* crypto/txt_db/txt_db.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "cryptlib.h"
63 #include <openssl/buffer.h>
64 #include <openssl/txt_db.h>
65
66 #undef BUFSIZE
67 #define BUFSIZE 512
68
69 const char TXT_DB_version[]="TXT_DB" OPENSSL_VERSION_PTEXT;
70
TXT_DB_read(BIO * in,int num)71 TXT_DB *TXT_DB_read(BIO *in, int num)
72 {
73 TXT_DB *ret=NULL;
74 int er=1;
75 int esc=0;
76 long ln=0;
77 int i,add,n;
78 int size=BUFSIZE;
79 int offset=0;
80 char *p,*f;
81 OPENSSL_STRING *pp;
82 BUF_MEM *buf=NULL;
83
84 if ((buf=BUF_MEM_new()) == NULL) goto err;
85 if (!BUF_MEM_grow(buf,size)) goto err;
86
87 if ((ret=OPENSSL_malloc(sizeof(TXT_DB))) == NULL)
88 goto err;
89 ret->num_fields=num;
90 ret->index=NULL;
91 ret->qual=NULL;
92 if ((ret->data=sk_OPENSSL_PSTRING_new_null()) == NULL)
93 goto err;
94 if ((ret->index=OPENSSL_malloc(sizeof(*ret->index)*num)) == NULL)
95 goto err;
96 if ((ret->qual=OPENSSL_malloc(sizeof(*(ret->qual))*num)) == NULL)
97 goto err;
98 for (i=0; i<num; i++)
99 {
100 ret->index[i]=NULL;
101 ret->qual[i]=NULL;
102 }
103
104 add=(num+1)*sizeof(char *);
105 buf->data[size-1]='\0';
106 offset=0;
107 for (;;)
108 {
109 if (offset != 0)
110 {
111 size+=BUFSIZE;
112 if (!BUF_MEM_grow_clean(buf,size)) goto err;
113 }
114 buf->data[offset]='\0';
115 BIO_gets(in,&(buf->data[offset]),size-offset);
116 ln++;
117 if (buf->data[offset] == '\0') break;
118 if ((offset == 0) && (buf->data[0] == '#')) continue;
119 i=strlen(&(buf->data[offset]));
120 offset+=i;
121 if (buf->data[offset-1] != '\n')
122 continue;
123 else
124 {
125 buf->data[offset-1]='\0'; /* blat the '\n' */
126 if (!(p=OPENSSL_malloc(add+offset))) goto err;
127 offset=0;
128 }
129 pp=(char **)p;
130 p+=add;
131 n=0;
132 pp[n++]=p;
133 i=0;
134 f=buf->data;
135
136 esc=0;
137 for (;;)
138 {
139 if (*f == '\0') break;
140 if (*f == '\t')
141 {
142 if (esc)
143 p--;
144 else
145 {
146 *(p++)='\0';
147 f++;
148 if (n >= num) break;
149 pp[n++]=p;
150 continue;
151 }
152 }
153 esc=(*f == '\\');
154 *(p++)= *(f++);
155 }
156 *(p++)='\0';
157 if ((n != num) || (*f != '\0'))
158 {
159 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary fix :-( */
160 fprintf(stderr,"wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)\n",ln,num,n,f);
161 #endif
162 er=2;
163 goto err;
164 }
165 pp[n]=p;
166 if (!sk_OPENSSL_PSTRING_push(ret->data,pp))
167 {
168 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary fix :-( */
169 fprintf(stderr,"failure in sk_push\n");
170 #endif
171 er=2;
172 goto err;
173 }
174 }
175 er=0;
176 err:
177 BUF_MEM_free(buf);
178 if (er)
179 {
180 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)
181 if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n");
182 #endif
183 if (ret != NULL)
184 {
185 if (ret->data != NULL) sk_OPENSSL_PSTRING_free(ret->data);
186 if (ret->index != NULL) OPENSSL_free(ret->index);
187 if (ret->qual != NULL) OPENSSL_free(ret->qual);
188 if (ret != NULL) OPENSSL_free(ret);
189 }
190 return(NULL);
191 }
192 else
193 return(ret);
194 }
195
TXT_DB_get_by_index(TXT_DB * db,int idx,OPENSSL_STRING * value)196 OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value)
197 {
198 OPENSSL_STRING *ret;
199 LHASH_OF(OPENSSL_STRING) *lh;
200
201 if (idx >= db->num_fields)
202 {
203 db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
204 return(NULL);
205 }
206 lh=db->index[idx];
207 if (lh == NULL)
208 {
209 db->error=DB_ERROR_NO_INDEX;
210 return(NULL);
211 }
212 ret=lh_OPENSSL_STRING_retrieve(lh,value);
213 db->error=DB_ERROR_OK;
214 return(ret);
215 }
216
TXT_DB_create_index(TXT_DB * db,int field,int (* qual)(OPENSSL_STRING *),LHASH_HASH_FN_TYPE hash,LHASH_COMP_FN_TYPE cmp)217 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(OPENSSL_STRING *),
218 LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp)
219 {
220 LHASH_OF(OPENSSL_STRING) *idx;
