2015-01-22 03:40:55 +00:00
|
|
|
/*
|
2016-05-17 19:38:09 +00:00
|
|
|
* Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved.
|
2001-05-06 23:19:37 +00:00
|
|
|
*
|
2016-05-17 19:38:09 +00:00
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2001-05-06 23:19:37 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <string.h>
|
2015-05-14 14:56:48 +00:00
|
|
|
#include "internal/cryptlib.h"
|
2001-06-20 15:00:08 +00:00
|
|
|
#include <openssl/e_os2.h>
|
|
|
|
#include <openssl/buffer.h>
|
2001-05-06 23:19:37 +00:00
|
|
|
#include <openssl/ui.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include "ui_locl.h"
|
|
|
|
|
|
|
|
UI *UI_new(void)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return (UI_new_method(NULL));
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
UI *UI_new_method(const UI_METHOD *method)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2015-09-03 13:15:26 +00:00
|
|
|
UI *ret = OPENSSL_zalloc(sizeof(*ret));
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
if (ret == NULL) {
|
|
|
|
UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-02-29 17:12:25 +00:00
|
|
|
|
|
|
|
ret->lock = CRYPTO_THREAD_lock_new();
|
|
|
|
if (ret->lock == NULL) {
|
|
|
|
UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
|
|
|
|
OPENSSL_free(ret);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
if (method == NULL)
|
2017-07-01 10:14:37 +00:00
|
|
|
method = UI_get_default_method();
|
|
|
|
if (method == NULL)
|
|
|
|
method = UI_null();
|
|
|
|
ret->meth = method;
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2016-02-13 18:29:34 +00:00
|
|
|
if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI, ret, &ret->ex_data)) {
|
|
|
|
OPENSSL_free(ret);
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-05-10 00:09:43 +00:00
|
|
|
static void free_string(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (uis->flags & OUT_STRING_FREEABLE) {
|
|
|
|
OPENSSL_free((char *)uis->out_string);
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
OPENSSL_free((char *)uis->_.boolean_data.action_desc);
|
|
|
|
OPENSSL_free((char *)uis->_.boolean_data.ok_chars);
|
|
|
|
OPENSSL_free((char *)uis->_.boolean_data.cancel_chars);
|
|
|
|
break;
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
case UIT_ERROR:
|
|
|
|
case UIT_INFO:
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
OPENSSL_free(uis);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
void UI_free(UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (ui == NULL)
|
|
|
|
return;
|
2017-05-28 07:35:11 +00:00
|
|
|
if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
|
|
|
|
ui->meth->ui_destroy_data(ui, ui->user_data);
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
sk_UI_STRING_pop_free(ui->strings, free_string);
|
|
|
|
CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI, ui, &ui->ex_data);
|
2016-02-29 17:12:25 +00:00
|
|
|
CRYPTO_THREAD_lock_free(ui->lock);
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(ui);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
static int allocate_string_stack(UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (ui->strings == NULL) {
|
|
|
|
ui->strings = sk_UI_STRING_new_null();
|
|
|
|
if (ui->strings == NULL) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-23 16:22:48 +00:00
|
|
|
static UI_STRING *general_allocate_prompt(UI *ui, const char *prompt,
|
2015-01-22 03:40:55 +00:00
|
|
|
int prompt_freeable,
|
|
|
|
enum UI_string_types type,
|
|
|
|
int input_flags, char *result_buf)
|
|
|
|
{
|
|
|
|
UI_STRING *ret = NULL;
|
|
|
|
|
|
|
|
if (prompt == NULL) {
|
|
|
|
UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
} else if ((type == UIT_PROMPT || type == UIT_VERIFY
|
|
|
|
|| type == UIT_BOOLEAN) && result_buf == NULL) {
|
|
|
|
UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, UI_R_NO_RESULT_BUFFER);
|
2015-10-30 11:12:26 +00:00
|
|
|
} else if ((ret = OPENSSL_malloc(sizeof(*ret))) != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ret->out_string = prompt;
|
|
|
|
ret->flags = prompt_freeable ? OUT_STRING_FREEABLE : 0;
|
|
|
|
ret->input_flags = input_flags;
|
|
|
|
ret->type = type;
|
|
|
|
ret->result_buf = result_buf;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
static int general_allocate_string(UI *ui, const char *prompt,
|
2015-01-22 03:40:55 +00:00
|
|
|
int prompt_freeable,
|
|
|
|
enum UI_string_types type, int input_flags,
|
|
|
|
char *result_buf, int minsize, int maxsize,
|
|
|
|
const char *test_buf)
|
|
|
|
{
|
|
|
|
int ret = -1;
|
|
|
|
UI_STRING *s = general_allocate_prompt(ui, prompt, prompt_freeable,
|
|
|
|
type, input_flags, result_buf);
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (s != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
if (allocate_string_stack(ui) >= 0) {
|
|
|
|
s->_.string_data.result_minsize = minsize;
|
|
|
|
s->_.string_data.result_maxsize = maxsize;
|
|
|
|
s->_.string_data.test_buf = test_buf;
|
|
|
|
ret = sk_UI_STRING_push(ui->strings, s);
|
2016-02-05 20:23:54 +00:00
|
|
|
/* sk_push() returns 0 on error. Let's adapt that */
|
2016-06-27 19:57:58 +00:00
|
|
|
if (ret <= 0) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ret--;
|
2016-06-27 19:57:58 +00:00
|
|
|
free_string(s);
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
} else
|
|
|
|
free_string(s);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
|
|
|
static int general_allocate_boolean(UI *ui,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *prompt,
|
|
|
|
const char *action_desc,
|
|
|
|
const char *ok_chars,
|
|
|
|
const char *cancel_chars,
|
|
|
|
int prompt_freeable,
|
|
|
|
enum UI_string_types type,
|
|
|
|
int input_flags, char *result_buf)
|
|
|
|
{
|
|
|
|
int ret = -1;
|
|
|
|
UI_STRING *s;
|
|
|
|
const char *p;
|
|
|
|
|
|
|
|
if (ok_chars == NULL) {
|
|
|
|
UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
} else if (cancel_chars == NULL) {
|
|
|
|
UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
} else {
|
2016-12-08 17:01:04 +00:00
|
|
|
for (p = ok_chars; *p != '\0'; p++) {
|
|
|
|
if (strchr(cancel_chars, *p) != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN,
|
|
|
|
UI_R_COMMON_OK_AND_CANCEL_CHARACTERS);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
s = general_allocate_prompt(ui, prompt, prompt_freeable,
|
|
|
|
type, input_flags, result_buf);
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (s != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
if (allocate_string_stack(ui) >= 0) {
|
|
|
|
s->_.boolean_data.action_desc = action_desc;
|
|
|
|
s->_.boolean_data.ok_chars = ok_chars;
|
|
|
|
s->_.boolean_data.cancel_chars = cancel_chars;
|
|
|
|
ret = sk_UI_STRING_push(ui->strings, s);
|
|
|
|
/*
|
2016-02-05 20:23:54 +00:00
|
|
|
* sk_push() returns 0 on error. Let's adapt that
|
2015-01-22 03:40:55 +00:00
|
|
|
*/
|
2016-06-27 19:57:58 +00:00
|
|
|
if (ret <= 0) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ret--;
|
2016-06-27 19:57:58 +00:00
|
|
|
free_string(s);
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
} else
|
|
|
|
free_string(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns the index to the place in the stack or -1 for error. Uses a
|
|
|
|
* direct reference to the prompt.
