VirtualBox

source: vbox/trunk/src/libs/openssl-1.1.1f/crypto/ui/ui_lib.c@ 83531

Last change on this file since 83531 was 83531, checked in by vboxsync, 5 years ago

setting svn:sync-process=export for openssl-1.1.1f, all files except tests

File size: 26.2 KB
Line 
1/*
2 * Copyright 2001-2019 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include <string.h>
11#include "internal/cryptlib.h"
12#include <openssl/e_os2.h>
13#include <openssl/buffer.h>
14#include <openssl/ui.h>
15#include <openssl/err.h>
16#include "ui_local.h"
17
18UI *UI_new(void)
19{
20 return UI_new_method(NULL);
21}
22
23UI *UI_new_method(const UI_METHOD *method)
24{
25 UI *ret = OPENSSL_zalloc(sizeof(*ret));
26
27 if (ret == NULL) {
28 UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
29 return NULL;
30 }
31
32 ret->lock = CRYPTO_THREAD_lock_new();
33 if (ret->lock == NULL) {
34 UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
35 OPENSSL_free(ret);
36 return NULL;
37 }
38
39 if (method == NULL)
40 method = UI_get_default_method();
41 if (method == NULL)
42 method = UI_null();
43 ret->meth = method;
44
45 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI, ret, &ret->ex_data)) {
46 OPENSSL_free(ret);
47 return NULL;
48 }
49 return ret;
50}
51
52static void free_string(UI_STRING *uis)
53{
54 if (uis->flags & OUT_STRING_FREEABLE) {
55 OPENSSL_free((char *)uis->out_string);
56 switch (uis->type) {
57 case UIT_BOOLEAN:
58 OPENSSL_free((char *)uis->_.boolean_data.action_desc);
59 OPENSSL_free((char *)uis->_.boolean_data.ok_chars);
60 OPENSSL_free((char *)uis->_.boolean_data.cancel_chars);
61 break;
62 case UIT_NONE:
63 case UIT_PROMPT:
64 case UIT_VERIFY:
65 case UIT_ERROR:
66 case UIT_INFO:
67 break;
68 }
69 }
70 OPENSSL_free(uis);
71}
72
73void UI_free(UI *ui)
74{
75 if (ui == NULL)
76 return;
77 if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
78 ui->meth->ui_destroy_data(ui, ui->user_data);
79 }
80 sk_UI_STRING_pop_free(ui->strings, free_string);
81 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI, ui, &ui->ex_data);
82 CRYPTO_THREAD_lock_free(ui->lock);
83 OPENSSL_free(ui);
84}
85
86static int allocate_string_stack(UI *ui)
87{
88 if (ui->strings == NULL) {
89 ui->strings = sk_UI_STRING_new_null();
90 if (ui->strings == NULL) {
91 return -1;
92 }
93 }
94 return 0;
95}
96
97static UI_STRING *general_allocate_prompt(UI *ui, const char *prompt,
98 int prompt_freeable,
99 enum UI_string_types type,
100 int input_flags, char *result_buf)
101{
102 UI_STRING *ret = NULL;
103
104 if (prompt == NULL) {
105 UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, ERR_R_PASSED_NULL_PARAMETER);
106 } else if ((type == UIT_PROMPT || type == UIT_VERIFY
107 || type == UIT_BOOLEAN) && result_buf == NULL) {
108 UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, UI_R_NO_RESULT_BUFFER);
109 } else if ((ret = OPENSSL_malloc(sizeof(*ret))) != NULL) {
110 ret->out_string = prompt;
111 ret->flags = prompt_freeable ? OUT_STRING_FREEABLE : 0;
112 ret->input_flags = input_flags;
113 ret->type = type;
114 ret->result_buf = result_buf;
115 }
116 return ret;
117}
118
119static int general_allocate_string(UI *ui, const char *prompt,
120 int prompt_freeable,
121 enum UI_string_types type, int input_flags,
