2 * Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/cryptlib.h"
12 #include <openssl/e_os2.h>
13 #include <openssl/buffer.h>
14 #include <openssl/ui.h>
15 #include <openssl/err.h>
20 return (UI_new_method(NULL));
23 UI *UI_new_method(const UI_METHOD *method)
25 UI *ret = OPENSSL_zalloc(sizeof(*ret));
28 UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
32 ret->lock = CRYPTO_THREAD_lock_new();
33 if (ret->lock == NULL) {
34 UIerr(UI_F_UI_NEW_METHOD, ERR_R_MALLOC_FAILURE);
40 method = UI_get_default_method();
45 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI, ret, &ret->ex_data)) {
52 static void free_string(UI_STRING *uis)
54 if (uis->flags & OUT_STRING_FREEABLE) {
55 OPENSSL_free((char *)uis->out_string);
58 OPENSSL_free((char *)uis->_.boolean_data.action_desc);
59 OPENSSL_free((char *)uis->_.boolean_data.ok_chars);
60 OPENSSL_free((char *)uis->_.boolean_data.cancel_chars);
77 if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
78 ui->meth->ui_destroy_data(ui, ui->user_data);
80 sk_UI_STRING_pop_free(ui->strings, free_string);
81 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI, ui, &ui->ex_data);
82 CRYPTO_THREAD_lock_free(ui->lock);
86 static int allocate_string_stack(UI *ui)
88 if (ui->strings == NULL) {
89 ui->strings = sk_UI_STRING_new_null();
90 if (ui->strings == NULL) {
97 static UI_STRING *general_allocate_prompt(UI *ui, const char *prompt,
99 enum UI_string_types type,
100 int input_flags, char *result_buf)
102 UI_STRING *ret = NULL;
104 if (prompt == NULL) {
105 UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, ERR_R_PASSED_NULL_PARAMETER);
106 } else if ((type == UIT_PROMPT || type == UIT_VERIFY
107 || type == UIT_BOOLEAN) && result_buf == NULL) {
108 UIerr(UI_F_GENERAL_ALLOCATE_PROMPT, UI_R_NO_RESULT_BUFFER);
109 } else if ((ret = OPENSSL_malloc(sizeof(*ret))) != NULL) {
110 ret->out_string = prompt;
111 ret->flags = prompt_freeable ? OUT_STRING_FREEABLE : 0;
112 ret->input_flags = input_flags;
114 ret->result_buf = result_buf;
119 static int general_allocate_string(UI *ui, const char *prompt,
121 enum UI_string_types type, int input_flags,
122 char *result_buf, int minsize, int maxsize,
123 const char *test_buf)
126 UI_STRING *s = general_allocate_prompt(ui, prompt, prompt_freeable,
127 type, input_flags, result_buf);
130 if (allocate_string_stack(ui) >= 0) {
131 s->_.string_data.result_minsize = minsize;
132 s->_.string_data.result_maxsize = maxsize;
133 s->_.string_data.test_buf = test_buf;
134 ret = sk_UI_STRING_push(ui->strings, s);
135 /* sk_push() returns 0 on error. Let's adapt that */
146 static int general_allocate_boolean(UI *ui,
148 const char *action_desc,
149 const char *ok_chars,
150 const char *cancel_chars,
152 enum UI_string_types type,
153 int input_flags, char *result_buf)
159 if (ok_chars == NULL) {
160 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
161 } else if (cancel_chars == NULL) {
162 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN, ERR_R_PASSED_NULL_PARAMETER);
164 for (p = ok_chars; *p != '\0'; p++) {
165 if (strchr(cancel_chars, *p) != NULL) {
166 UIerr(UI_F_GENERAL_ALLOCATE_BOOLEAN,
167 UI_R_COMMON_OK_AND_CANCEL_CHARACTERS);
171 s = general_allocate_prompt(ui, prompt, prompt_freeable,
172 type, input_flags, result_buf);
175 if (allocate_string_stack(ui) >= 0) {
176 s->_.boolean_data.action_desc = action_desc;
177 s->_.boolean_data.ok_chars = ok_chars;
178 s->_.boolean_data.cancel_chars = cancel_chars;
179 ret = sk_UI_STRING_push(ui->strings, s);
181 * sk_push() returns 0 on error. Let's adapt that
195 * Returns the index to the place in the stack or -1 for error. Uses a
196 * direct reference to the prompt.