|
|
|
|
*/
|
2001-06-19 15:52:00 +00:00
|
|
|
int UI_add_input_string(UI *ui, const char *prompt, int flags,
|
2015-01-22 03:40:55 +00:00
|
|
|
char *result_buf, int minsize, int maxsize)
|
|
|
|
{
|
|
|
|
return general_allocate_string(ui, prompt, 0,
|
|
|
|
UIT_PROMPT, flags, result_buf, minsize,
|
|
|
|
maxsize, NULL);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
/* Same as UI_add_input_string(), excepts it takes a copy of the prompt */
|
2001-06-19 15:52:00 +00:00
|
|
|
int UI_dup_input_string(UI *ui, const char *prompt, int flags,
|
2015-01-22 03:40:55 +00:00
|
|
|
char *result_buf, int minsize, int maxsize)
|
|
|
|
{
|
|
|
|
char *prompt_copy = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (prompt != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
prompt_copy = OPENSSL_strdup(prompt);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (prompt_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INPUT_STRING, ERR_R_MALLOC_FAILURE);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return general_allocate_string(ui, prompt_copy, 1,
|
|
|
|
UIT_PROMPT, flags, result_buf, minsize,
|
|
|
|
maxsize, NULL);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-19 15:52:00 +00:00
|
|
|
int UI_add_verify_string(UI *ui, const char *prompt, int flags,
|
2015-01-22 03:40:55 +00:00
|
|
|
char *result_buf, int minsize, int maxsize,
|
|
|
|
const char *test_buf)
|
|
|
|
{
|
|
|
|
return general_allocate_string(ui, prompt, 0,
|
|
|
|
UIT_VERIFY, flags, result_buf, minsize,
|
|
|
|
maxsize, test_buf);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-19 15:52:00 +00:00
|
|
|
int UI_dup_verify_string(UI *ui, const char *prompt, int flags,
|
2015-01-22 03:40:55 +00:00
|
|
|
char *result_buf, int minsize, int maxsize,
|
|
|
|
const char *test_buf)
|
|
|
|
{
|
|
|
|
char *prompt_copy = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (prompt != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
prompt_copy = OPENSSL_strdup(prompt);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (prompt_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_VERIFY_STRING, ERR_R_MALLOC_FAILURE);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return general_allocate_string(ui, prompt_copy, 1,
|
|
|
|
UIT_VERIFY, flags, result_buf, minsize,
|
|
|
|
maxsize, test_buf);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-23 16:22:48 +00:00
|
|
|
int UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *ok_chars, const char *cancel_chars,
|
|
|
|
int flags, char *result_buf)
|
|
|
|
{
|
|
|
|
return general_allocate_boolean(ui, prompt, action_desc,
|
|
|
|
ok_chars, cancel_chars, 0, UIT_BOOLEAN,
|
|
|
|
flags, result_buf);
|
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
|
|
|
int UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *ok_chars, const char *cancel_chars,
|
|
|
|
int flags, char *result_buf)
|
|
|
|
{
|
|
|
|
char *prompt_copy = NULL;
|
|
|
|
char *action_desc_copy = NULL;
|
|
|
|
char *ok_chars_copy = NULL;
|
|
|
|
char *cancel_chars_copy = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (prompt != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
prompt_copy = OPENSSL_strdup(prompt);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (prompt_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (action_desc != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
action_desc_copy = OPENSSL_strdup(action_desc);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (action_desc_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ok_chars != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
ok_chars_copy = OPENSSL_strdup(ok_chars);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (ok_chars_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (cancel_chars != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
cancel_chars_copy = OPENSSL_strdup(cancel_chars);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (cancel_chars_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return general_allocate_boolean(ui, prompt_copy, action_desc_copy,
|
|
|
|
ok_chars_copy, cancel_chars_copy, 1,
|
|
|
|
UIT_BOOLEAN, flags, result_buf);
|
2001-06-23 16:22:48 +00:00
|
|
|
err:
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(prompt_copy);
|
|
|
|
OPENSSL_free(action_desc_copy);
|
|
|
|
OPENSSL_free(ok_chars_copy);