221 OPENSSL_STRING *r;
222 int i,n;
223
224 if (field >= db->num_fields)
225 {
226 db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
227 return(0);
228 }
229 /* FIXME: we lose type checking at this point */
230 if ((idx=(LHASH_OF(OPENSSL_STRING) *)lh_new(hash,cmp)) == NULL)
231 {
232 db->error=DB_ERROR_MALLOC;
233 return(0);
234 }
235 n=sk_OPENSSL_PSTRING_num(db->data);
236 for (i=0; i<n; i++)
237 {
238 r=sk_OPENSSL_PSTRING_value(db->data,i);
239 if ((qual != NULL) && (qual(r) == 0)) continue;
240 if ((r=lh_OPENSSL_STRING_insert(idx,r)) != NULL)
241 {
242 db->error=DB_ERROR_INDEX_CLASH;
243 db->arg1=sk_OPENSSL_PSTRING_find(db->data,r);
244 db->arg2=i;
245 lh_OPENSSL_STRING_free(idx);
246 return(0);
247 }
248 }
249 if (db->index[field] != NULL) lh_OPENSSL_STRING_free(db->index[field]);
250 db->index[field]=idx;
251 db->qual[field]=qual;
252 return(1);
253 }
254
TXT_DB_write(BIO * out,TXT_DB * db)255 long TXT_DB_write(BIO *out, TXT_DB *db)
256 {
257 long i,j,n,nn,l,tot=0;
258 char *p,**pp,*f;
259 BUF_MEM *buf=NULL;
260 long ret= -1;
261
262 if ((buf=BUF_MEM_new()) == NULL)
263 goto err;
264 n=sk_OPENSSL_PSTRING_num(db->data);
265 nn=db->num_fields;
266 for (i=0; i<n; i++)
267 {
268 pp=sk_OPENSSL_PSTRING_value(db->data,i);
269
270 l=0;
271 for (j=0; j<nn; j++)
272 {
273 if (pp[j] != NULL)
274 l+=strlen(pp[j]);
275 }
276 if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err;
277
278 p=buf->data;
279 for (j=0; j<nn; j++)
280 {
281 f=pp[j];
282 if (f != NULL)
283 for (;;)
284 {
285 if (*f == '\0') break;
286 if (*f == '\t') *(p++)='\\';
287 *(p++)= *(f++);
288 }
289 *(p++)='\t';
290 }
291 p[-1]='\n';
292 j=p-buf->data;
293 if (BIO_write(out,buf->data,(int)j) != j)
294 goto err;
295 tot+=j;
296 }
297 ret=tot;
298 err:
299 if (buf != NULL) BUF_MEM_free(buf);
300 return(ret);
301 }
302
TXT_DB_insert(TXT_DB * db,OPENSSL_STRING * row)303 int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row)
304 {
305 int i;
306 OPENSSL_STRING *r;
307
308 for (i=0; i<db->num_fields; i++)
309 {
310 if (db->index[i] != NULL)
311 {
312 if ((db->qual[i] != NULL) &&
313 (db->qual[i](row) == 0)) continue;
314 r=lh_OPENSSL_STRING_retrieve(db->index[i],row);
315 if (r != NULL)
316 {
317 db->error=DB_ERROR_INDEX_CLASH;
318 db->arg1=i;
319 db->arg_row=r;
320 goto err;
321 }
322 }
323 }
324 /* We have passed the index checks, now just append and insert */
325 if (!sk_OPENSSL_PSTRING_push(db->data,row))
326 {
327 db->error=DB_ERROR_MALLOC;
328 goto err;
329 }
330
331 for (i=0; i<db->num_fields; i++)
332 {
333 if (db->index[i] != NULL)
334 {
335 if ((db->qual[i] != NULL) &&
336 (db->qual[i](row) == 0)) continue;
337 (void)lh_OPENSSL_STRING_insert(db->index[i],row);
338 }
339 }
340 return(1);
341 err:
342 return(0);
343 }
344
TXT_DB_free(TXT_DB * db)345 void TXT_DB_free(TXT_DB *db)
346 {
347 int i,n;
348 char **p,*max;
349
350 if(db == NULL)
351 return;
352
353 if (db->index != NULL)
354 {
355 for (i=db->num_fields-1; i>=0; i--)
356 if (db->index[i] != NULL) lh_OPENSSL_STRING_free(db->index[i]);
357 OPENSSL_free(db->index);
358 }
359 if (db->qual != NULL)
360 OPENSSL_free(db->qual);
361 if (db->data != NULL)
362 {
363 for (i=sk_OPENSSL_PSTRING_num(db->data)-1; i>=0; i--)
364 {
365 /* check if any 'fields' have been allocated
366 * from outside of the initial block */
367 p=sk_OPENSSL_PSTRING_value(db->data,i);
368 max=p[db->num_fields]; /* last address */
369 if (max == NULL) /* new row */
370 {
371 for (n=0; n<db->num_fields; n++)
372 if (p[n] != NULL) OPENSSL_free(p[n]);
373 }
374 else
375 {
376 for (n=0; n<db->num_fields; n++)
377 {
378 if (((p[n] < (char *)p) || (p[n] > max))
379 && (p[n] != NULL))
380 OPENSSL_free(p[n]);
381 }
382 }
383 OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data,i));
384 }
385 sk_OPENSSL_PSTRING_free(db->data);
386 }
387 OPENSSL_free(db);
388 }
389