122 char *result_buf, int minsize, int maxsize,
123 const char *test_buf)
124{
125 int ret = -1;
126 UI_STRING *s = general_allocate_prompt(ui, prompt, prompt_freeable,
127 type, input_flags, result_buf);
128
129 if (s != NULL) {
130 if (allocate_string_stack(ui) >= 0) {
131 s->_.string_data.result_minsize = minsize;
132 s->_.string_data.result_maxsize = maxsize;
133 s->_.string_data.test_buf = test_buf;
134 ret = sk_UI_STRING_push(ui->strings, s);
135 /* sk_push() returns 0 on error. Let's adapt that */
136 if (ret <= 0) {
137 ret--;
138 free_string(s);
139 }
140 } else
141 free_string(s);
142 }
143 return ret;
144}
145
146static int general_allocate_boolean(UI *ui,
147 const char *prompt,
148 const char *action_desc,
149 const char *ok_chars,
150 const char *cancel_chars,
151 int prompt_freeable,
152 enum UI_string_types type,
153 int input_flags, char *result_buf)
154{
155 int ret = -1;
156 UI_STRING *s;
157 const char *p;
158
159 if (ok_chars == NULL) {
160 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
161 } else if (cancel_chars == NULL) {
162 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
163 } else {
164 for (p = ok_chars; *p != '\0'; p++) {
165 if (strchr(cancel_chars, *p) != NULL) {
166 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN,
167 UI_R_COMMON_OK_AND_CANCEL_CHARACTERS);
168 }
169 }
170
171 s = general_allocate_prompt(ui, prompt, prompt_freeable,
172 type, input_flags, result_buf);
173
174 if (s != NULL) {
175 if (allocate_string_stack(ui) >= 0) {
176 s->_.boolean_data.action_desc = action_desc;
177 s->_.boolean_data.ok_chars = ok_chars;
178 s->_.boolean_data.cancel_chars = cancel_chars;
179 ret = sk_UI_STRING_push(ui->strings, s);
180 /*
181 * sk_push() returns 0 on error. Let's adapt that
182 */
183 if (ret <= 0) {
184 ret--;
185 free_string(s);
186 }
187 } else
188 free_string(s);
189 }
190 }
191 return ret;
192}
193
194/*
195 * Returns the index to the place in the stack or -1 for error. Uses a
196 * direct reference to the prompt.
197 */
198int UI_add_input_string(UI *ui, const char *prompt, int flags,
199 char *result_buf, int minsize, int maxsize)
200{
201 return general_allocate_string(ui, prompt, 0,
202 UIT_PROMPT, flags, result_buf, minsize,
203 maxsize, NULL);
204}
205
206/* Same as UI_add_input_string(), excepts it takes a copy of the prompt */
207int UI_dup_input_string(UI *ui, const char *prompt, int flags,
208 char *result_buf, int minsize, int maxsize)
209{
210 char *prompt_copy = NULL;
211
212 if (prompt != NULL) {
213 prompt_copy = OPENSSL_strdup(prompt);
214 if (prompt_copy == NULL) {
215 UIerr(UI_F_UI_DUP_INPUT_STRING, ERR_R_MALLOC_FAILURE);
216 return 0;
217 }
218 }
219
220 return general_allocate_string(ui, prompt_copy, 1,
221 UIT_PROMPT, flags, result_buf, minsize,
222 maxsize, NULL);
223}
224
225int UI_add_verify_string(UI *ui, const char *prompt, int flags,
226 char *result_buf, int minsize, int maxsize,
227 const char *test_buf)
228{
229 return general_allocate_string(ui, prompt, 0,
230 UIT_VERIFY, flags, result_buf, minsize,
231 maxsize, test_buf);
232}
233
234int UI_dup_verify_string(UI *ui, const char *prompt, int flags,
235 char *result_buf, int minsize, int maxsize,