198 int UI_add_input_string(UI *ui, const char *prompt, int flags,
199 char *result_buf, int minsize, int maxsize)
201 return general_allocate_string(ui, prompt, 0,
202 UIT_PROMPT, flags, result_buf, minsize,
206 /* Same as UI_add_input_string(), excepts it takes a copy of the prompt */
207 int UI_dup_input_string(UI *ui, const char *prompt, int flags,
208 char *result_buf, int minsize, int maxsize)
210 char *prompt_copy = NULL;
212 if (prompt != NULL) {
213 prompt_copy = OPENSSL_strdup(prompt);
214 if (prompt_copy == NULL) {
215 UIerr(UI_F_UI_DUP_INPUT_STRING, ERR_R_MALLOC_FAILURE);
220 return general_allocate_string(ui, prompt_copy, 1,
221 UIT_PROMPT, flags, result_buf, minsize,
225 int UI_add_verify_string(UI *ui, const char *prompt, int flags,
226 char *result_buf, int minsize, int maxsize,
227 const char *test_buf)
229 return general_allocate_string(ui, prompt, 0,
230 UIT_VERIFY, flags, result_buf, minsize,
234 int UI_dup_verify_string(UI *ui, const char *prompt, int flags,
235 char *result_buf, int minsize, int maxsize,
236 const char *test_buf)
238 char *prompt_copy = NULL;
240 if (prompt != NULL) {
241 prompt_copy = OPENSSL_strdup(prompt);
242 if (prompt_copy == NULL) {
243 UIerr(UI_F_UI_DUP_VERIFY_STRING, ERR_R_MALLOC_FAILURE);
248 return general_allocate_string(ui, prompt_copy, 1,
249 UIT_VERIFY, flags, result_buf, minsize,
253 int UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc,
254 const char *ok_chars, const char *cancel_chars,
255 int flags, char *result_buf)
257 return general_allocate_boolean(ui, prompt, action_desc,
258 ok_chars, cancel_chars, 0, UIT_BOOLEAN,
262 int UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc,
263 const char *ok_chars, const char *cancel_chars,
264 int flags, char *result_buf)
266 char *prompt_copy = NULL;
267 char *action_desc_copy = NULL;
268 char *ok_chars_copy = NULL;
269 char *cancel_chars_copy = NULL;
271 if (prompt != NULL) {
272 prompt_copy = OPENSSL_strdup(prompt);
273 if (prompt_copy == NULL) {
274 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
279 if (action_desc != NULL) {
280 action_desc_copy = OPENSSL_strdup(action_desc);
281 if (action_desc_copy == NULL) {
282 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
287 if (ok_chars != NULL) {
288 ok_chars_copy = OPENSSL_strdup(ok_chars);
289 if (ok_chars_copy == NULL) {
290 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
295 if (cancel_chars != NULL) {
296 cancel_chars_copy = OPENSSL_strdup(cancel_chars);
297 if (cancel_chars_copy == NULL) {
298 UIerr(UI_F_UI_DUP_INPUT_BOOLEAN, ERR_R_MALLOC_FAILURE);
303 return general_allocate_boolean(ui, prompt_copy, action_desc_copy,
304 ok_chars_copy, cancel_chars_copy, 1,
305 UIT_BOOLEAN, flags, result_buf);
307 OPENSSL_free(prompt_copy);
308 OPENSSL_free(action_desc_copy);
309 OPENSSL_free(ok_chars_copy);
310 OPENSSL_free(cancel_chars_copy);
314 int UI_add_info_string(UI *ui, const char *text)
316 return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0,
320 int UI_dup_info_string(UI *ui, const char *text)
322 char *text_copy = NULL;
325 text_copy = OPENSSL_strdup(text);
326 if (text_copy == NULL) {
327 UIerr(UI_F_UI_DUP_INFO_STRING, ERR_R_MALLOC_FAILURE);
332 return general_allocate_string(ui, text_copy, 1, UIT_INFO, 0, NULL,
336 int UI_add_error_string(UI *ui, const char *text)
338 return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0,
342 int UI_dup_error_string(UI *ui, const char *text)
344 char *text_copy = NULL;