|
|
|
|
OPENSSL_free(cancel_chars_copy);
|
2015-01-22 03:40:55 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
int UI_add_info_string(UI *ui, const char *text)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0,
|
|
|
|
NULL);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
int UI_dup_info_string(UI *ui, const char *text)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
char *text_copy = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (text != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
text_copy = OPENSSL_strdup(text);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (text_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_INFO_STRING, ERR_R_MALLOC_FAILURE);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return general_allocate_string(ui, text_copy, 1, UIT_INFO, 0, NULL,
|
|
|
|
0, 0, NULL);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
int UI_add_error_string(UI *ui, const char *text)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0,
|
|
|
|
NULL);
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
int UI_dup_error_string(UI *ui, const char *text)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
char *text_copy = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (text != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
text_copy = OPENSSL_strdup(text);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (text_copy == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_ERROR_STRING, ERR_R_MALLOC_FAILURE);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return general_allocate_string(ui, text_copy, 1, UIT_ERROR, 0, NULL,
|
|
|
|
0, 0, NULL);
|
|
|
|
}
|
2001-06-19 15:52:00 +00:00
|
|
|
|
|
|
|
char *UI_construct_prompt(UI *ui, const char *object_desc,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *object_name)
|
|
|
|
{
|
|
|
|
char *prompt = NULL;
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_construct_prompt != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
prompt = ui->meth->ui_construct_prompt(ui, object_desc, object_name);
|
|
|
|
else {
|
|
|
|
char prompt1[] = "Enter ";
|
|
|
|
char prompt2[] = " for ";
|
|
|
|
char prompt3[] = ":";
|
|
|
|
int len = 0;
|
|
|
|
|
|
|
|
if (object_desc == NULL)
|
|
|
|
return NULL;
|
|
|
|
len = sizeof(prompt1) - 1 + strlen(object_desc);
|
2016-12-08 17:01:04 +00:00
|
|
|
if (object_name != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
len += sizeof(prompt2) - 1 + strlen(object_name);
|
|
|
|
len += sizeof(prompt3) - 1;
|
|
|
|
|
2015-04-28 19:28:14 +00:00
|
|
|
prompt = OPENSSL_malloc(len + 1);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (prompt == NULL)
|
|
|
|
return NULL;
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
OPENSSL_strlcpy(prompt, prompt1, len + 1);
|
|
|
|
OPENSSL_strlcat(prompt, object_desc, len + 1);
|
2016-12-08 17:01:04 +00:00
|
|
|
if (object_name != NULL) {
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
OPENSSL_strlcat(prompt, prompt2, len + 1);
|
|
|
|
OPENSSL_strlcat(prompt, object_name, len + 1);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
Rename some BUF_xxx to OPENSSL_xxx
Rename BUF_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
to OPENSSL_{strdup,strlcat,strlcpy,memdup,strndup,strnlen}
Add #define's for the old names.
Add CRYPTO_{memdup,strndup}, called by OPENSSL_{memdup,strndup} macros.
Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-12-16 21:12:24 +00:00
|
|
|
OPENSSL_strlcat(prompt, prompt3, len + 1);
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
return prompt;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-05 19:05:52 +00:00
|
|
|
void *UI_add_user_data(UI *ui, void *user_data)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
void *old_data = ui->user_data;
|
2017-05-28 07:35:11 +00:00
|
|
|
|
|
|
|
if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
|
|
|
|
ui->meth->ui_destroy_data(ui, old_data);
|
|
|
|
old_data = NULL;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
ui->user_data = user_data;
|
2017-05-28 07:35:11 +00:00
|
|
|
ui->flags &= ~UI_FLAG_DUPL_DATA;
|
2015-01-22 03:40:55 +00:00
|
|
|
return old_data;
|
|
|
|
}
|
2001-06-05 19:05:52 +00:00
|
|
|
|
2017-05-28 07:35:11 +00:00
|
|
|
int UI_dup_user_data(UI *ui, void *user_data)
|
|
|
|
{
|
|
|
|
void *duplicate = NULL;