236 const char *test_buf)
237{
238 char *prompt_copy = NULL;
239
240 if (prompt != NULL) {
241 prompt_copy = OPENSSL_strdup(prompt);
242 if (prompt_copy == NULL) {
243 UIerr(UI_F_UI_DUP_VERIFY_STRING, ERR_R_MALLOC_FAILURE);
244 return -1;
245 }
246 }
247
248 return general_allocate_string(ui, prompt_copy, 1,
249 UIT_VERIFY, flags, result_buf, minsize,
250 maxsize, test_buf);
251}
252
253int UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc,
254 const char *ok_chars, const char *cancel_chars,
255 int flags, char *result_buf)
256{
257 return general_allocate_boolean(ui, prompt, action_desc,
258 ok_chars, cancel_chars, 0, UIT_BOOLEAN,
259 flags, result_buf);
260}
261
262int UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc,
263 const char *ok_chars, const char *cancel_chars,
264 int flags, char *result_buf)
265{
266 char *prompt_copy = NULL;
267 char *action_desc_copy = NULL;
268 char *ok_chars_copy = NULL;
269 char *cancel_chars_copy = NULL;
270
271 if (prompt != NULL) {
272 prompt_copy = OPENSSL_strdup(prompt);
273 if (prompt_copy == NULL) {
274 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
275 goto err;
276 }
277 }
278
279 if (action_desc != NULL) {
280 action_desc_copy = OPENSSL_strdup(action_desc);
281 if (action_desc_copy == NULL) {
282 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
283 goto err;
284 }
285 }
286
287 if (ok_chars != NULL) {
288 ok_chars_copy = OPENSSL_strdup(ok_chars);
289 if (ok_chars_copy == NULL) {
290 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
291 goto err;
292 }
293 }
294
295 if (cancel_chars != NULL) {
296 cancel_chars_copy = OPENSSL_strdup(cancel_chars);
297 if (cancel_chars_copy == NULL) {
298 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
299 goto err;
300 }
301 }
302
303 return general_allocate_boolean(ui, prompt_copy, action_desc_copy,
304 ok_chars_copy, cancel_chars_copy, 1,
305 UIT_BOOLEAN, flags, result_buf);
306 err:
307 OPENSSL_free(prompt_copy);
308 OPENSSL_free(action_desc_copy);
309 OPENSSL_free(ok_chars_copy);
310 OPENSSL_free(cancel_chars_copy);
311 return -1;
312}
313
314int UI_add_info_string(UI *ui, const char *text)
315{
316 return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0,
317 NULL);
318}
319
320int UI_dup_info_string(UI *ui, const char *text)
321{
322 char *text_copy = NULL;
323
324 if (text != NULL) {
325 text_copy = OPENSSL_strdup(text);
326 if (text_copy == NULL) {
327 UIerr(UI_F_UI_DUP_INFO_STRING, ERR_R_MALLOC_FAILURE);
328 return -1;
329 }
330 }
331
332 return general_allocate_string(ui, text_copy, 1, UIT_INFO, 0, NULL,
333 0, 0, NULL);
334}
335
336int UI_add_error_string(UI *ui, const char *text)
337{
338 return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0,
339 NULL);
340}
341
342int UI_dup_error_string(UI *ui, const char *text)
343{
344 char *text_copy = NULL;
345
346 if (text != NULL) {
347 text_copy = OPENSSL_strdup(text);
348 if (text_copy == NULL) {
349 UIerr(UI_F_UI_DUP_ERROR_STRING, ERR_R_MALLOC_FAILURE);
350 return -1;
351 }
352 }
353 return general_allocate_string(ui, text_copy, 1, UIT_ERROR, 0, NULL,
354 0, 0, NULL);
355}
356
357char *UI_construct_prompt(UI *ui, const char *object_desc,
358 const char *object_name)
359{
360 char *prompt = NULL;