347 text_copy = OPENSSL_strdup(text);
348 if (text_copy == NULL) {
349 UIerr(UI_F_UI_DUP_ERROR_STRING, ERR_R_MALLOC_FAILURE);
353 return general_allocate_string(ui, text_copy, 1, UIT_ERROR, 0, NULL,
357 char *UI_construct_prompt(UI *ui, const char *object_desc,
358 const char *object_name)
362 if (ui->meth->ui_construct_prompt != NULL)
363 prompt = ui->meth->ui_construct_prompt(ui, object_desc, object_name);
365 char prompt1[] = "Enter ";
366 char prompt2[] = " for ";
367 char prompt3[] = ":";
370 if (object_desc == NULL)
372 len = sizeof(prompt1) - 1 + strlen(object_desc);
373 if (object_name != NULL)
374 len += sizeof(prompt2) - 1 + strlen(object_name);
375 len += sizeof(prompt3) - 1;
377 prompt = OPENSSL_malloc(len + 1);
380 OPENSSL_strlcpy(prompt, prompt1, len + 1);
381 OPENSSL_strlcat(prompt, object_desc, len + 1);
382 if (object_name != NULL) {
383 OPENSSL_strlcat(prompt, prompt2, len + 1);
384 OPENSSL_strlcat(prompt, object_name, len + 1);
386 OPENSSL_strlcat(prompt, prompt3, len + 1);
391 void *UI_add_user_data(UI *ui, void *user_data)
393 void *old_data = ui->user_data;
395 if ((ui->flags & UI_FLAG_DUPL_DATA) != 0) {
396 ui->meth->ui_destroy_data(ui, old_data);
399 ui->user_data = user_data;
400 ui->flags &= ~UI_FLAG_DUPL_DATA;
404 int UI_dup_user_data(UI *ui, void *user_data)
406 void *duplicate = NULL;
408 if (ui->meth->ui_duplicate_data == NULL
409 || ui->meth->ui_destroy_data == NULL) {
410 UIerr(UI_F_UI_DUP_USER_DATA, UI_R_USER_DATA_DUPLICATION_UNSUPPORTED);
414 duplicate = ui->meth->ui_duplicate_data(ui, user_data);
415 if (duplicate == NULL) {
416 UIerr(UI_F_UI_DUP_USER_DATA, ERR_R_MALLOC_FAILURE);
420 (void)UI_add_user_data(ui, duplicate);
421 ui->flags |= UI_FLAG_DUPL_DATA;
426 void *UI_get0_user_data(UI *ui)
428 return ui->user_data;
431 const char *UI_get0_result(UI *ui, int i)
434 UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_SMALL);
437 if (i >= sk_UI_STRING_num(ui->strings)) {
438 UIerr(UI_F_UI_GET0_RESULT, UI_R_INDEX_TOO_LARGE);
441 return UI_get0_result_string(sk_UI_STRING_value(ui->strings, i));
444 int UI_get_result_length(UI *ui, int i)
447 UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_SMALL);
450 if (i >= sk_UI_STRING_num(ui->strings)) {
451 UIerr(UI_F_UI_GET_RESULT_LENGTH, UI_R_INDEX_TOO_LARGE);
454 return UI_get_result_string_length(sk_UI_STRING_value(ui->strings, i));
457 static int print_error(const char *str, size_t len, UI *ui)
461 memset(&uis, 0, sizeof(uis));
462 uis.type = UIT_ERROR;
463 uis.out_string = str;
465 if (ui->meth->ui_write_string != NULL
466 && ui->meth->ui_write_string(ui, &uis) <= 0)
471 int UI_process(UI *ui)
474 const char *state = "processing";
476 if (ui->meth->ui_open_session != NULL
477 && ui->meth->ui_open_session(ui) <= 0) {
478 state = "opening session";
483 if (ui->flags & UI_FLAG_PRINT_ERRORS)
484 ERR_print_errors_cb((int (*)(const char *, size_t, void *))
485 print_error, (void *)ui);
487 for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
488 if (ui->meth->ui_write_string != NULL
489 && (ui->meth->ui_write_string(ui,
490 sk_UI_STRING_value(ui->strings, i))
493 state = "writing strings";
499 if (ui->meth->ui_flush != NULL)
500 switch (ui->meth->ui_flush(ui)) {
501 case -1: /* Interrupt/Cancel/something... */
508 default: /* Success */
513 for (i = 0; i < sk_UI_STRING_num(ui->strings); i++) {
514 if (ui->meth->ui_read_string != NULL) {
515 switch (ui->meth->ui_read_string(ui,
516 sk_UI_STRING_value(ui->strings,