|
|
|
|
|
|
|
|
if (ui->meth->ui_duplicate_data == NULL
|
|
|
|
|| ui->meth->ui_destroy_data == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_USER_DATA, UI_R_USER_DATA_DUPLICATION_UNSUPPORTED);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
duplicate = ui->meth->ui_duplicate_data(ui, user_data);
|
|
|
|
if (duplicate == NULL) {
|
|
|
|
UIerr(UI_F_UI_DUP_USER_DATA, ERR_R_MALLOC_FAILURE);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
(void)UI_add_user_data(ui, duplicate);
|
|
|
|
ui->flags |= UI_FLAG_DUPL_DATA;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-06-05 19:05:52 +00:00
|
|
|
void *UI_get0_user_data(UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return ui->user_data;
|
|
|
|
}
|
2001-06-05 19:05:52 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
const char *UI_get0_result(UI *ui, int i)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
if (i < 0) {
|
|
|
|
UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_SMALL);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (i >= sk_UI_STRING_num(ui->strings)) {
|
|
|
|
UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_LARGE);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return UI_get0_result_string(sk_UI_STRING_value(ui->strings, i));
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2017-07-01 10:39:51 +00:00
|
|
|
int UI_get_result_length(UI *ui, int i)
|
|
|
|
{
|
|
|
|
if (i < 0) {
|
|
|
|
UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_SMALL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (i >= sk_UI_STRING_num(ui->strings)) {
|
|
|
|
UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_LARGE);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return UI_get_result_string_length(sk_UI_STRING_value(ui->strings, i));
|
|
|
|
}
|
|
|
|
|
2001-06-23 16:22:48 +00:00
|
|
|
static int print_error(const char *str, size_t len, UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
UI_STRING uis;
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
memset(&uis, 0, sizeof(uis));
|
|
|
|
uis.type = UIT_ERROR;
|
|
|
|
uis.out_string = str;
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_write_string != NULL
|
|
|
|
&& ui->meth->ui_write_string(ui, &uis) <= 0)
|
2015-01-22 03:40:55 +00:00
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
int UI_process(UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
int i, ok = 0;
|
2016-12-07 15:36:44 +00:00
|
|
|
const char *state = "processing";
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_open_session != NULL
|
|
|
|
&& ui->meth->ui_open_session(ui) <= 0) {
|
2016-12-07 15:36:44 +00:00
|
|
|
state = "opening session";
|
|
|
|
ok = -1;
|
|
|
|
goto err;
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
if (ui->flags & UI_FLAG_PRINT_ERRORS)
|
|
|
|
ERR_print_errors_cb((int (*)(const char *, size_t, void *))
|
|
|
|
print_error, (void *)ui);
|
|
|
|
|
|
|
|
for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_write_string != NULL
|
|
|
|
&& (ui->meth->ui_write_string(ui,
|
|
|
|
sk_UI_STRING_value(ui->strings, i))
|
|
|
|
<= 0))
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-12-07 15:36:44 +00:00
|
|
|
state = "writing strings";
|
2015-01-22 03:40:55 +00:00
|
|
|
ok = -1;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_flush != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
switch (ui->meth->ui_flush(ui)) {
|
|
|
|
case -1: /* Interrupt/Cancel/something... */
|
|
|
|
ok = -2;
|
|
|
|
goto err;
|
|
|
|
case 0: /* Errors */
|
2016-12-07 15:36:44 +00:00
|
|
|
state = "flushing";
|
2015-01-22 03:40:55 +00:00
|
|
|
ok = -1;
|
|
|
|
goto err;
|
|
|
|
default: /* Success */
|
|
|
|
ok = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_read_string != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
switch (ui->meth->ui_read_string(ui,
|
|
|
|
sk_UI_STRING_value(ui->strings,
|
|
|
|
i))) {
|
|
|
|
case -1: /* Interrupt/Cancel/something... */
|
|
|
|
ok = -2;
|
|
|
|
goto err;
|
|
|
|
case 0: /* Errors */
|
2016-12-07 15:36:44 +00:00
|
|
|
state = "reading strings";
|
2015-01-22 03:40:55 +00:00
|
|
|
ok = -1;
|
|
|
|
goto err;
|
|
|
|
default: /* Success */
|
|
|
|
ok = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-07-05 08:26:25 +00:00
|
|
|
|
|
|
|
state = NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
err:
|