361
362 if (ui->meth->ui_construct_prompt != NULL)
363 prompt = ui->meth->ui_construct_prompt(ui, object_desc, object_name);
364 else {
365 char prompt1[] = "Enter ";
366 char prompt2[] = " for ";
367 char prompt3[] = ":";
368 int len = 0;
369
370 if (object_desc == NULL)
371 return NULL;
372 len = sizeof(prompt1) - 1 + strlen(object_desc);
373 if (object_name != NULL)
374 len += sizeof(prompt2) - 1 + strlen(object_name);
375 len += sizeof(prompt3) - 1;
376
377 if ((prompt = OPENSSL_malloc(len + 1)) == NULL) {
378 UIerr(UI_F_UI_CONSTRUCT_PROMPT, ERR_R_MALLOC_FAILURE);
379 return NULL;
380 }
381 OPENSSL_strlcpy(prompt, prompt1, len + 1);
382 OPENSSL_strlcat(prompt, object_desc, len + 1);
383 if (object_name != NULL) {
384 OPENSSL_strlcat(prompt, prompt2, len + 1);
385 OPENSSL_strlcat(prompt, object_name, len + 1);
386 }
387 OPENSSL_strlcat(prompt, prompt3, len + 1);
388 }
389 return prompt;
390}
391
392void *UI_add_user_data(UI *ui, void *user_data)
393{
394 void *old_data = ui->user_data;
395
396 if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
397 ui->meth->ui_destroy_data(ui, old_data);
398 old_data = NULL;
399 }
400 ui->user_data = user_data;
401 ui->flags &= ~UI_FLAG_DUPL_DATA;
402 return old_data;
403}
404
405int UI_dup_user_data(UI *ui, void *user_data)
406{
407 void *duplicate = NULL;
408
409 if (ui->meth->ui_duplicate_data == NULL
410 || ui->meth->ui_destroy_data == NULL) {
411 UIerr(UI_F_UI_DUP_USER_DATA, UI_R_USER_DATA_DUPLICATION_UNSUPPORTED);
412 return -1;
413 }
414
415 duplicate = ui->meth->ui_duplicate_data(ui, user_data);
416 if (duplicate == NULL) {
417 UIerr(UI_F_UI_DUP_USER_DATA, ERR_R_MALLOC_FAILURE);
418 return -1;
419 }
420
421 (void)UI_add_user_data(ui, duplicate);
422 ui->flags |= UI_FLAG_DUPL_DATA;
423
424 return 0;
425}
426
427void *UI_get0_user_data(UI *ui)
428{
429 return ui->user_data;
430}
431
432const char *UI_get0_result(UI *ui, int i)
433{
434 if (i < 0) {
435 UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_SMALL);
436 return NULL;
437 }
438 if (i >= sk_UI_STRING_num(ui->strings)) {
439 UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_LARGE);
440 return NULL;
441 }
442 return UI_get0_result_string(sk_UI_STRING_value(ui->strings, i));
443}
444
445int UI_get_result_length(UI *ui, int i)
446{
447 if (i < 0) {
448 UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_SMALL);
449 return -1;
450 }
451 if (i >= sk_UI_STRING_num(ui->strings)) {
452 UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_LARGE);
453 return -1;
454 }
455 return UI_get_result_string_length(sk_UI_STRING_value(ui->strings, i));
456}
457
458static int print_error(const char *str, size_t len, UI *ui)
459{
460 UI_STRING uis;
461
462 memset(&uis, 0, sizeof(uis));
463 uis.type = UIT_ERROR;
464 uis.out_string = str;
465
466 if (ui->meth->ui_write_string != NULL
467 && ui->meth->ui_write_string(ui, &uis) <= 0)
468 return -1;
469 return 0;
470}
471
472int UI_process(UI *ui)
473{
474 int i, ok = 0;
475 const char *state = "processing";
476
477 if (ui->meth->ui_open_session != NULL
478 && ui->meth->ui_open_session(ui) <= 0) {
479 state = "opening session";
480 ok = -1;
481 goto err;
482 }
483
484 if (ui->flags & UI_FLAG_PRINT_ERRORS)
