xref: /freebsd/crypto/openssl/crypto/txt_db/txt_db.c (revision d93a896e)
1 /* crypto/txt_db/txt_db.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "cryptlib.h"
63 #include <openssl/buffer.h>
64 #include <openssl/txt_db.h>
65 
66 #undef BUFSIZE
67 #define BUFSIZE 512
68 
69 const char TXT_DB_version[] = "TXT_DB" OPENSSL_VERSION_PTEXT;
70 
71 TXT_DB *TXT_DB_read(BIO *in, int num)
72 {
73     TXT_DB *ret = NULL;
74     int er = 1;
75     int esc = 0;
76     long ln = 0;
77     int i, add, n;
78     int size = BUFSIZE;
79     int offset = 0;
80     char *p, *f;
81     OPENSSL_STRING *pp;
82     BUF_MEM *buf = NULL;
83 
84     if ((buf = BUF_MEM_new()) == NULL)
85         goto err;
86     if (!BUF_MEM_grow(buf, size))
87         goto err;
88 
89     if ((ret = OPENSSL_malloc(sizeof(TXT_DB))) == NULL)
90         goto err;
91     ret->num_fields = num;
92     ret->index = NULL;
93     ret->qual = NULL;
94     if ((ret->data = sk_OPENSSL_PSTRING_new_null()) == NULL)
95         goto err;
96     if ((ret->index = OPENSSL_malloc(sizeof(*ret->index) * num)) == NULL)
97         goto err;
98     if ((ret->qual = OPENSSL_malloc(sizeof(*(ret->qual)) * num)) == NULL)
99         goto err;
100     for (i = 0; i < num; i++) {
101         ret->index[i] = NULL;
102         ret->qual[i] = NULL;
103     }
104 
105     add = (num + 1) * sizeof(char *);
106     buf->data[size - 1] = '\0';
107     offset = 0;
108     for (;;) {
109         if (offset != 0) {
110             size += BUFSIZE;
111             if (!BUF_MEM_grow_clean(buf, size))
112                 goto err;
113         }
114         buf->data[offset] = '\0';
115         BIO_gets(in, &(buf->data[offset]), size - offset);
116         ln++;
117         if (buf->data[offset] == '\0')
118             break;
119         if ((offset == 0) && (buf->data[0] == '#'))
120             continue;
121         i = strlen(&(buf->data[offset]));
122         offset += i;
123         if (buf->data[offset - 1] != '\n')
124             continue;
125         else {
126             buf->data[offset - 1] = '\0'; /* blat the '\n' */
127             if (!(p = OPENSSL_malloc(add + offset)))
128                 goto err;
129             offset = 0;
130         }
131         pp = (char **)p;
132         p += add;
133         n = 0;
134         pp[n++] = p;
135         i = 0;
136         f = buf->data;
137 
138         esc = 0;
139         for (;;) {
140             if (*f == '\0')
141                 break;
142             if (*f == '\t') {
143                 if (esc)
144                     p--;
145                 else {
146                     *(p++) = '\0';
147                     f++;
148                     if (n >= num)
149                         break;
150                     pp[n++] = p;
151                     continue;
152                 }
153             }
154             esc = (*f == '\\');
155             *(p++) = *(f++);
156         }
157         *(p++) = '\0';
158         if ((n != num) || (*f != '\0')) {
159 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary
160                                                                * fix :-( */
161             fprintf(stderr,
162                     "wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)\n",
163                     ln, num, n, f);
164 #endif
165             OPENSSL_free(pp);
166             er = 2;
167             goto err;
168         }
169         pp[n] = p;
170         if (!sk_OPENSSL_PSTRING_push(ret->data, pp)) {
171 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary
172                                                                * fix :-( */
173             fprintf(stderr, "failure in sk_push\n");
174 #endif
175             OPENSSL_free(pp);
176             er = 2;
177             goto err;
178         }
179     }
180     er = 0;
181  err:
182     BUF_MEM_free(buf);
183     if (er) {
184 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)
185         if (er == 1)
186             fprintf(stderr, "OPENSSL_malloc failure\n");
187 #endif
188         if (ret != NULL) {
189             if (ret->data != NULL)
190                 sk_OPENSSL_PSTRING_free(ret->data);
191             if (ret->index != NULL)
192                 OPENSSL_free(ret->index);
193             if (ret->qual != NULL)
194                 OPENSSL_free(ret->qual);
195             if (ret != NULL)
196                 OPENSSL_free(ret);
197         }
198         return (NULL);
199     } else
200         return (ret);
201 }
202 
203 OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx,
204                                     OPENSSL_STRING *value)
205 {
206     OPENSSL_STRING *ret;
207     LHASH_OF(OPENSSL_STRING) *lh;
208 
209     if (idx >= db->num_fields) {
210         db->error = DB_ERROR_INDEX_OUT_OF_RANGE;
211         return (NULL);
212     }
213     lh = db->index[idx];
214     if (lh == NULL) {
215         db->error = DB_ERROR_NO_INDEX;
216         return (NULL);
217     }
218     ret = lh_OPENSSL_STRING_retrieve(lh, value);
219     db->error = DB_ERROR_OK;
220     return (ret);
221 }
222 
223 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual) (OPENSSL_STRING *),
224                         LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp)
225 {
226     LHASH_OF(OPENSSL_STRING) *idx;
227     OPENSSL_STRING *r, *k;
228     int i, n;
229 
230     if (field >= db->num_fields) {
231         db->error = DB_ERROR_INDEX_OUT_OF_RANGE;
