1221234Skargl/* crypto/txt_db/txt_db.c */ 22116Sjkh/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 32116Sjkh * All rights reserved. 42116Sjkh * 5221234Skargl * This package is an SSL implementation written 62116Sjkh * by Eric Young (eay@cryptsoft.com). 7141296Sdas * The implementation was written so as to conform with Netscapes SSL. 82116Sjkh * 9141296Sdas * This library is free for commercial and non-commercial use as long as 102116Sjkh * the following conditions are aheared to. The following conditions 112116Sjkh * apply to all code found in this distribution, be it the RC4, RSA, 12141296Sdas * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13176476Sbde * included with this distribution is covered by the same copyright terms 142116Sjkh * except that the holder is Tim Hudson (tjh@cryptsoft.com). 152116Sjkh * 16176385Sbde * Copyright remains Eric Young's, and as such any Copyright notices in 17176385Sbde * the code are not to be removed. 182116Sjkh * If this package is used in a product, Eric Young should be given attribution 19221234Skargl * as the author of the parts of the library used. 20141296Sdas * This can be in the form of a textual message at program startup or 21141296Sdas * in documentation (online or textual) provided with the package. 222116Sjkh * 232116Sjkh * Redistribution and use in source and binary forms, with or without 242116Sjkh * modification, are permitted provided that the following conditions 25176465Sbde * are met: 26176465Sbde * 1. Redistributions of source code must retain the copyright 272116Sjkh * notice, this list of conditions and the following disclaimer. 282116Sjkh * 2. Redistributions in binary form must reproduce the above copyright 29221234Skargl * notice, this list of conditions and the following disclaimer in the 302116Sjkh * documentation and/or other materials provided with the distribution. 31221234Skargl * 3. All advertising materials mentioning features or use of this software 32221234Skargl * must display the following acknowledgement: 332116Sjkh * "This product includes cryptographic software written by 34221234Skargl * Eric Young (eay@cryptsoft.com)" 35221234Skargl * The word 'cryptographic' can be left out if the rouines from the library 36221234Skargl * being used are not cryptographic related :-). 37221234Skargl * 4. If you include any Windows specific code (or a derivative thereof) from 38221234Skargl * the apps directory (application code) you must include an acknowledgement: 39221234Skargl * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40221234Skargl * 412116Sjkh * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42221234Skargl * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 432116Sjkh * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44221234Skargl * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 452116Sjkh * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 462116Sjkh * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 472116Sjkh * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 488870Srgrimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 492116Sjkh * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50221234Skargl * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 512116Sjkh * SUCH DAMAGE. 52221234Skargl * 53221234Skargl * The licence and distribution terms for any publically available version or 54221234Skargl * derivative of this code cannot be changed. i.e. this code cannot simply be 55221234Skargl * copied and put under another distribution licence 56221234Skargl * [including the GNU Public Licence.] 