| OLD | NEW |
| 1 /* crypto/txt_db/txt_db.c */ | 1 /* crypto/txt_db/txt_db.c */ |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 * All rights reserved. | 3 * All rights reserved. |
| 4 * | 4 * |
| 5 * This package is an SSL implementation written | 5 * This package is an SSL implementation written |
| 6 * by Eric Young (eay@cryptsoft.com). | 6 * by Eric Young (eay@cryptsoft.com). |
| 7 * The implementation was written so as to conform with Netscapes SSL. | 7 * The implementation was written so as to conform with Netscapes SSL. |
| 8 * | 8 * |
| 9 * This library is free for commercial and non-commercial use as long as | 9 * This library is free for commercial and non-commercial use as long as |
| 10 * the following conditions are aheared to. The following conditions | 10 * the following conditions are aheared to. The following conditions |
| (...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 70 | 70 |
| 71 TXT_DB *TXT_DB_read(BIO *in, int num) | 71 TXT_DB *TXT_DB_read(BIO *in, int num) |
| 72 { | 72 { |
| 73 TXT_DB *ret=NULL; | 73 TXT_DB *ret=NULL; |
| 74 int er=1; | 74 int er=1; |
| 75 int esc=0; | 75 int esc=0; |
| 76 long ln=0; | 76 long ln=0; |
| 77 int i,add,n; | 77 int i,add,n; |
| 78 int size=BUFSIZE; | 78 int size=BUFSIZE; |
| 79 int offset=0; | 79 int offset=0; |
| 80 » char *p,**pp,*f; | 80 » char *p,*f; |
| 81 » OPENSSL_STRING *pp; |
| 81 BUF_MEM *buf=NULL; | 82 BUF_MEM *buf=NULL; |
| 82 | 83 |
| 83 if ((buf=BUF_MEM_new()) == NULL) goto err; | 84 if ((buf=BUF_MEM_new()) == NULL) goto err; |
| 84 if (!BUF_MEM_grow(buf,size)) goto err; | 85 if (!BUF_MEM_grow(buf,size)) goto err; |
| 85 | 86 |
| 86 » if ((ret=(TXT_DB *)OPENSSL_malloc(sizeof(TXT_DB))) == NULL) | 87 » if ((ret=OPENSSL_malloc(sizeof(TXT_DB))) == NULL) |
| 87 goto err; | 88 goto err; |
| 88 ret->num_fields=num; | 89 ret->num_fields=num; |
| 89 ret->index=NULL; | 90 ret->index=NULL; |
| 90 ret->qual=NULL; | 91 ret->qual=NULL; |
| 91 » if ((ret->data=sk_new_null()) == NULL) | 92 » if ((ret->data=sk_OPENSSL_PSTRING_new_null()) == NULL) |
| 92 goto err; | 93 goto err; |
| 93 » if ((ret->index=(LHASH **)OPENSSL_malloc(sizeof(LHASH *)*num)) == NULL) | 94 » if ((ret->index=OPENSSL_malloc(sizeof(*ret->index)*num)) == NULL) |
| 94 goto err; | 95 goto err; |
| 95 » if ((ret->qual=(int (**)(char **))OPENSSL_malloc(sizeof(int (**)(char **
))*num)) == NULL) | 96 » if ((ret->qual=OPENSSL_malloc(sizeof(*(ret->qual))*num)) == NULL) |
| 96 goto err; | 97 goto err; |
| 97 for (i=0; i<num; i++) | 98 for (i=0; i<num; i++) |
| 98 { | 99 { |
| 99 ret->index[i]=NULL; | 100 ret->index[i]=NULL; |
| 100 ret->qual[i]=NULL; | 101 ret->qual[i]=NULL; |
| 101 } | 102 } |
| 102 | 103 |
| 103 add=(num+1)*sizeof(char *); | 104 add=(num+1)*sizeof(char *); |
| 104 buf->data[size-1]='\0'; | 105 buf->data[size-1]='\0'; |
| 105 offset=0; | 106 offset=0; |
| 106 for (;;) | 107 for (;;) |
| 107 { | 108 { |
| 108 if (offset != 0) | 109 if (offset != 0) |
| 109 { | 110 { |
| 110 size+=BUFSIZE; | 111 size+=BUFSIZE; |
| 111 if (!BUF_MEM_grow_clean(buf,size)) goto err; | 112 if (!BUF_MEM_grow_clean(buf,size)) goto err; |
| 112 } | 113 } |
| 113 buf->data[offset]='\0'; | 114 buf->data[offset]='\0'; |