485 ERR_print_errors_cb((int (*)(const char *, size_t, void *))
486 print_error, (void *)ui);
487
488 for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
489 if (ui->meth->ui_write_string != NULL
490 && (ui->meth->ui_write_string(ui,
491 sk_UI_STRING_value(ui->strings, i))
492 <= 0))
493 {
494 state = "writing strings";
495 ok = -1;
496 goto err;
497 }
498 }
499
500 if (ui->meth->ui_flush != NULL)
501 switch (ui->meth->ui_flush(ui)) {
502 case -1: /* Interrupt/Cancel/something... */
503 ui->flags &= ~UI_FLAG_REDOABLE;
504 ok = -2;
505 goto err;
506 case 0: /* Errors */
507 state = "flushing";
508 ok = -1;
509 goto err;
510 default: /* Success */
511 ok = 0;
512 break;
513 }
514
515 for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
516 if (ui->meth->ui_read_string != NULL) {
517 switch (ui->meth->ui_read_string(ui,
518 sk_UI_STRING_value(ui->strings,
519 i))) {
520 case -1: /* Interrupt/Cancel/something... */
521 ui->flags &= ~UI_FLAG_REDOABLE;
522 ok = -2;
523 goto err;
524 case 0: /* Errors */
525 state = "reading strings";
526 ok = -1;
527 goto err;
528 default: /* Success */
529 ok = 0;
530 break;
531 }
532 }
533 }
534
535 state = NULL;
536 err:
537 if (ui->meth->ui_close_session != NULL
538 && ui->meth->ui_close_session(ui) <= 0) {
539 if (state == NULL)
540 state = "closing session";
541 ok = -1;
542 }
543
544 if (ok == -1) {
545 UIerr(UI_F_UI_PROCESS, UI_R_PROCESSING_ERROR);
546 ERR_add_error_data(2, "while ", state);
547 }
548 return ok;
549}
550
551int UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void))
552{
553 if (ui == NULL) {
554 UIerr(UI_F_UI_CTRL, ERR_R_PASSED_NULL_PARAMETER);
555 return -1;
556 }
557 switch (cmd) {
558 case UI_CTRL_PRINT_ERRORS:
559 {
560 int save_flag = ! !(ui->flags & UI_FLAG_PRINT_ERRORS);
561 if (i)
562 ui->flags |= UI_FLAG_PRINT_ERRORS;
563 else
564 ui->flags &= ~UI_FLAG_PRINT_ERRORS;
565 return save_flag;
566 }
567 case UI_CTRL_IS_REDOABLE:
568 return ! !(ui->flags & UI_FLAG_REDOABLE);
569 default:
570 break;
571 }
572 UIerr(UI_F_UI_CTRL, UI_R_UNKNOWN_CONTROL_COMMAND);
573 return -1;
574}
575
576int UI_set_ex_data(UI *r, int idx, void *arg)
577{
578 return CRYPTO_set_ex_data(&r->ex_data, idx, arg);
579}
580
581void *UI_get_ex_data(UI *r, int idx)
582{
583 return CRYPTO_get_ex_data(&r->ex_data, idx);
584}
585
586const UI_METHOD *UI_get_method(UI *ui)
587{
588 return ui->meth;
589}
590
591const UI_METHOD *UI_set_method(UI *ui, const UI_METHOD *meth)
592{
593 ui->meth = meth;
594 return ui->meth;
595}
596
597UI_METHOD *UI_create_method(const char *name)
598{
599 UI_METHOD *ui_method = NULL;
600
601 if ((ui_method = OPENSSL_zalloc(sizeof(*ui_method))) == NULL
602 || (ui_method->name = OPENSSL_strdup(name)) == NULL
603 || !CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
604 &ui_method->ex_data)) {
605 if (ui_method)
606 OPENSSL_free(ui_method->name);
607 OPENSSL_free(ui_method);
608 UIerr(UI_F_UI_CREATE_METHOD, ERR_R_MALLOC_FAILURE);
609 return NULL;
610 }
611 return ui_method;
612}
613
614/*
615 * BIG FSCKING WARNING!!!! If you use this on a statically allocated method
616 * (that is, it hasn't been allocated using UI_create_method(), you deserve
617 * anything Murphy can throw at you and more! You have been warned.