57221234Skargl */ 58221234Skargl 59221234Skargl#include <stdio.h> 60221234Skargl#include <stdlib.h> 61222508Skargl#include <string.h> 62221234Skargl#include "cryptlib.h" 632116Sjkh#include <openssl/buffer.h> 64221234Skargl#include <openssl/txt_db.h> 65221234Skargl 66221234Skargl#undef BUFSIZE 67221234Skargl#define BUFSIZE 512 68221234Skargl 69221234Skarglconst char TXT_DB_version[]="TXT_DB" OPENSSL_VERSION_PTEXT; 702116Sjkh 71221234SkarglTXT_DB *TXT_DB_read(BIO *in, int num) 72221234Skargl { 73221234Skargl TXT_DB *ret=NULL; 74221234Skargl int er=1; 75221234Skargl int esc=0; 76221234Skargl long ln=0; 77176465Sbde int i,add,n; 78221234Skargl int size=BUFSIZE; 79221234Skargl int offset=0; 80221234Skargl char *p,*f; 81221234Skargl OPENSSL_STRING *pp; 82176465Sbde BUF_MEM *buf=NULL; 83221234Skargl 84176465Sbde if ((buf=BUF_MEM_new()) == NULL) goto err; 85176476Sbde if (!BUF_MEM_grow(buf,size)) goto err; 86221234Skargl 87176466Sbde if ((ret=OPENSSL_malloc(sizeof(TXT_DB))) == NULL) 88221234Skargl goto err; 89221234Skargl ret->num_fields=num; 90221234Skargl ret->index=NULL; 91141296Sdas ret->qual=NULL; 92221234Skargl if ((ret->data=sk_OPENSSL_PSTRING_new_null()) == NULL) 93221234Skargl goto err; 94221234Skargl if ((ret->index=OPENSSL_malloc(sizeof(*ret->index)*num)) == NULL) 95221234Skargl goto err; 962116Sjkh if ((ret->qual=OPENSSL_malloc(sizeof(*(ret->qual))*num)) == NULL) 97141296Sdas goto err; 982116Sjkh for (i=0; i<num; i++) 99141296Sdas { 1002116Sjkh ret->index[i]=NULL; 101221234Skargl ret->qual[i]=NULL; 102221234Skargl } 103221234Skargl 104221234Skargl add=(num+1)*sizeof(char *); 1052116Sjkh buf->data[size-1]='\0'; 106141296Sdas offset=0; 1072116Sjkh for (;;) 108141296Sdas { 1092116Sjkh if (offset != 0) 1102116Sjkh { 1112116Sjkh size+=BUFSIZE; 1122116Sjkh if (!BUF_MEM_grow_clean(buf,size)) goto err; 1132116Sjkh } 114176476Sbde buf->data[offset]='\0'; 1152116Sjkh BIO_gets(in,&(buf->data[offset]),size-offset); 116141296Sdas ln++; 1172116Sjkh if (buf->data[offset] == '\0') break; 1182116Sjkh if ((offset == 0) && (buf->data[0] == '#')) continue; 119221234Skargl i=strlen(&(buf->data[offset])); 1202116Sjkh offset+=i; 1212116Sjkh if (buf->data[offset-1] != '\n') 1222116Sjkh continue; 123221234Skargl else 124221234Skargl { 125221234Skargl buf->data[offset-1]='\0'; /* blat the '\n' */ 126221234Skargl if (!(p=OPENSSL_malloc(add+offset))) goto err; 127221234Skargl offset=0; 1282116Sjkh } 1292116Sjkh pp=(char **)p; 1302116Sjkh p+=add; 131221234Skargl n=0; 132221234Skargl pp[n++]=p; 1332116Sjkh i=0; 134221234Skargl f=buf->data; 135221234Skargl 136221234Skargl esc=0; 137221234Skargl for (;;) 138221234Skargl { 139221234Skargl if (*f == '\0') break; 1402116Sjkh if (*f == '\t') 141 { 142 if (esc) 143 p--; 144 else 145 { 146 *(p++)='\0'; 147 f++; 148 if (n >= num) break; 149 pp[n++]=p; 150 continue; 151 } 152 } 153 esc=(*f == '\\'); 154 *(p++)= *(f++); 155 } 156 *(p++)='\0'; 157 if ((n != num) || (*f != '\0')) 158 { 159#if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary fix :-( */ 160 fprintf(stderr,"wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)\n",ln,num,n,f); 161#endif 162 er=2; 163 goto err; 164 } 165 pp[n]=p; 166 if (!sk_OPENSSL_PSTRING_push(ret->data,pp)) 167 { 168#if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) /* temporary fix :-( */ 169 fprintf(stderr,"failure in sk_push\n"); 170#endif 171 er=2; 172 goto err; 173 } 174 } 175 er=0; 176err: 177 BUF_MEM_free(buf); 178 if (er) 179 { 180#if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) 181 if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n"); 182#endif 183 if (ret != NULL) 184 { 185 if (ret->data != NULL) sk_OPENSSL_PSTRING_free(ret->data); 186 if (ret->index != NULL) OPENSSL_free(ret->index); 187 if (ret->qual != NULL) OPENSSL_free(ret->qual); 188 if (ret != NULL) OPENSSL_free(ret); 189 } 190 return(NULL); 191 } 192 else 193 return(ret); 194 } 195 196OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value) 197 { 198 OPENSSL_STRING *ret; 199 LHASH_OF(OPENSSL_STRING) *lh; 200 201 if (idx >= db->num_fields) 202 { 203 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; 204 return(NULL); 205 } 206 lh=db->index[idx]; 207 if (lh == NULL) 208 { 209 db->error=DB_ERROR_NO_INDEX; 210 return(NULL); 211 } 212 ret=lh_OPENSSL_STRING_retrieve(lh,value); 213 