| 114 BIO_gets(in,&(buf->data[offset]),size-offset); | 115 BIO_gets(in,&(buf->data[offset]),size-offset); |
| 115 ln++; | 116 ln++; |
| 116 if (buf->data[offset] == '\0') break; | 117 if (buf->data[offset] == '\0') break; |
| 117 if ((offset == 0) && (buf->data[0] == '#')) continue; | 118 if ((offset == 0) && (buf->data[0] == '#')) continue; |
| 118 i=strlen(&(buf->data[offset])); | 119 i=strlen(&(buf->data[offset])); |
| 119 offset+=i; | 120 offset+=i; |
| 120 if (buf->data[offset-1] != '\n') | 121 if (buf->data[offset-1] != '\n') |
| 121 continue; | 122 continue; |
| 122 else | 123 else |
| 123 { | 124 { |
| 124 buf->data[offset-1]='\0'; /* blat the '\n' */ | 125 buf->data[offset-1]='\0'; /* blat the '\n' */ |
| 125 » » » if (!(p=(char *)OPENSSL_malloc(add+offset))) goto err; | 126 » » » if (!(p=OPENSSL_malloc(add+offset))) goto err; |
| 126 offset=0; | 127 offset=0; |
| 127 } | 128 } |
| 128 pp=(char **)p; | 129 pp=(char **)p; |
| 129 p+=add; | 130 p+=add; |
| 130 n=0; | 131 n=0; |
| 131 pp[n++]=p; | 132 pp[n++]=p; |
| 132 i=0; | 133 i=0; |
| 133 f=buf->data; | 134 f=buf->data; |
| 134 | 135 |
| 135 esc=0; | 136 esc=0; |
| (...skipping 12 matching lines...) Expand all Loading... |
| 148 pp[n++]=p; | 149 pp[n++]=p; |
| 149 continue; | 150 continue; |
| 150 } | 151 } |
| 151 } | 152 } |
| 152 esc=(*f == '\\'); | 153 esc=(*f == '\\'); |
| 153 *(p++)= *(f++); | 154 *(p++)= *(f++); |
| 154 } | 155 } |
| 155 *(p++)='\0'; | 156 *(p++)='\0'; |
| 156 if ((n != num) || (*f != '\0')) | 157 if ((n != num) || (*f != '\0')) |
| 157 { | 158 { |
| 158 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)» /* temporaty fix
:-( */ | 159 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)» /* temporary fix
:-( */ |
| 159 fprintf(stderr,"wrong number of fields on line %ld (look
ing for field %d, got %d, '%s' left)\n",ln,num,n,f); | 160 fprintf(stderr,"wrong number of fields on line %ld (look
ing for field %d, got %d, '%s' left)\n",ln,num,n,f); |
| 160 #endif | 161 #endif |
| 161 er=2; | 162 er=2; |
| 162 goto err; | 163 goto err; |
| 163 } | 164 } |
| 164 pp[n]=p; | 165 pp[n]=p; |
| 165 » » if (!sk_push(ret->data,(char *)pp)) | 166 » » if (!sk_OPENSSL_PSTRING_push(ret->data,pp)) |
| 166 { | 167 { |
| 167 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)» /* temporaty fix
:-( */ | 168 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)» /* temporary fix
:-( */ |
| 168 fprintf(stderr,"failure in sk_push\n"); | 169 fprintf(stderr,"failure in sk_push\n"); |
| 169 #endif | 170 #endif |
| 170 er=2; | 171 er=2; |
| 171 goto err; | 172 goto err; |
| 172 } | 173 } |
| 173 } | 174 } |
| 174 er=0; | 175 er=0; |
| 175 err: | 176 err: |
| 176 BUF_MEM_free(buf); | 177 BUF_MEM_free(buf); |
| 177 if (er) | 178 if (er) |
| 178 { | 179 { |
| 179 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) | 180 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16) |
| 180 if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n"); | 181 if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n"); |
| 181 #endif | 182 #endif |
| 182 if (ret != NULL) | 183 if (ret != NULL) |
| 183 { | 184 { |
| 184 » » » if (ret->data != NULL) sk_free(ret->data); | 185 » » » if (ret->data != NULL) sk_OPENSSL_PSTRING_free(ret->data
); |