232         return (0);
233     }
234     /* FIXME: we lose type checking at this point */
235     if ((idx = (LHASH_OF(OPENSSL_STRING) *)lh_new(hash, cmp)) == NULL) {
236         db->error = DB_ERROR_MALLOC;
237         return (0);
238     }
239     n = sk_OPENSSL_PSTRING_num(db->data);
240     for (i = 0; i < n; i++) {
241         r = sk_OPENSSL_PSTRING_value(db->data, i);
242         if ((qual != NULL) && (qual(r) == 0))
243             continue;
244         if ((k = lh_OPENSSL_STRING_insert(idx, r)) != NULL) {
245             db->error = DB_ERROR_INDEX_CLASH;
246             db->arg1 = sk_OPENSSL_PSTRING_find(db->data, k);
247             db->arg2 = i;
248             lh_OPENSSL_STRING_free(idx);
249             return (0);
250         }
251         if (lh_OPENSSL_STRING_retrieve(idx, r) == NULL) {
252             db->error = DB_ERROR_MALLOC;
253             lh_OPENSSL_STRING_free(idx);
254             return (0);
255         }
256     }
257     if (db->index[field] != NULL)
258         lh_OPENSSL_STRING_free(db->index[field]);
259     db->index[field] = idx;
260     db->qual[field] = qual;
261     return (1);
262 }
263 
264 long TXT_DB_write(BIO *out, TXT_DB *db)
265 {
266     long i, j, n, nn, l, tot = 0;
267     char *p, **pp, *f;
268     BUF_MEM *buf = NULL;
269     long ret = -1;
270 
271     if ((buf = BUF_MEM_new()) == NULL)
272         goto err;
273     n = sk_OPENSSL_PSTRING_num(db->data);
274     nn = db->num_fields;
275     for (i = 0; i < n; i++) {
276         pp = sk_OPENSSL_PSTRING_value(db->data, i);
277 
278         l = 0;
279         for (j = 0; j < nn; j++) {
280             if (pp[j] != NULL)
281                 l += strlen(pp[j]);
282         }
283         if (!BUF_MEM_grow_clean(buf, (int)(l * 2 + nn)))
284             goto err;
285 
286         p = buf->data;
287         for (j = 0; j < nn; j++) {
288             f = pp[j];
289             if (f != NULL)
290                 for (;;) {
291                     if (*f == '\0')
292                         break;
293                     if (*f == '\t')
294                         *(p++) = '\\';
295                     *(p++) = *(f++);
296                 }
297             *(p++) = '\t';
298         }
299         p[-1] = '\n';
300         j = p - buf->data;
301         if (BIO_write(out, buf->data, (int)j) != j)
302             goto err;
303         tot += j;
304     }
305     ret = tot;
306  err:
307     if (buf != NULL)
308         BUF_MEM_free(buf);
309     return (ret);
310 }
311 
312 int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row)
313 {
314     int i;
315     OPENSSL_STRING *r;
316 
317     for (i = 0; i < db->num_fields; i++) {
318         if (db->index[i] != NULL) {
319             if ((db->qual[i] != NULL) && (db->qual[i] (row) == 0))
320                 continue;
321             r = lh_OPENSSL_STRING_retrieve(db->index[i], row);
322             if (r != NULL) {
323                 db->error = DB_ERROR_INDEX_CLASH;
324                 db->arg1 = i;
325                 db->arg_row = r;
326                 goto err;
327             }
328         }
329     }
330 
331     for (i = 0; i < db->num_fields; i++) {
332         if (db->index[i] != NULL) {
333             if ((db->qual[i] != NULL) && (db->qual[i] (row) == 0))
334                 continue;
335             (void)lh_OPENSSL_STRING_insert(db->index[i], row);
336             if (lh_OPENSSL_STRING_retrieve(db->index[i], row) == NULL)
337                 goto err1;
338         }
339     }
340     if (!sk_OPENSSL_PSTRING_push(db->data, row))
341         goto err1;
342     return (1);
343 
344  err1:
345     db->error = DB_ERROR_MALLOC;
346     while (i-- > 0) {
347         if (db->index[i] != NULL) {
348             if ((db->qual[i] != NULL) && (db->qual[i] (row) == 0))
349                 continue;
350             (void)lh_OPENSSL_STRING_delete(db->index[i], row);
351         }
352     }
353  err:
354     return (0);
355 }
356 
357 void TXT_DB_free(TXT_DB *db)
358 {
359     int i, n;
360     char **p, *max;
361 
362     if (db == NULL)
363         return;
364 
365     if (db->index != NULL) {
366         for (i = db->num_fields - 1; i >= 0; i--)
367             if (db->index[i] != NULL)
368                 lh_OPENSSL_STRING_free(db->index[i]);
369         OPENSSL_free(db->index);
370     }
371     if (db->qual != NULL)
372         OPENSSL_free(db->qual);
373     if (db->data != NULL) {
374         for (i = sk_OPENSSL_PSTRING_num(db->data) - 1; i >= 0; i--) {
375             /*
376              * check if any 'fields' have been allocated from outside of the
377              * initial block
378              */
379             p = sk_OPENSSL_PSTRING_value(db->data, i);
380             max = p[db->num_fields]; /* last address */
381             if (max == NULL) {  /* new row */
382                 for (n = 0; n < db->num_fields; n++)
383                     if (p[n] != NULL)
384                         OPENSSL_free(p[n]);
385             } else {
386                 for (n = 0; n < db->num_fields; n++) {
387                     if (((p[n] < (char *)p) || (p[n] > max))
388                         && (p[n] != NULL))
389                         OPENSSL_free(p[n]);
390                 }
391             }
392             OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data, i));
393         }
394         sk_OPENSSL_PSTRING_free(db->data);
395     }
396     OPENSSL_free(db);
397 }
398