]>
git.saurik.com Git - apple/security.git/blob - AppleCSP/open_ssl/stack/stack.c
2 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
4 * The contents of this file constitute Original Code as defined in and are
5 * subject to the Apple Public Source License Version 1.2 (the 'License').
6 * You may not use this file except in compliance with the License. Please obtain
7 * a copy of the License at http://www.apple.com/publicsource and read it before
10 * This Original Code and all software distributed under the License are
11 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
12 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
13 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
14 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
15 * specific language governing rights and limitations under the License.
19 /* crypto/stack/stack.c */
20 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
21 * All rights reserved.
23 * This package is an SSL implementation written
24 * by Eric Young (eay@cryptsoft.com).
25 * The implementation was written so as to conform with Netscapes SSL.
27 * This library is free for commercial and non-commercial use as long as
28 * the following conditions are aheared to. The following conditions
29 * apply to all code found in this distribution, be it the RC4, RSA,
30 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
31 * included with this distribution is covered by the same copyright terms
32 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
34 * Copyright remains Eric Young's, and as such any Copyright notices in
35 * the code are not to be removed.
36 * If this package is used in a product, Eric Young should be given attribution
37 * as the author of the parts of the library used.
38 * This can be in the form of a textual message at program startup or
39 * in documentation (online or textual) provided with the package.
41 * Redistribution and use in source and binary forms, with or without
42 * modification, are permitted provided that the following conditions
44 * 1. Redistributions of source code must retain the copyright
45 * notice, this list of conditions and the following disclaimer.
46 * 2. Redistributions in binary form must reproduce the above copyright
47 * notice, this list of conditions and the following disclaimer in the
48 * documentation and/or other materials provided with the distribution.
49 * 3. All advertising materials mentioning features or use of this software
50 * must display the following acknowledgement:
51 * "This product includes cryptographic software written by
52 * Eric Young (eay@cryptsoft.com)"
53 * The word 'cryptographic' can be left out if the rouines from the library
54 * being used are not cryptographic related :-).
55 * 4. If you include any Windows specific code (or a derivative thereof) from
56 * the apps directory (application code) you must include an acknowledgement:
57 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
59 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
60 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
63 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71 * The licence and distribution terms for any publically available version or
72 * derivative of this code cannot be changed. i.e. this code cannot simply be
73 * copied and put under another distribution licence
74 * [including the GNU Public Licence.]
78 * Author - Eric Young v 1.0
79 * 1.2 eay 12-Mar-97 - Modified sk_find so that it _DOES_ return the
80 * lowest index for the searched item.
82 * 1.1 eay - Take from netdb and added to SSLeay