2016-12-08 17:01:04 +00:00
|
|
|
if (ui->meth->ui_close_session != NULL
|
2016-12-08 19:51:21 +00:00
|
|
|
&& ui->meth->ui_close_session(ui) <= 0) {
|
2016-12-07 15:36:44 +00:00
|
|
|
if (state == NULL)
|
|
|
|
state = "closing session";
|
|
|
|
ok = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ok == -1) {
|
|
|
|
UIerr(UI_F_UI_PROCESS, UI_R_PROCESSING_ERROR);
|
|
|
|
ERR_add_error_data(2, "while ", state);
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
int UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void))
|
|
|
|
{
|
|
|
|
if (ui == NULL) {
|
|
|
|
UIerr(UI_F_UI_CTRL, ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
switch (cmd) {
|
|
|
|
case UI_CTRL_PRINT_ERRORS:
|
2001-05-06 23:19:37 +00:00
|
|
|
{
|
2015-01-22 03:40:55 +00:00
|
|
|
int save_flag = ! !(ui->flags & UI_FLAG_PRINT_ERRORS);
|
|
|
|
if (i)
|
|
|
|
ui->flags |= UI_FLAG_PRINT_ERRORS;
|
|
|
|
else
|
|
|
|
ui->flags &= ~UI_FLAG_PRINT_ERRORS;
|
|
|
|
return save_flag;
|
2001-05-06 23:19:37 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
case UI_CTRL_IS_REDOABLE:
|
|
|
|
return ! !(ui->flags & UI_FLAG_REDOABLE);
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
UIerr(UI_F_UI_CTRL, UI_R_UNKNOWN_CONTROL_COMMAND);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
int UI_set_ex_data(UI *r, int idx, void *arg)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return (CRYPTO_set_ex_data(&r->ex_data, idx, arg));
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
void *UI_get_ex_data(UI *r, int idx)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return (CRYPTO_get_ex_data(&r->ex_data, idx));
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
const UI_METHOD *UI_get_method(UI *ui)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return ui->meth;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
const UI_METHOD *UI_set_method(UI *ui, const UI_METHOD *meth)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
ui->meth = meth;
|
|
|
|
return ui->meth;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2016-06-07 22:03:08 +00:00
|
|
|
UI_METHOD *UI_create_method(const char *name)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-12-06 13:36:04 +00:00
|
|
|
UI_METHOD *ui_method = NULL;
|
|
|
|
|
|
|
|
if ((ui_method = OPENSSL_zalloc(sizeof(*ui_method))) == NULL
|
|
|
|
|| (ui_method->name = OPENSSL_strdup(name)) == NULL
|
|
|
|
|| !CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
|
|
|
|
&ui_method->ex_data)) {
|
|
|
|
if (ui_method)
|
|
|
|
OPENSSL_free(ui_method->name);
|
|
|
|
OPENSSL_free(ui_method);
|
|
|
|
UIerr(UI_F_UI_CREATE_METHOD, ERR_R_MALLOC_FAILURE);
|
|
|
|
return NULL;
|
2016-05-04 10:28:38 +00:00
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
return ui_method;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* BIG FSCKING WARNING!!!! If you use this on a statically allocated method
|
|
|
|
* (that is, it hasn't been allocated using UI_create_method(), you deserve
|
|
|
|
* anything Murphy can throw at you and more! You have been warned.
|
|
|
|
*/
|
2001-06-20 15:00:08 +00:00
|
|
|
void UI_destroy_method(UI_METHOD *ui_method)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-12-06 13:36:04 +00:00
|
|
|
if (ui_method == NULL)
|
|
|
|
return;
|
|
|
|
CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
|
|
|
|
&ui_method->ex_data);
|
2015-01-22 03:40:55 +00:00
|
|
|
OPENSSL_free(ui_method->name);
|
|
|
|
ui_method->name = NULL;
|
|
|
|
OPENSSL_free(ui_method);
|
|
|
|
}
|
|
|
|
|
|
|
|
int UI_method_set_opener(UI_METHOD *method, int (*opener) (UI *ui))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_open_session = opener;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int UI_method_set_writer(UI_METHOD *method,
|
|
|
|
int (*writer) (UI *ui, UI_STRING *uis))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_write_string = writer;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int UI_method_set_flusher(UI_METHOD *method, int (*flusher) (UI *ui))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_flush = flusher;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int UI_method_set_reader(UI_METHOD *method,
|
|
|
|