518 case -1: /* Interrupt/Cancel/something... */
522 state = "reading strings";
525 default: /* Success */
534 if (ui->meth->ui_close_session != NULL
535 && ui->meth->ui_close_session(ui) <= 0) {
537 state = "closing session";
542 UIerr(UI_F_UI_PROCESS, UI_R_PROCESSING_ERROR);
543 ERR_add_error_data(2, "while ", state);
548 int UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void))
551 UIerr(UI_F_UI_CTRL, ERR_R_PASSED_NULL_PARAMETER);
555 case UI_CTRL_PRINT_ERRORS:
557 int save_flag = ! !(ui->flags & UI_FLAG_PRINT_ERRORS);
559 ui->flags |= UI_FLAG_PRINT_ERRORS;
561 ui->flags &= ~UI_FLAG_PRINT_ERRORS;
564 case UI_CTRL_IS_REDOABLE:
565 return ! !(ui->flags & UI_FLAG_REDOABLE);
569 UIerr(UI_F_UI_CTRL, UI_R_UNKNOWN_CONTROL_COMMAND);
573 int UI_set_ex_data(UI *r, int idx, void *arg)
575 return (CRYPTO_set_ex_data(&r->ex_data, idx, arg));
578 void *UI_get_ex_data(UI *r, int idx)
580 return (CRYPTO_get_ex_data(&r->ex_data, idx));
583 const UI_METHOD *UI_get_method(UI *ui)
588 const UI_METHOD *UI_set_method(UI *ui, const UI_METHOD *meth)
594 UI_METHOD *UI_create_method(const char *name)
596 UI_METHOD *ui_method = NULL;
598 if ((ui_method = OPENSSL_zalloc(sizeof(*ui_method))) == NULL
599 || (ui_method->name = OPENSSL_strdup(name)) == NULL
600 || !CRYPTO_new_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
601 &ui_method->ex_data)) {
603 OPENSSL_free(ui_method->name);
604 OPENSSL_free(ui_method);
605 UIerr(UI_F_UI_CREATE_METHOD, ERR_R_MALLOC_FAILURE);
612 * BIG FSCKING WARNING!!!! If you use this on a statically allocated method
613 * (that is, it hasn't been allocated using UI_create_method(), you deserve
614 * anything Murphy can throw at you and more! You have been warned.
616 void UI_destroy_method(UI_METHOD *ui_method)
618 if (ui_method == NULL)
620 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI_METHOD, ui_method,
621 &ui_method->ex_data);
622 OPENSSL_free(ui_method->name);
623 ui_method->name = NULL;
624 OPENSSL_free(ui_method);
627 int UI_method_set_opener(UI_METHOD *method, int (*opener) (UI *ui))
629 if (method != NULL) {
630 method->ui_open_session = opener;
636 int UI_method_set_writer(UI_METHOD *method,
637 int (*writer) (UI *ui, UI_STRING *uis))
639 if (method != NULL) {
640 method->ui_write_string = writer;
646 int UI_method_set_flusher(UI_METHOD *method, int (*flusher) (UI *ui))
648 if (method != NULL) {
649 method->ui_flush = flusher;
655 int UI_method_set_reader(UI_METHOD *method,
656 int (*reader) (UI *ui, UI_STRING *uis))
658 if (method != NULL) {
659 method->ui_read_string = reader;
665 int UI_method_set_closer(UI_METHOD *method, int (*closer) (UI *ui))
667 if (method != NULL) {
668 method->ui_close_session = closer;
674 int UI_method_set_data_duplicator(UI_METHOD *method,
675 void *(*duplicator) (UI *ui, void *ui_data),
676 void (*destructor)(UI *ui, void *ui_data))
678 if (method != NULL) {
679 method->ui_duplicate_data = duplicator;
680 method->ui_destroy_data = destructor;
686 int UI_method_set_prompt_constructor(UI_METHOD *method,
687 char *(*prompt_constructor) (UI *ui,
693 if (method != NULL) {
694 method->ui_construct_prompt = prompt_constructor;
700 int UI_method_set_ex_data(UI_METHOD *method, int idx, void *data)
702 return CRYPTO_set_ex_data(&method->ex_data, idx, data);
705 int (*UI_method_get_opener(const UI_METHOD *method)) (UI *)
708 return method->ui_open_session;
712 int (*UI_method_get_writer(const UI_METHOD *method)) (UI *, UI_STRING *)