618 */
619void UI_destroy_method(UI_METHOD *ui_method)
620{
621 if (ui_method == NULL)
622 return;
623 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
624 &ui_method->ex_data);
625 OPENSSL_free(ui_method->name);
626 ui_method->name = NULL;
627 OPENSSL_free(ui_method);
628}
629
630int UI_method_set_opener(UI_METHOD *method, int (*opener) (UI *ui))
631{
632 if (method != NULL) {
633 method->ui_open_session = opener;
634 return 0;
635 }
636 return -1;
637}
638
639int UI_method_set_writer(UI_METHOD *method,
640 int (*writer) (UI *ui, UI_STRING *uis))
641{
642 if (method != NULL) {
643 method->ui_write_string = writer;
644 return 0;
645 }
646 return -1;
647}
648
649int UI_method_set_flusher(UI_METHOD *method, int (*flusher) (UI *ui))
650{
651 if (method != NULL) {
652 method->ui_flush = flusher;
653 return 0;
654 }
655 return -1;
656}
657
658int UI_method_set_reader(UI_METHOD *method,
659 int (*reader) (UI *ui, UI_STRING *uis))
660{
661 if (method != NULL) {
662 method->ui_read_string = reader;
663 return 0;
664 }
665 return -1;
666}
667
668int UI_method_set_closer(UI_METHOD *method, int (*closer) (UI *ui))
669{
670 if (method != NULL) {
671 method->ui_close_session = closer;
672 return 0;
673 }
674 return -1;
675}
676
677int UI_method_set_data_duplicator(UI_METHOD *method,
678 void *(*duplicator) (UI *ui, void *ui_data),
679 void (*destructor)(UI *ui, void *ui_data))
680{
681 if (method != NULL) {
682 method->ui_duplicate_data = duplicator;
683 method->ui_destroy_data = destructor;
684 return 0;
685 }
686 return -1;
687}
688
689int UI_method_set_prompt_constructor(UI_METHOD *method,
690 char *(*prompt_constructor) (UI *ui,
691 const char
692 *object_desc,
693 const char
694 *object_name))
695{
696 if (method != NULL) {
697 method->ui_construct_prompt = prompt_constructor;
698 return 0;
699 }
700 return -1;
701}
702
703int UI_method_set_ex_data(UI_METHOD *method, int idx, void *data)
704{
705 return CRYPTO_set_ex_data(&method->ex_data, idx, data);
706}
707
708int (*UI_method_get_opener(const UI_METHOD *method)) (UI *)
709{
710 if (method != NULL)
711 return method->ui_open_session;
712 return NULL;
713}
714
715int (*UI_method_get_writer(const UI_METHOD *method)) (UI *, UI_STRING *)
716{
717 if (method != NULL)
718 return method->ui_write_string;
719 return NULL;
720}
721
722int (*UI_method_get_flusher(const UI_METHOD *method)) (UI *)
723{
724 if (method != NULL)
725 return method->ui_flush;
726 return NULL;
727}
728
729int (*UI_method_get_reader(const UI_METHOD *method)) (UI *, UI_STRING *)
730{
731 if (method != NULL)
732 return method->ui_read_string;
733 return NULL;
734}
735
736int (*UI_method_get_closer(const UI_METHOD *method)) (UI *)
737{
738 if (method != NULL)
739 return method->ui_close_session;
740 return NULL;
741}
742
743char *(*UI_method_get_prompt_constructor(const UI_METHOD *method))
744 (UI *, const char *, const char *)
745{
746 if (method != NULL)
747 return method->ui_construct_prompt;
748 return NULL;
749}
750
751void *(*UI_method_get_data_duplicator(const UI_METHOD *method)) (UI *, void *)
752{
753 if (method != NULL)
754 return method->ui_duplicate_data;
755 return NULL;
756}
757
758void (*UI_method_get_data_destructor(const UI_METHOD *method)) (UI *, void *)
759{
760 if (method != NULL)
761 return method->ui_destroy_data;
762 return NULL;
763}
764
765const void *UI_method_get_ex_data(const UI_METHOD *method, int idx)
766{
767 return CRYPTO_get_ex_data(&method->ex_data, idx);
768}
769
770enum UI_string_types UI_get_string_type(UI_STRING *uis)
771{
772 return uis->type;
773}
774
775int UI_get_input_flags(UI_STRING *uis)
776{
777 return uis->input_flags;
778}
779
780const char *UI_get0_output_string(UI_STRING *uis)
781{
782 return uis->out_string;
783}
784
785const char *UI_get0_action_string(UI_STRING *uis)
786{
787 switch (uis->type) {
788 case UIT_BOOLEAN:
789 return uis->_.boolean_data.action_desc;