| 185 if (ret->index != NULL) OPENSSL_free(ret->index); | 186 if (ret->index != NULL) OPENSSL_free(ret->index); |
| 186 if (ret->qual != NULL) OPENSSL_free(ret->qual); | 187 if (ret->qual != NULL) OPENSSL_free(ret->qual); |
| 187 if (ret != NULL) OPENSSL_free(ret); | 188 if (ret != NULL) OPENSSL_free(ret); |
| 188 } | 189 } |
| 189 return(NULL); | 190 return(NULL); |
| 190 } | 191 } |
| 191 else | 192 else |
| 192 return(ret); | 193 return(ret); |
| 193 } | 194 } |
| 194 | 195 |
| 195 char **TXT_DB_get_by_index(TXT_DB *db, int idx, char **value) | 196 OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value) |
| 196 { | 197 { |
| 197 » char **ret; | 198 » OPENSSL_STRING *ret; |
| 198 » LHASH *lh; | 199 » LHASH_OF(OPENSSL_STRING) *lh; |
| 199 | 200 |
| 200 if (idx >= db->num_fields) | 201 if (idx >= db->num_fields) |
| 201 { | 202 { |
| 202 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; | 203 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; |
| 203 return(NULL); | 204 return(NULL); |
| 204 } | 205 } |
| 205 lh=db->index[idx]; | 206 lh=db->index[idx]; |
| 206 if (lh == NULL) | 207 if (lh == NULL) |
| 207 { | 208 { |
| 208 db->error=DB_ERROR_NO_INDEX; | 209 db->error=DB_ERROR_NO_INDEX; |
| 209 return(NULL); | 210 return(NULL); |
| 210 } | 211 } |
| 211 » ret=(char **)lh_retrieve(lh,value); | 212 » ret=lh_OPENSSL_STRING_retrieve(lh,value); |
| 212 db->error=DB_ERROR_OK; | 213 db->error=DB_ERROR_OK; |
| 213 return(ret); | 214 return(ret); |
| 214 } | 215 } |
| 215 | 216 |
| 216 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(char **), | 217 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(OPENSSL_STRING *), |
| 217 » » LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp) | 218 » » » LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp) |
| 218 { | 219 { |
| 219 » LHASH *idx; | 220 » LHASH_OF(OPENSSL_STRING) *idx; |
| 220 » char **r; | 221 » OPENSSL_STRING *r; |
| 221 int i,n; | 222 int i,n; |
| 222 | 223 |
| 223 if (field >= db->num_fields) | 224 if (field >= db->num_fields) |
| 224 { | 225 { |
| 225 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; | 226 db->error=DB_ERROR_INDEX_OUT_OF_RANGE; |
| 226 return(0); | 227 return(0); |
| 227 } | 228 } |
| 228 » if ((idx=lh_new(hash,cmp)) == NULL) | 229 » /* FIXME: we lose type checking at this point */ |
| 230 » if ((idx=(LHASH_OF(OPENSSL_STRING) *)lh_new(hash,cmp)) == NULL) |
| 229 { | 231 { |
| 230 db->error=DB_ERROR_MALLOC; | 232 db->error=DB_ERROR_MALLOC; |
| 231 return(0); | 233 return(0); |
| 232 } | 234 } |
| 233 » n=sk_num(db->data); | 235 » n=sk_OPENSSL_PSTRING_num(db->data); |
| 234 for (i=0; i<n; i++) | 236 for (i=0; i<n; i++) |
| 235 { | 237 { |
| 236 » » r=(char **)sk_value(db->data,i); | 238 » » r=sk_OPENSSL_PSTRING_value(db->data,i); |
| 237 if ((qual != NULL) && (qual(r) == 0)) continue; | 239 if ((qual != NULL) && (qual(r) == 0)) continue; |
| 238 » » if ((r=lh_insert(idx,r)) != NULL) | 240 » » if ((r=lh_OPENSSL_STRING_insert(idx,r)) != NULL) |
| 239 { | 241 { |
| 240 db->error=DB_ERROR_INDEX_CLASH; | 242 db->error=DB_ERROR_INDEX_CLASH; |
| 241 » » » db->arg1=sk_find(db->data,(char *)r); | 243 » » » db->arg1=sk_OPENSSL_PSTRING_find(db->data,r); |
| 242 db->arg2=i; | 244 db->arg2=i; |