715 return method->ui_write_string;
719 int (*UI_method_get_flusher(const UI_METHOD *method)) (UI *)
722 return method->ui_flush;
726 int (*UI_method_get_reader(const UI_METHOD *method)) (UI *, UI_STRING *)
729 return method->ui_read_string;
733 int (*UI_method_get_closer(const UI_METHOD *method)) (UI *)
736 return method->ui_close_session;
740 char *(*UI_method_get_prompt_constructor(const UI_METHOD *method))
741 (UI *, const char *, const char *)
744 return method->ui_construct_prompt;
748 void *(*UI_method_get_data_duplicator(const UI_METHOD *method)) (UI *, void *)
751 return method->ui_duplicate_data;
755 void (*UI_method_get_data_destructor(const UI_METHOD *method)) (UI *, void *)
758 return method->ui_destroy_data;
762 const void *UI_method_get_ex_data(const UI_METHOD *method, int idx)
764 return CRYPTO_get_ex_data(&method->ex_data, idx);
767 enum UI_string_types UI_get_string_type(UI_STRING *uis)
772 int UI_get_input_flags(UI_STRING *uis)
774 return uis->input_flags;
777 const char *UI_get0_output_string(UI_STRING *uis)
779 return uis->out_string;
782 const char *UI_get0_action_string(UI_STRING *uis)
786 return uis->_.boolean_data.action_desc;
797 const char *UI_get0_result_string(UI_STRING *uis)
802 return uis->result_buf;
812 int UI_get_result_string_length(UI_STRING *uis)
817 return uis->result_len;
827 const char *UI_get0_test_string(UI_STRING *uis)
831 return uis->_.string_data.test_buf;
842 int UI_get_result_minsize(UI_STRING *uis)
847 return uis->_.string_data.result_minsize;
857 int UI_get_result_maxsize(UI_STRING *uis)
862 return uis->_.string_data.result_maxsize;
872 int UI_set_result(UI *ui, UI_STRING *uis, const char *result)
876 * This is placed here solely to preserve UI_F_UI_SET_RESULT
877 * To be removed for OpenSSL 1.2.0
879 UIerr(UI_F_UI_SET_RESULT, ERR_R_DISABLED);
881 return UI_set_result_ex(ui, uis, result, strlen(result));
884 int UI_set_result_ex(UI *ui, UI_STRING *uis, const char *result, int len)
886 ui->flags &= ~UI_FLAG_REDOABLE;
892 char number1[DECIMAL_SIZE(uis->_.string_data.result_minsize) + 1];
893 char number2[DECIMAL_SIZE(uis->_.string_data.result_maxsize) + 1];
895 BIO_snprintf(number1, sizeof(number1), "%d",
896 uis->_.string_data.result_minsize);
897 BIO_snprintf(number2, sizeof(number2), "%d",
898 uis->_.string_data.result_maxsize);
900 if (len < uis->_.string_data.result_minsize) {
901 ui->flags |= UI_FLAG_REDOABLE;
902 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_SMALL);
903 ERR_add_error_data(5, "You must type in ",
904 number1, " to ", number2, " characters");
907 if (len > uis->_.string_data.result_maxsize) {
908 ui->flags |= UI_FLAG_REDOABLE;
909 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_RESULT_TOO_LARGE);
910 ERR_add_error_data(5, "You must type in ",
911 number1, " to ", number2, " characters");
916 if (uis->result_buf == NULL) {
917 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
921 memcpy(uis->result_buf, result, len);
922 if (len <= uis->_.string_data.result_maxsize)
923 uis->result_buf[len] = '\0';
924 uis->result_len = len;
930 if (uis->result_buf == NULL) {
931 UIerr(UI_F_UI_SET_RESULT_EX, UI_R_NO_RESULT_BUFFER);
935 uis->result_buf[0] = '\0';
936 for (p = result; *p; p++) {
937 if (strchr(uis->_.boolean_data.ok_chars, *p)) {
938 uis->result_buf[0] = uis->_.boolean_data.ok_chars[0];
941 if (strchr(uis->_.boolean_data.cancel_chars, *p)) {
942 uis->result_buf[0] = uis->_.boolean_data.cancel_chars[0];