84 * 1.0 eay - First version 29/07/92
88 #include <openssl/stack.h>
93 const char *STACK_version
="Stack" OPENSSL_VERSION_PTEXT
;
95 #define FP_ICC (int (*)(const void *,const void *))
98 int (*sk_set_cmp_func(STACK
*sk
, int (*c
)()))(void)
100 int (*old
)()=sk
->comp
;
109 STACK
*sk_dup(STACK
*sk
)
114 if ((ret
=sk_new(sk
->comp
)) == NULL
) goto err
;
115 s
=(char **)Realloc((char *)ret
->data
,
116 (unsigned int)sizeof(char *)*sk
->num_alloc
);
117 if (s
== NULL
) goto err
;
121 memcpy(ret
->data
,sk
->data
,sizeof(char *)*sk
->num
);
122 ret
->sorted
=sk
->sorted
;
123 ret
->num_alloc
=sk
->num_alloc
;
130 STACK
*sk_new(int (*c
)())
135 if ((ret
=(STACK
*)Malloc(sizeof(STACK
))) == NULL
)
137 if ((ret
->data
=(char **)Malloc(sizeof(char *)*MIN_NODES
)) == NULL
)
139 for (i
=0; i
<MIN_NODES
; i
++)
142 ret
->num_alloc
=MIN_NODES
;
152 int sk_insert(STACK
*st
, char *data
, int loc
)
156 if(st
== NULL
) return 0;
157 if (st
->num_alloc
<= st
->num
+1)
159 s
=(char **)Realloc((char *)st
->data
,
160 (unsigned int)sizeof(char *)*st
->num_alloc
*2);
166 if ((loc
>= (int)st
->num
) || (loc
< 0))
167 st
->data
[st
->num
]=data
;
174 t
=(char **)&(st
->data
[1]);
175 for (i
=st
->num
; i
>=loc
; i
--)
178 #ifdef undef /* no memmove on sunos :-( */
179 memmove( (char *)&(st
->data
[loc
+1]),
180 (char *)&(st
->data
[loc
]),
181 sizeof(char *)*(st
->num
-loc
));
190 char *sk_delete_ptr(STACK
*st
, char *p
)
194 for (i
=0; i
<st
->num
; i
++)
195 if (st
->data
[i
] == p
)
196 return(sk_delete(st
,i
));
200 char *sk_delete(STACK
*st
, int loc
)
205 if ((st
== NULL
) || (st
->num
== 0) || (loc
< 0)
206 || (loc
>= st
->num
)) return(NULL
);
209 if (loc
!= st
->num
-1)
212 for (i
=loc
; i
<j
; i
++)
213 st
->data
[i
]=st
->data
[i
+1];
214 /* In theory memcpy is not safe for this
215 * memcpy( &(st->data[loc]),
216 * &(st->data[loc+1]),
217 * sizeof(char *)*(st->num-loc-1));
224 int sk_find(STACK
*st
, char *data
)
229 if(st
== NULL
) return -1;
231 if (st
->comp
== NULL
)
233 for (i
=0; i
<st
->num
; i
++)
234 if (st
->data
[i
] == data
)
239 if (data
== NULL
) return(-1);
240 comp_func
=(int (*)())st
->comp
;
241 r
=(char **)bsearch(&data
,(char *)st
->data
,
242 st
->num
,sizeof(char *),FP_ICC comp_func
);
243 if (r
== NULL
) return(-1);
246 if ((*st
->comp
)(&(st
->data
[i
-1]),&data
) < 0)
251 int sk_push(STACK
*st
, char *data
)
253 return(sk_insert(st
,data
,st
->num
));
256 int sk_unshift(STACK
*st
, char *data
)
258 return(sk_insert(st
,data
,0));
261 char *sk_shift(STACK
*st
)
263 if (st
== NULL
) return(NULL
);
264 if (st
->num
<= 0) return(NULL
);
265 return(sk_delete(st
,0));
268 char *sk_pop(STACK
*st
)
270 if (st
== NULL
) return(NULL
);
271 if (st
->num
<= 0) return(NULL
);
272 return(sk_delete(st
,st
->num
-1));
275 void sk_zero(STACK
*st
)
277 if (st
== NULL
) return;
278 if (st
->num
<= 0) return;
279 memset((char *)st
->data
,0,sizeof(st
->data
)*st
->num
);
283 void sk_pop_free(STACK
*st
, void (*func
)())
287 if (st
== NULL
) return;
288 for (i
=0; i
<st
->num
; i
++)
289 if (st
->data
[i
] != NULL
)
294 void sk_free(STACK
*st
)
296 if (st
== NULL
) return;
297 if (st
->data
!= NULL
) Free(st
->data
);
301 int sk_num(STACK
*st
)
303 if(st
== NULL
) return -1;
307 char *sk_value(STACK
*st
, int i
)
309 if(st
== NULL
) return NULL
;
313 char *sk_set(STACK
*st
, int i
, char *value
)
315 if(st
== NULL
) return NULL
;
316 return (st
->data
[i
] = value
);
319 void sk_sort(STACK
*st
)
325 comp_func
=(int (*)())st
->comp
;
326 qsort(st
->data
,st
->num
,sizeof(char *),FP_ICC comp_func
);