db->error=DB_ERROR_OK; 214 return(ret); 215 } 216 217int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(OPENSSL_STRING *), 218 LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp) 219 { 220 LHASH_OF(OPENSSL_STRING) *idx; 221 OPENSSL_STRING *r; 222 int i,n; 223 224 if (field >= db->num_fields) 225 { 226 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; 227 return(0); 228 } 229 /* FIXME: we lose type checking at this point */ 230 if ((idx=(LHASH_OF(OPENSSL_STRING) *)lh_new(hash,cmp)) == NULL) 231 { 232 db->error=DB_ERROR_MALLOC; 233 return(0); 234 } 235 n=sk_OPENSSL_PSTRING_num(db->data); 236 for (i=0; i<n; i++) 237 { 238 r=sk_OPENSSL_PSTRING_value(db->data,i); 239 if ((qual != NULL) && (qual(r) == 0)) continue; 240 if ((r=lh_OPENSSL_STRING_insert(idx,r)) != NULL) 241 { 242 db->error=DB_ERROR_INDEX_CLASH; 243 db->arg1=sk_OPENSSL_PSTRING_find(db->data,r); 244 db->arg2=i; 245 lh_OPENSSL_STRING_free(idx); 246 return(0); 247 } 248 } 249 if (db->index[field] != NULL) lh_OPENSSL_STRING_free(db->index[field]); 250 db->index[field]=idx; 251 db->qual[field]=qual; 252 return(1); 253 } 254 255long TXT_DB_write(BIO *out, TXT_DB *db) 256 { 257 long i,j,n,nn,l,tot=0; 258 char *p,**pp,*f; 259 BUF_MEM *buf=NULL; 260 long ret= -1; 261 262 if ((buf=BUF_MEM_new()) == NULL) 263 goto err; 264 n=sk_OPENSSL_PSTRING_num(db->data); 265 nn=db->num_fields; 266 for (i=0; i<n; i++) 267 { 268 pp=sk_OPENSSL_PSTRING_value(db->data,i); 269 270 l=0; 271 for (j=0; j<nn; j++) 272 { 273 if (pp[j] != NULL) 274 l+=strlen(pp[j]); 275 } 276 if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err; 277 278 p=buf->data; 279 for (j=0; j<nn; j++) 280 { 281 f=pp[j]; 282 if (f != NULL) 283 for (;;) 284 { 285 if (*f == '\0') break; 286 if (*f == '\t') *(p++)='\\'; 287 *(p++)= *(f++); 288 } 289 *(p++)='\t'; 290 } 291 p[-1]='\n'; 292 j=p-buf->data; 293 if (BIO_write(out,buf->data,(int)j) != j) 294 goto err; 295 tot+=j; 296 } 297 ret=tot; 298err: 299 if (buf != NULL) BUF_MEM_free(buf); 300 return(ret); 301 } 302 303int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row) 304 { 305 int i; 306 OPENSSL_STRING *r; 307 308 for (i=0; i<db->num_fields; i++) 309 { 310 if (db->index[i] != NULL) 311 { 312 if ((db->qual[i] != NULL) && 313 (db->qual[i](row) == 0)) continue; 314 r=lh_OPENSSL_STRING_retrieve(db->index[i],row); 315 if (r != NULL) 316 { 317 db->error=DB_ERROR_INDEX_CLASH; 318 db->arg1=i; 319 db->arg_row=r; 320 goto err; 321 } 322 } 323 } 324 /* We have passed the index checks, now just append and insert */ 325 if (!sk_OPENSSL_PSTRING_push(db->data,row)) 326 { 327 db->error=DB_ERROR_MALLOC; 328 goto err; 329 } 330 331 for (i=0; i<db->num_fields; i++) 332 { 333 if (db->index[i] != NULL) 334 { 335 if ((db->qual[i] != NULL) && 336 (db->qual[i](row) == 0)) continue; 337 (void)lh_OPENSSL_STRING_insert(db->index[i],row); 338 } 339 } 340 return(1); 341err: 342 return(0); 343 } 344 345void TXT_DB_free(TXT_DB *db) 346 { 347 int i,n; 348 char **p,*max; 349 350 if(db == NULL) 351 return; 352 353 if (db->index != NULL) 354 { 355 for (i=db->num_fields-1; i>=0; i--) 356 if (db->index[i] != NULL) lh_OPENSSL_STRING_free(db->index[i]); 357 OPENSSL_free(db->index); 358 } 359 if (db->qual != NULL) 360 OPENSSL_free(db->qual); 361 if (db->data != NULL) 362 { 363 for (i=sk_OPENSSL_PSTRING_num(db->data)-1; i>=0; i--) 364 { 365 /* check if any 'fields' have been allocated 366 * from outside of the initial block */ 367 p=sk_OPENSSL_PSTRING_value(db->data,i); 368 max=p[db->num_fields]; /* last address */ 369 if (max == NULL) /* new row */ 370 { 371 for (n=0; n<db->num_fields; n++) 372 if (p[n] != NULL) OPENSSL_free(p[n]); 373 } 374 else 375 { 376 for (n=0; n<db->num_fields; n++) 377 { 378 if (((p[n] < (char *)p) || (p[n] > max)) 379 && (p[n] != NULL)) 380 OPENSSL_free(p[n]); 381 } 382 } 383 OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data,i)); 384 } 385 sk_OPENSSL_PSTRING_free(db->data); 386 } 387 OPENSSL_free(db); 388 } 389