int (*reader) (UI *ui, UI_STRING *uis))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_read_string = reader;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int UI_method_set_closer(UI_METHOD *method, int (*closer) (UI *ui))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_close_session = closer;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2017-05-28 07:35:11 +00:00
|
|
|
int UI_method_set_data_duplicator(UI_METHOD *method,
|
|
|
|
void *(*duplicator) (UI *ui, void *ui_data),
|
|
|
|
void (*destructor)(UI *ui, void *ui_data))
|
|
|
|
{
|
|
|
|
if (method != NULL) {
|
|
|
|
method->ui_duplicate_data = duplicator;
|
|
|
|
method->ui_destroy_data = destructor;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
int UI_method_set_prompt_constructor(UI_METHOD *method,
|
|
|
|
char *(*prompt_constructor) (UI *ui,
|
|
|
|
const char
|
|
|
|
*object_desc,
|
|
|
|
const char
|
|
|
|
*object_name))
|
|
|
|
{
|
2016-12-08 17:01:04 +00:00
|
|
|
if (method != NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
method->ui_construct_prompt = prompt_constructor;
|
|
|
|
return 0;
|
2016-12-08 17:01:04 +00:00
|
|
|
}
|
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:36:04 +00:00
|
|
|
int UI_method_set_ex_data(UI_METHOD *method, int idx, void *data)
|
|
|
|
{
|
|
|
|
return CRYPTO_set_ex_data(&method->ex_data, idx, data);
|
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
int (*UI_method_get_opener(const UI_METHOD *method)) (UI *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_open_session;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
int (*UI_method_get_writer(const UI_METHOD *method)) (UI *, UI_STRING *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_write_string;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
int (*UI_method_get_flusher(const UI_METHOD *method)) (UI *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_flush;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
int (*UI_method_get_reader(const UI_METHOD *method)) (UI *, UI_STRING *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_read_string;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
int (*UI_method_get_closer(const UI_METHOD *method)) (UI *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_close_session;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
2016-12-06 13:34:52 +00:00
|
|
|
char *(*UI_method_get_prompt_constructor(const UI_METHOD *method))
|
|
|
|
(UI *, const char *, const char *)
|
2016-12-08 17:01:04 +00:00
|
|
|
{
|
|
|
|
if (method != NULL)
|
2015-01-22 03:40:55 +00:00
|
|
|
return method->ui_construct_prompt;
|
2016-12-08 17:01:04 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2017-05-28 07:35:11 +00:00
|
|
|
void *(*UI_method_get_data_duplicator(const UI_METHOD *method)) (UI *, void *)
|
|
|
|
{
|
|
|
|
if (method != NULL)
|
|
|
|
return method->ui_duplicate_data;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void (*UI_method_get_data_destructor(const UI_METHOD *method)) (UI *, void *)
|
|
|
|
{
|
|
|
|
if (method != NULL)
|
|
|
|
return method->ui_destroy_data;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-12-06 13:36:04 +00:00
|
|
|
const void *UI_method_get_ex_data(const UI_METHOD *method, int idx)
|
|
|
|
{
|
|
|
|
return CRYPTO_get_ex_data(&method->ex_data, idx);
|
|
|
|
}
|
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
enum UI_string_types UI_get_string_type(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return uis->type;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-19 15:52:00 +00:00
|
|
|
int UI_get_input_flags(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return uis->input_flags;
|
|
|
|
}
|
2001-06-19 15:52:00 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
const char *UI_get0_output_string(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
return uis->out_string;
|
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-23 16:22:48 +00:00
|
|
|
const char *UI_get0_action_string(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
return uis->_.boolean_data.action_desc;
|
2017-03-10 23:54:52 +00:00
|
|
|
case UIT_PROMPT:
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-06-23 16:22:48 +00:00
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
const char *UI_get0_result_string(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
return uis->result_buf;
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2017-07-01 10:39:51 +00:00
|
|
|
