view common/strhelp.c @ 248:9f0865dc8b14

Add accessor to check if the certificate should be installed
author Andre Heinecke <aheinecke@intevation.de>
date Mon, 31 Mar 2014 08:03:20 +0000
parents 4def8b263dd3
children c596568fa45b
line wrap: on
line source
#include <ctype.h>
#include <stdbool.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <assert.h>

#include <polarssl/base64.h>

/* Remarks regarding the "Flawfinder: ignore" comments in this file:
 *
 * - strlen:
 *
 *   It's true that strlen might crash if input is not null
 *   terminated.  But by design there is not safe way to get the
 *   length of an string in C, and defining an additional length
 *   parameter for string parameter will only transfere the problem to
 *   the caller.
 */

static void
out_of_core(void)
{
    fputs("\nfatal: out of memory\n", stderr);
    exit(2);
}
void *
xmalloc( size_t n )
{
    void *p = malloc( n );
    if( !p )
        out_of_core();
    return p;
}

void *
xrealloc( void *a, size_t n )
{
    void *p = realloc( a, n );
    if( !p )
        out_of_core();
    return p;
}

char *
xstrndup( const char *string, const size_t len )
{
    char *p = xmalloc( len + 1 );
    memcpy( p, string, len );
    p[len] = '\0';
    return p;
}

unsigned int
strv_length (char **str_array)
{
    unsigned int i = 0;

    if (!str_array)
        return 0;

    while (str_array[i])
        ++i;

    return i;
}

void strv_append (char ***pArray, const char *string, const size_t len)
{
    unsigned int old_len = 0;

    if (!*pArray) {
        *pArray = xmalloc(2 * sizeof(char*));
        (*pArray)[0] = xstrndup(string, len);
        (*pArray)[1] = NULL;
        return;
    }
    old_len = strv_length(*pArray);
    *pArray = xrealloc(*pArray, sizeof(char**) * (old_len + 2));

    (*pArray)[old_len] = xstrndup(string, len);
    (*pArray)[old_len + 1] = NULL;
}

void
str_append_str(char **pDst, size_t *dst_len, const char *appendage, const size_t len)
{
    if (!appendage)
        return;

    if (!(*pDst)) {
        *pDst = xstrndup(appendage, len);
        *dst_len = len;
    } else {
        size_t new_size = (*dst_len) + len + 1;
        char *p_old = *pDst;
        *pDst = xmalloc(new_size);
        strncpy(*pDst, p_old, *dst_len);
        strncpy(*pDst + *dst_len, appendage, len);
        *dst_len = new_size - 1;
        (*pDst)[*dst_len] = '\0';
        free (p_old);
    }
}

void
strv_free (char **str_array)
{
  if (str_array)
    {
      int i;

      for (i = 0; str_array[i] != NULL; i++)
        free (str_array[i]);

      free (str_array);
    }
}

bool
str_equal (char *s1, char *s2)
{
  size_t l1 = strlen(s1);       /* Flawfinder: ignore */
  size_t l2 = strlen(s2);       /* Flawfinder: ignore */
  if ((l1 == l2) &&
      (strcmp(s1, s2) == 0))
    return true;
  else
    return false;
}

bool
str_starts_with (char *s1, char *s2)
{
  size_t l2 = strlen(s2);       /* Flawfinder: ignore */
  if (strncmp(s1, s2, l2) == 0)
    return true;
  else
    return false;
}

void
str_trim (char **s)
{
  size_t i;
  if (*s != NULL)
    {
      while (isspace(**s))
        (*s)++;
      i = strlen(*s);           /* Flawfinder: ignore */
      while (isspace((*s)[--i]))
        (*s)[i] = '\0';
    }
}

int str_base64_decode(char **dst, size_t *dst_size, char *src,
                      size_t src_size)
{
    int ret = -1;

    if (!dst || *dst) {
        return -1;
    }

    /* Check the needed size for the buffer */
    ret = base64_decode(NULL, dst_size,
                        (unsigned char *)src, src_size);

    if (ret != 0 && ret != POLARSSL_ERR_BASE64_BUFFER_TOO_SMALL) {
        return ret;
    }

    *dst = xmalloc(*dst_size);
    memset (*dst, 0, *dst_size);

    ret = base64_decode((unsigned char *)*dst, dst_size,
                        (unsigned char *)src, src_size);
    if (ret) {
        free (*dst);
        *dst = NULL;
        *dst_size = 0;
    }
    return ret;
}

http://wald.intevation.org/projects/trustbridge/