| 243 » » » lh_free(idx); | 245 » » » lh_OPENSSL_STRING_free(idx); |
| 244 return(0); | 246 return(0); |
| 245 } | 247 } |
| 246 } | 248 } |
| 247 » if (db->index[field] != NULL) lh_free(db->index[field]); | 249 » if (db->index[field] != NULL) lh_OPENSSL_STRING_free(db->index[field]); |
| 248 db->index[field]=idx; | 250 db->index[field]=idx; |
| 249 db->qual[field]=qual; | 251 db->qual[field]=qual; |
| 250 return(1); | 252 return(1); |
| 251 } | 253 } |
| 252 | 254 |
| 253 long TXT_DB_write(BIO *out, TXT_DB *db) | 255 long TXT_DB_write(BIO *out, TXT_DB *db) |
| 254 { | 256 { |
| 255 long i,j,n,nn,l,tot=0; | 257 long i,j,n,nn,l,tot=0; |
| 256 char *p,**pp,*f; | 258 char *p,**pp,*f; |
| 257 BUF_MEM *buf=NULL; | 259 BUF_MEM *buf=NULL; |
| 258 long ret= -1; | 260 long ret= -1; |
| 259 | 261 |
| 260 if ((buf=BUF_MEM_new()) == NULL) | 262 if ((buf=BUF_MEM_new()) == NULL) |
| 261 goto err; | 263 goto err; |
| 262 » n=sk_num(db->data); | 264 » n=sk_OPENSSL_PSTRING_num(db->data); |
| 263 nn=db->num_fields; | 265 nn=db->num_fields; |
| 264 for (i=0; i<n; i++) | 266 for (i=0; i<n; i++) |
| 265 { | 267 { |
| 266 » » pp=(char **)sk_value(db->data,i); | 268 » » pp=sk_OPENSSL_PSTRING_value(db->data,i); |
| 267 | 269 |
| 268 l=0; | 270 l=0; |
| 269 for (j=0; j<nn; j++) | 271 for (j=0; j<nn; j++) |
| 270 { | 272 { |
| 271 if (pp[j] != NULL) | 273 if (pp[j] != NULL) |
| 272 l+=strlen(pp[j]); | 274 l+=strlen(pp[j]); |
| 273 } | 275 } |
| 274 if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err; | 276 if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err; |
| 275 | 277 |
| 276 p=buf->data; | 278 p=buf->data; |
| (...skipping 14 matching lines...) Expand all Loading... |
| 291 if (BIO_write(out,buf->data,(int)j) != j) | 293 if (BIO_write(out,buf->data,(int)j) != j) |
| 292 goto err; | 294 goto err; |
| 293 tot+=j; | 295 tot+=j; |
| 294 } | 296 } |
| 295 ret=tot; | 297 ret=tot; |
| 296 err: | 298 err: |
| 297 if (buf != NULL) BUF_MEM_free(buf); | 299 if (buf != NULL) BUF_MEM_free(buf); |
| 298 return(ret); | 300 return(ret); |
| 299 } | 301 } |
| 300 | 302 |
| 301 int TXT_DB_insert(TXT_DB *db, char **row) | 303 int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row) |
| 302 { | 304 { |
| 303 int i; | 305 int i; |
| 304 » char **r; | 306 » OPENSSL_STRING *r; |
| 305 | 307 |
| 306 for (i=0; i<db->num_fields; i++) | 308 for (i=0; i<db->num_fields; i++) |
| 307 { | 309 { |
| 308 if (db->index[i] != NULL) | 310 if (db->index[i] != NULL) |
| 309 { | 311 { |
| 310 if ((db->qual[i] != NULL) && | 312 if ((db->qual[i] != NULL) && |
| 311 (db->qual[i](row) == 0)) continue; | 313 (db->qual[i](row) == 0)) continue; |
| 312 » » » r=(char **)lh_retrieve(db->index[i],row); | 314 » » » r=lh_OPENSSL_STRING_retrieve(db->index[i],row); |
| 313 if (r != NULL) | 315 if (r != NULL) |
| 314 { | 316 { |
| 315 db->error=DB_ERROR_INDEX_CLASH; | 317 db->error=DB_ERROR_INDEX_CLASH; |
| 316 db->arg1=i; | 318 db->arg1=i; |
| 317 db->arg_row=r; | 319 db->arg_row=r; |
| 318 goto err; | 320 goto err; |
| 319 } | 321 } |
| 320 } | 322 } |
| 321 } | 323 } |
| 322 /* We have passed the index checks, now just append and insert */ | 324 /* We have passed the index checks, now just append and insert */ |
