Set authkey to NULL and check malloc return value.
[openssl.git] / crypto / txt_db / txt_db.c
1 /* crypto/txt_db/txt_db.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "cryptlib.h"
63 #include <openssl/buffer.h>
64 #include <openssl/txt_db.h>
65
66 #undef BUFSIZE
67 #define BUFSIZE 512
68
69 const char TXT_DB_version[]="TXT_DB" OPENSSL_VERSION_PTEXT;
70
71 TXT_DB *TXT_DB_read(BIO *in, int num)
72         {
73         TXT_DB *ret=NULL;
74         int er=1;
75         int esc=0;
76         long ln=0;
77         int i,add,n;
78         int size=BUFSIZE;
79         int offset=0;
80         char *p,*f;
81         OPENSSL_STRING *pp;
82         BUF_MEM *buf=NULL;
83
84         if ((buf=BUF_MEM_new()) == NULL) goto err;
85         if (!BUF_MEM_grow(buf,size)) goto err;
86
87         if ((ret=OPENSSL_malloc(sizeof(TXT_DB))) == NULL)
88                 goto err;
89         ret->num_fields=num;
90         ret->index=NULL;
91         ret->qual=NULL;
92         if ((ret->data=sk_OPENSSL_PSTRING_new_null()) == NULL)
93                 goto err;
94         if ((ret->index=OPENSSL_malloc(sizeof(*ret->index)*num)) == NULL)
95                 goto err;
96         if ((ret->qual=OPENSSL_malloc(sizeof(*(ret->qual))*num)) == NULL)
97                 goto err;
98         for (i=0; i<num; i++)
99                 {
100                 ret->index[i]=NULL;
101                 ret->qual[i]=NULL;
102                 }
103
104         add=(num+1)*sizeof(char *);
105         buf->data[size-1]='\0';
106         offset=0;
107         for (;;)
108                 {
109                 if (offset != 0)
110                         {
111                         size+=BUFSIZE;
112                         if (!BUF_MEM_grow_clean(buf,size)) goto err;
113                         }
114                 buf->data[offset]='\0';
115                 BIO_gets(in,&(buf->data[offset]),size-offset);
116                 ln++;
117                 if (buf->data[offset] == '\0') break;
118                 if ((offset == 0) && (buf->data[0] == '#')) continue;
119                 i=strlen(&(buf->data[offset]));
120                 offset+=i;
121                 if (buf->data[offset-1] != '\n')
122                         continue;
123                 else
124                         {
125                         buf->data[offset-1]='\0'; /* blat the '\n' */
126                         if (!(p=OPENSSL_malloc(add+offset))) goto err;
127                         offset=0;
128                         }
129                 pp=(char **)p;
130                 p+=add;
131                 n=0;
132                 pp[n++]=p;
133                 i=0;
134                 f=buf->data;
135
136                 esc=0;
137                 for (;;)
138                         {
139                         if (*f == '\0') break;
140                         if (*f == '\t')
141                                 {
142                                 if (esc)
143                                         p--;
144                                 else
145                                         {       
146                                         *(p++)='\0';
147                                         f++;
148                                         if (n >=  num) break;
149                                         pp[n++]=p;
150                                         continue;
151                                         }
152                                 }
153                         esc=(*f == '\\');
154                         *(p++)= *(f++);
155                         }
156                 *(p++)='\0';
157                 if ((n != num) || (*f != '\0'))
158                         {
159 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)   /* temporary fix :-( */
160                         fprintf(stderr,"wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)\n",ln,num,n,f);
161 #endif
162                         er=2;
163                         goto err;
164                         }
165                 pp[n]=p;
166                 if (!sk_OPENSSL_PSTRING_push(ret->data,pp))
167                         {
168 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)   /* temporary fix :-( */
169                         fprintf(stderr,"failure in sk_push\n");
170 #endif
171                         er=2;
172                         goto err;
173                         }
174                 }
175         er=0;
176 err:
177         BUF_MEM_free(buf);
178         if (er)
179                 {
180 #if !defined(OPENSSL_NO_STDIO) && !defined(OPENSSL_SYS_WIN16)
181                 if (er == 1) fprintf(stderr,"OPENSSL_malloc failure\n");
182 #endif
183                 if (ret != NULL)
184                         {
185                         if (ret->data != NULL) sk_OPENSSL_PSTRING_free(ret->data);
186                         if (ret->index != NULL) OPENSSL_free(ret->index);
187                         if (ret->qual != NULL) OPENSSL_free(ret->qual);
188                         if (ret != NULL) OPENSSL_free(ret);
189                         }
190                 return(NULL);
191                 }
192         else
193                 return(ret);
194         }
195
196 OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value)
197         {
198         OPENSSL_STRING *ret;
199         LHASH_OF(OPENSSL_STRING) *lh;
200
201         if (idx >= db->num_fields)
202                 {
203                 db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
204                 return(NULL);
205                 }
206         lh=db->index[idx];
207         if (lh == NULL)
208                 {
209                 db->error=DB_ERROR_NO_INDEX;
210                 return(NULL);
211                 }
212         ret=lh_OPENSSL_STRING_retrieve(lh,value);
213         db->error=DB_ERROR_OK;
214         return(ret);
215         }
216
217 int TXT_DB_create_index(TXT_DB *db, int field, int (*qual)(OPENSSL_STRING *),
218                         LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp)
219         {
220         LHASH_OF(OPENSSL_STRING) *idx;
221         OPENSSL_STRING *r;
222         int i,n;
223
224         if (field >= db->num_fields)
225                 {
226                 db->error=DB_ERROR_INDEX_OUT_OF_RANGE;
227                 return(0);
228                 }