int UI_get_result_string_length(UI_STRING *uis)
|
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
return uis->result_len;
|
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-05-06 23:19:37 +00:00
|
|
|
const char *UI_get0_test_string(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_VERIFY:
|
|
|
|
return uis->_.string_data.test_buf;
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
case UIT_PROMPT:
|
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
int UI_get_result_minsize(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
return uis->_.string_data.result_minsize;
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
|
|
|
int UI_get_result_maxsize(UI_STRING *uis)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
return uis->_.string_data.result_maxsize;
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
break;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
return -1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2001-05-06 23:19:37 +00:00
|
|
|
|
2001-06-23 16:22:48 +00:00
|
|
|
int UI_set_result(UI *ui, UI_STRING *uis, const char *result)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2017-07-01 10:39:51 +00:00
|
|
|
#if 0
|
|
|
|
/*
|
|
|
|
* This is placed here solely to preserve UI_F_UI_SET_RESULT
|
|
|
|
* To be removed for OpenSSL 1.2.0
|
|
|
|
*/
|
|
|
|
UIerr(UI_F_UI_SET_RESULT, ERR_R_DISABLED);
|
|
|
|
#endif
|
|
|
|
return UI_set_result_ex(ui, uis, result, strlen(result));
|
|
|
|
}
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2017-07-01 10:39:51 +00:00
|
|
|
int UI_set_result_ex(UI *ui, UI_STRING *uis, const char *result, int len)
|
|
|
|
{
|
2015-01-22 03:40:55 +00:00
|
|
|
ui->flags &= ~UI_FLAG_REDOABLE;
|
|
|
|
|
|
|
|
switch (uis->type) {
|
|
|
|
case UIT_PROMPT:
|
|
|
|
case UIT_VERIFY:
|
|
|
|
{
|
|
|
|
char number1[DECIMAL_SIZE(uis->_.string_data.result_minsize) + 1];
|
|
|
|
char number2[DECIMAL_SIZE(uis->_.string_data.result_maxsize) + 1];
|
|
|
|
|
|
|
|
BIO_snprintf(number1, sizeof(number1), "%d",
|
|
|
|
uis->_.string_data.result_minsize);
|
|
|
|
BIO_snprintf(number2, sizeof(number2), "%d",
|
|
|
|
uis->_.string_data.result_maxsize);
|
|
|
|
|
2017-07-01 10:39:51 +00:00
|
|
|
if (len < uis->_.string_data.result_minsize) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ui->flags |= UI_FLAG_REDOABLE;
|
2017-07-01 10:39:51 +00:00
|
|
|
UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_SMALL);
|
2015-01-22 03:40:55 +00:00
|
|
|
ERR_add_error_data(5, "You must type in ",
|
|
|
|
number1, " to ", number2, " characters");
|
|
|
|
return -1;
|
|
|
|
}
|
2017-07-01 10:39:51 +00:00
|
|
|
if (len > uis->_.string_data.result_maxsize) {
|
2015-01-22 03:40:55 +00:00
|
|
|
ui->flags |= UI_FLAG_REDOABLE;
|
2017-07-01 10:39:51 +00:00
|
|
|
UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_LARGE);
|
2015-01-22 03:40:55 +00:00
|
|
|
ERR_add_error_data(5, "You must type in ",
|
|
|
|
number1, " to ", number2, " characters");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-30 17:31:18 +00:00
|
|
|
if (uis->result_buf == NULL) {
|
2017-07-01 10:39:51 +00:00
|
|
|
UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
|
2015-01-22 03:40:55 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-07-01 10:39:51 +00:00
|
|
|
memcpy(uis->result_buf, result, len);
|
|
|
|
if (len <= uis->_.string_data.result_maxsize)
|
|
|
|
uis->result_buf[len] = '\0';
|
|
|
|
uis->result_len = len;
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
case UIT_BOOLEAN:
|
|
|
|
{
|
|
|
|
const char *p;
|
|
|
|
|
2016-08-30 17:31:18 +00:00
|
|
|
if (uis->result_buf == NULL) {
|
2017-07-01 10:39:51 +00:00
|
|
|
UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
|
2015-01-22 03:40:55 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
uis->result_buf[0] = '\0';
|
|
|
|
for (p = result; *p; p++) {
|
|
|
|
if (strchr(uis->_.boolean_data.ok_chars, *p)) {
|
|
|
|
uis->result_buf[0] = uis->_.boolean_data.ok_chars[0];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (strchr(uis->_.boolean_data.cancel_chars, *p)) {
|
|
|
|
uis->result_buf[0] = uis->_.boolean_data.cancel_chars[0];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-08-30 17:31:18 +00:00
|
|
|
case UIT_NONE:
|
|
|
|
case UIT_INFO:
|
|
|
|
case UIT_ERROR:
|
2015-01-22 03:40:55 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|