| 323 » if (!sk_push(db->data,(char *)row)) | 325 » if (!sk_OPENSSL_PSTRING_push(db->data,row)) |
| 324 { | 326 { |
| 325 db->error=DB_ERROR_MALLOC; | 327 db->error=DB_ERROR_MALLOC; |
| 326 goto err; | 328 goto err; |
| 327 } | 329 } |
| 328 | 330 |
| 329 for (i=0; i<db->num_fields; i++) | 331 for (i=0; i<db->num_fields; i++) |
| 330 { | 332 { |
| 331 if (db->index[i] != NULL) | 333 if (db->index[i] != NULL) |
| 332 { | 334 { |
| 333 if ((db->qual[i] != NULL) && | 335 if ((db->qual[i] != NULL) && |
| 334 (db->qual[i](row) == 0)) continue; | 336 (db->qual[i](row) == 0)) continue; |
| 335 » » » lh_insert(db->index[i],row); | 337 » » » (void)lh_OPENSSL_STRING_insert(db->index[i],row); |
| 336 } | 338 } |
| 337 } | 339 } |
| 338 return(1); | 340 return(1); |
| 339 err: | 341 err: |
| 340 return(0); | 342 return(0); |
| 341 } | 343 } |
| 342 | 344 |
| 343 void TXT_DB_free(TXT_DB *db) | 345 void TXT_DB_free(TXT_DB *db) |
| 344 { | 346 { |
| 345 int i,n; | 347 int i,n; |
| 346 char **p,*max; | 348 char **p,*max; |
| 347 | 349 |
| 348 if(db == NULL) | 350 if(db == NULL) |
| 349 return; | 351 return; |
| 350 | 352 |
| 351 if (db->index != NULL) | 353 if (db->index != NULL) |
| 352 { | 354 { |
| 353 for (i=db->num_fields-1; i>=0; i--) | 355 for (i=db->num_fields-1; i>=0; i--) |
| 354 » » » if (db->index[i] != NULL) lh_free(db->index[i]); | 356 » » » if (db->index[i] != NULL) lh_OPENSSL_STRING_free(db->ind
ex[i]); |
| 355 OPENSSL_free(db->index); | 357 OPENSSL_free(db->index); |
| 356 } | 358 } |
| 357 if (db->qual != NULL) | 359 if (db->qual != NULL) |
| 358 OPENSSL_free(db->qual); | 360 OPENSSL_free(db->qual); |
| 359 if (db->data != NULL) | 361 if (db->data != NULL) |
| 360 { | 362 { |
| 361 » » for (i=sk_num(db->data)-1; i>=0; i--) | 363 » » for (i=sk_OPENSSL_PSTRING_num(db->data)-1; i>=0; i--) |
| 362 { | 364 { |
| 363 /* check if any 'fields' have been allocated | 365 /* check if any 'fields' have been allocated |
| 364 * from outside of the initial block */ | 366 * from outside of the initial block */ |
| 365 » » » p=(char **)sk_value(db->data,i); | 367 » » » p=sk_OPENSSL_PSTRING_value(db->data,i); |
| 366 max=p[db->num_fields]; /* last address */ | 368 max=p[db->num_fields]; /* last address */ |
| 367 if (max == NULL) /* new row */ | 369 if (max == NULL) /* new row */ |
| 368 { | 370 { |
| 369 for (n=0; n<db->num_fields; n++) | 371 for (n=0; n<db->num_fields; n++) |
| 370 if (p[n] != NULL) OPENSSL_free(p[n]); | 372 if (p[n] != NULL) OPENSSL_free(p[n]); |
| 371 } | 373 } |
| 372 else | 374 else |
| 373 { | 375 { |
| 374 for (n=0; n<db->num_fields; n++) | 376 for (n=0; n<db->num_fields; n++) |
| 375 { | 377 { |
| 376 if (((p[n] < (char *)p) || (p[n] > max)) | 378 if (((p[n] < (char *)p) || (p[n] > max)) |
| 377 && (p[n] != NULL)) | 379 && (p[n] != NULL)) |
| 378 OPENSSL_free(p[n]); | 380 OPENSSL_free(p[n]); |
| 379 } | 381 } |
| 380 } | 382 } |
| 381 » » » OPENSSL_free(sk_value(db->data,i)); | 383 » » » OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data,i)); |
| 382 } | 384 } |
| 383 » » sk_free(db->data); | 385 » » sk_OPENSSL_PSTRING_free(db->data); |
| 384 } | 386 } |
| 385 OPENSSL_free(db); | 387 OPENSSL_free(db); |
| 386 } | 388 } |
| OLD | NEW |