229         /* FIXME: we lose type checking at this point */
230         if ((idx=(LHASH_OF(OPENSSL_STRING) *)lh_new(hash,cmp)) == NULL)
231                 {
232                 db->error=DB_ERROR_MALLOC;
233                 return(0);
234                 }
235         n=sk_OPENSSL_PSTRING_num(db->data);
236         for (i=0; i<n; i++)
237                 {
238                 r=sk_OPENSSL_PSTRING_value(db->data,i);
239                 if ((qual != NULL) && (qual(r) == 0)) continue;
240                 if ((r=lh_OPENSSL_STRING_insert(idx,r)) != NULL)
241                         {
242                         db->error=DB_ERROR_INDEX_CLASH;
243                         db->arg1=sk_OPENSSL_PSTRING_find(db->data,r);
244                         db->arg2=i;
245                         lh_OPENSSL_STRING_free(idx);
246                         return(0);
247                         }
248                 }
249         if (db->index[field] != NULL) lh_OPENSSL_STRING_free(db->index[field]);
250         db->index[field]=idx;
251         db->qual[field]=qual;
252         return(1);
253         }
254
255 long TXT_DB_write(BIO *out, TXT_DB *db)
256         {
257         long i,j,n,nn,l,tot=0;
258         char *p,**pp,*f;
259         BUF_MEM *buf=NULL;
260         long ret= -1;
261
262         if ((buf=BUF_MEM_new()) == NULL)
263                 goto err;
264         n=sk_OPENSSL_PSTRING_num(db->data);
265         nn=db->num_fields;
266         for (i=0; i<n; i++)
267                 {
268                 pp=sk_OPENSSL_PSTRING_value(db->data,i);
269
270                 l=0;
271                 for (j=0; j<nn; j++)
272                         {
273                         if (pp[j] != NULL)
274                                 l+=strlen(pp[j]);
275                         }
276                 if (!BUF_MEM_grow_clean(buf,(int)(l*2+nn))) goto err;
277
278                 p=buf->data;
279                 for (j=0; j<nn; j++)
280                         {
281                         f=pp[j];
282                         if (f != NULL)
283                                 for (;;) 
284                                         {
285                                         if (*f == '\0') break;
286                                         if (*f == '\t') *(p++)='\\';
287                                         *(p++)= *(f++);
288                                         }
289                         *(p++)='\t';
290                         }
291                 p[-1]='\n';
292                 j=p-buf->data;
293                 if (BIO_write(out,buf->data,(int)j) != j)
294                         goto err;
295                 tot+=j;
296                 }
297         ret=tot;
298 err:
299         if (buf != NULL) BUF_MEM_free(buf);
300         return(ret);
301         }
302
303 int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *row)
304         {
305         int i;
306         OPENSSL_STRING *r;
307
308         for (i=0; i<db->num_fields; i++)
309                 {
310                 if (db->index[i] != NULL)
311                         {
312                         if ((db->qual[i] != NULL) &&
313                                 (db->qual[i](row) == 0)) continue;
314                         r=lh_OPENSSL_STRING_retrieve(db->index[i],row);
315                         if (r != NULL)
316                                 {
317                                 db->error=DB_ERROR_INDEX_CLASH;
318                                 db->arg1=i;
319                                 db->arg_row=r;
320                                 goto err;
321                                 }
322                         }
323                 }
324         /* We have passed the index checks, now just append and insert */
325         if (!sk_OPENSSL_PSTRING_push(db->data,row))
326                 {
327                 db->error=DB_ERROR_MALLOC;
328                 goto err;
329                 }
330
331         for (i=0; i<db->num_fields; i++)
332                 {
333                 if (db->index[i] != NULL)
334                         {
335                         if ((db->qual[i] != NULL) &&
336                                 (db->qual[i](row) == 0)) continue;
337                         (void)lh_OPENSSL_STRING_insert(db->index[i],row);
338                         }
339                 }
340         return(1);
341 err:
342         return(0);
343         }
344
345 void TXT_DB_free(TXT_DB *db)
346         {
347         int i,n;
348         char **p,*max;
349
350         if(db == NULL)
351             return;
352
353         if (db->index != NULL)
354                 {
355                 for (i=db->num_fields-1; i>=0; i--)
356                         if (db->index[i] != NULL) lh_OPENSSL_STRING_free(db->index[i]);
357                 OPENSSL_free(db->index);
358                 }
359         if (db->qual != NULL)
360                 OPENSSL_free(db->qual);
361         if (db->data != NULL)
362                 {
363                 for (i=sk_OPENSSL_PSTRING_num(db->data)-1; i>=0; i--)
364                         {
365                         /* check if any 'fields' have been allocated
366                          * from outside of the initial block */
367                         p=sk_OPENSSL_PSTRING_value(db->data,i);
368                         max=p[db->num_fields]; /* last address */
369                         if (max == NULL) /* new row */
370                                 {
371                                 for (n=0; n<db->num_fields; n++)
372                                         if (p[n] != NULL) OPENSSL_free(p[n]);
373                                 }
374                         else
375                                 {
376                                 for (n=0; n<db->num_fields; n++)
377                                         {
378                                         if (((p[n] < (char *)p) || (p[n] > max))
379                                                 && (p[n] != NULL))
380                                                 OPENSSL_free(p[n]);
381                                         }
382                                 }
383                         OPENSSL_free(sk_OPENSSL_PSTRING_value(db->data,i));
384                         }
385                 sk_OPENSSL_PSTRING_free(db->data);
386                 }
387         OPENSSL_free(db);
388         }