790 case UIT_PROMPT:
791 case UIT_NONE:
792 case UIT_VERIFY:
793 case UIT_INFO:
794 case UIT_ERROR:
795 break;
796 }
797 return NULL;
798}
799
800const char *UI_get0_result_string(UI_STRING *uis)
801{
802 switch (uis->type) {
803 case UIT_PROMPT:
804 case UIT_VERIFY:
805 return uis->result_buf;
806 case UIT_NONE:
807 case UIT_BOOLEAN:
808 case UIT_INFO:
809 case UIT_ERROR:
810 break;
811 }
812 return NULL;
813}
814
815int UI_get_result_string_length(UI_STRING *uis)
816{
817 switch (uis->type) {
818 case UIT_PROMPT:
819 case UIT_VERIFY:
820 return uis->result_len;
821 case UIT_NONE:
822 case UIT_BOOLEAN:
823 case UIT_INFO:
824 case UIT_ERROR:
825 break;
826 }
827 return -1;
828}
829
830const char *UI_get0_test_string(UI_STRING *uis)
831{
832 switch (uis->type) {
833 case UIT_VERIFY:
834 return uis->_.string_data.test_buf;
835 case UIT_NONE:
836 case UIT_BOOLEAN:
837 case UIT_INFO:
838 case UIT_ERROR:
839 case UIT_PROMPT:
840 break;
841 }
842 return NULL;
843}
844
845int UI_get_result_minsize(UI_STRING *uis)
846{
847 switch (uis->type) {
848 case UIT_PROMPT:
849 case UIT_VERIFY:
850 return uis->_.string_data.result_minsize;
851 case UIT_NONE:
852 case UIT_INFO:
853 case UIT_ERROR:
854 case UIT_BOOLEAN:
855 break;
856 }
857 return -1;
858}
859
860int UI_get_result_maxsize(UI_STRING *uis)
861{
862 switch (uis->type) {
863 case UIT_PROMPT:
864 case UIT_VERIFY:
865 return uis->_.string_data.result_maxsize;
866 case UIT_NONE:
867 case UIT_INFO:
868 case UIT_ERROR:
869 case UIT_BOOLEAN:
870 break;
871 }
872 return -1;
873}
874
875int UI_set_result(UI *ui, UI_STRING *uis, const char *result)
876{
877#if 0
878 /*
879 * This is placed here solely to preserve UI_F_UI_SET_RESULT
880 * To be removed for OpenSSL 1.2.0
881 */
882 UIerr(UI_F_UI_SET_RESULT, ERR_R_DISABLED);
883#endif
884 return UI_set_result_ex(ui, uis, result, strlen(result));
885}
886
887int UI_set_result_ex(UI *ui, UI_STRING *uis, const char *result, int len)
888{
889 ui->flags &= ~UI_FLAG_REDOABLE;
890
891 switch (uis->type) {
892 case UIT_PROMPT:
893 case UIT_VERIFY:
894 {
895 char number1[DECIMAL_SIZE(uis->_.string_data.result_minsize) + 1];
896 char number2[DECIMAL_SIZE(uis->_.string_data.result_maxsize) + 1];
897
898 BIO_snprintf(number1, sizeof(number1), "%d",
899 uis->_.string_data.result_minsize);
900 BIO_snprintf(number2, sizeof(number2), "%d",
901 uis->_.string_data.result_maxsize);
902
903 if (len < uis->_.string_data.result_minsize) {
904 ui->flags |= UI_FLAG_REDOABLE;
905 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_SMALL);
906 ERR_add_error_data(5, "You must type in ",
907 number1, " to ", number2, " characters");
908 return -1;
909 }
910 if (len > uis->_.string_data.result_maxsize) {
911 ui->flags |= UI_FLAG_REDOABLE;
912 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_LARGE);
913 ERR_add_error_data(5, "You must type in ",
914 number1, " to ", number2, " characters");
915 return -1;
916 }
917 }
918
919 if (uis->result_buf == NULL) {
920 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
921 return -1;
922 }
923
924 memcpy(uis->result_buf, result, len);
925 if (len <= uis->_.string_data.result_maxsize)
926 uis->result_buf[len] = '\0';
927 uis->result_len = len;
928 break;
929 case UIT_BOOLEAN:
930 {
931 const char *p;
932
933 if (uis->result_buf == NULL) {
934 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
935 return -1;
936 }
937
938 uis->result_buf[0] = '\0';
939 for (p = result; *p; p++) {
940 if (strchr(uis->_.boolean_data.ok_chars, *p)) {
941 uis->result_buf[0] = uis->_.boolean_data.ok_chars[0];
942 break;
943 }
944 if (strchr(uis->_.boolean_data.cancel_chars, *p)) {
945 uis->result_buf[0] = uis->_.boolean_data.cancel_chars[0];
946 break;
947 }
948 }
949 }
950 case UIT_NONE:
951 case UIT_INFO:
952 case UIT_ERROR:
953 break;
954 }
955 return 0;
956}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette