xref: /freebsd/crypto/openssl/doc/man3/DEFINE_STACK_OF.pod (revision e71b70530d95c4f34d8bdbd78d1242df1ba4a945)
1*e71b7053SJung-uk Kim=pod
2*e71b7053SJung-uk Kim
3*e71b7053SJung-uk Kim=head1 NAME
4*e71b7053SJung-uk Kim
5*e71b7053SJung-uk KimDEFINE_STACK_OF, DEFINE_STACK_OF_CONST, DEFINE_SPECIAL_STACK_OF,
6*e71b7053SJung-uk KimDEFINE_SPECIAL_STACK_OF_CONST,
7*e71b7053SJung-uk Kimsk_TYPE_num, sk_TYPE_value, sk_TYPE_new, sk_TYPE_new_null,
8*e71b7053SJung-uk Kimsk_TYPE_reserve, sk_TYPE_free, sk_TYPE_zero, sk_TYPE_delete,
9*e71b7053SJung-uk Kimsk_TYPE_delete_ptr, sk_TYPE_push, sk_TYPE_unshift, sk_TYPE_pop,
10*e71b7053SJung-uk Kimsk_TYPE_shift, sk_TYPE_pop_free, sk_TYPE_insert, sk_TYPE_set,
11*e71b7053SJung-uk Kimsk_TYPE_find, sk_TYPE_find_ex, sk_TYPE_sort, sk_TYPE_is_sorted,
12*e71b7053SJung-uk Kimsk_TYPE_dup, sk_TYPE_deep_copy, sk_TYPE_set_cmp_func, sk_TYPE_new_reserve
13*e71b7053SJung-uk Kim- stack container
14*e71b7053SJung-uk Kim
15*e71b7053SJung-uk Kim=head1 SYNOPSIS
16*e71b7053SJung-uk Kim
17*e71b7053SJung-uk Kim=for comment generic
18*e71b7053SJung-uk Kim
19*e71b7053SJung-uk Kim #include <openssl/safestack.h>
20*e71b7053SJung-uk Kim
21*e71b7053SJung-uk Kim STACK_OF(TYPE)
22*e71b7053SJung-uk Kim DEFINE_STACK_OF(TYPE)
23*e71b7053SJung-uk Kim DEFINE_STACK_OF_CONST(TYPE)
24*e71b7053SJung-uk Kim DEFINE_SPECIAL_STACK_OF(FUNCTYPE, TYPE)
25*e71b7053SJung-uk Kim DEFINE_SPECIAL_STACK_OF_CONST(FUNCTYPE, TYPE)
26*e71b7053SJung-uk Kim
27*e71b7053SJung-uk Kim typedef int (*sk_TYPE_compfunc)(const TYPE *const *a, const TYPE *const *b);
28*e71b7053SJung-uk Kim typedef TYPE * (*sk_TYPE_copyfunc)(const TYPE *a);
29*e71b7053SJung-uk Kim typedef void (*sk_TYPE_freefunc)(TYPE *a);
30*e71b7053SJung-uk Kim
31*e71b7053SJung-uk Kim int sk_TYPE_num(const STACK_OF(TYPE) *sk);
32*e71b7053SJung-uk Kim TYPE *sk_TYPE_value(const STACK_OF(TYPE) *sk, int idx);
33*e71b7053SJung-uk Kim STACK_OF(TYPE) *sk_TYPE_new(sk_TYPE_compfunc compare);
34*e71b7053SJung-uk Kim STACK_OF(TYPE) *sk_TYPE_new_null(void);
35*e71b7053SJung-uk Kim int sk_TYPE_reserve(STACK_OF(TYPE) *sk, int n);
36*e71b7053SJung-uk Kim void sk_TYPE_free(const STACK_OF(TYPE) *sk);
37*e71b7053SJung-uk Kim void sk_TYPE_zero(const STACK_OF(TYPE) *sk);
38*e71b7053SJung-uk Kim TYPE *sk_TYPE_delete(STACK_OF(TYPE) *sk, int i);
39*e71b7053SJung-uk Kim TYPE *sk_TYPE_delete_ptr(STACK_OF(TYPE) *sk, TYPE *ptr);
40*e71b7053SJung-uk Kim int sk_TYPE_push(STACK_OF(TYPE) *sk, const TYPE *ptr);
41*e71b7053SJung-uk Kim int sk_TYPE_unshift(STACK_OF(TYPE) *sk, const TYPE *ptr);
42*e71b7053SJung-uk Kim TYPE *sk_TYPE_pop(STACK_OF(TYPE) *sk);
43*e71b7053SJung-uk Kim TYPE *sk_TYPE_shift(STACK_OF(TYPE) *sk);
44*e71b7053SJung-uk Kim void sk_TYPE_pop_free(STACK_OF(TYPE) *sk, sk_TYPE_freefunc freefunc);
45*e71b7053SJung-uk Kim int sk_TYPE_insert(STACK_OF(TYPE) *sk, TYPE *ptr, int idx);
46*e71b7053SJung-uk Kim TYPE *sk_TYPE_set(STACK_OF(TYPE) *sk, int idx, const TYPE *ptr);
47*e71b7053SJung-uk Kim int sk_TYPE_find(STACK_OF(TYPE) *sk, TYPE *ptr);
48*e71b7053SJung-uk Kim int sk_TYPE_find_ex(STACK_OF(TYPE) *sk, TYPE *ptr);
49*e71b7053SJung-uk Kim void sk_TYPE_sort(const STACK_OF(TYPE) *sk);
50*e71b7053SJung-uk Kim int sk_TYPE_is_sorted(const STACK_OF(TYPE) *sk);
51*e71b7053SJung-uk Kim STACK_OF(TYPE) *sk_TYPE_dup(const STACK_OF(TYPE) *sk);
52*e71b7053SJung-uk Kim STACK_OF(TYPE) *sk_TYPE_deep_copy(const STACK_OF(TYPE) *sk,
53*e71b7053SJung-uk Kim                                   sk_TYPE_copyfunc copyfunc,
54*e71b7053SJung-uk Kim                                   sk_TYPE_freefunc freefunc);
55*e71b7053SJung-uk Kim sk_TYPE_compfunc (*sk_TYPE_set_cmp_func(STACK_OF(TYPE) *sk,
56*e71b7053SJung-uk Kim                                         sk_TYPE_compfunc compare));
57*e71b7053SJung-uk Kim STACK_OF(TYPE) *sk_TYPE_new_reserve(sk_TYPE_compfunc compare, int n);
58*e71b7053SJung-uk Kim
59*e71b7053SJung-uk Kim=head1 DESCRIPTION
60*e71b7053SJung-uk Kim
61*e71b7053SJung-uk KimApplications can create and use their own stacks by placing any of the macros
62*e71b7053SJung-uk Kimdescribed below in a header file. These macros define typesafe inline
63*e71b7053SJung-uk Kimfunctions that wrap around the utility B<OPENSSL_sk_> API.
64*e71b7053SJung-uk KimIn the description here, I<TYPE> is used
65*e71b7053SJung-uk Kimas a placeholder for any of the OpenSSL datatypes, such as I<X509>.
66*e71b7053SJung-uk Kim
67*e71b7053SJung-uk KimSTACK_OF() returns the name for a stack of the specified B<TYPE>.
68*e71b7053SJung-uk KimDEFINE_STACK_OF() creates set of functions for a stack of B<TYPE>. This
69*e71b7053SJung-uk Kimwill mean that type B<TYPE> is stored in each stack, the type is referenced by
70*e71b7053SJung-uk KimSTACK_OF(TYPE) and each function name begins with I<sk_TYPE_>. For example:
71*e71b7053SJung-uk Kim
72*e71b7053SJung-uk Kim TYPE *sk_TYPE_value(STACK_OF(TYPE) *sk, int idx);
73*e71b7053SJung-uk Kim
74*e71b7053SJung-uk KimDEFINE_STACK_OF_CONST() is identical to DEFINE_STACK_OF() except
75*e71b7053SJung-uk Kimeach element is constant. For example:
76*e71b7053SJung-uk Kim
77*e71b7053SJung-uk Kim const TYPE *sk_TYPE_value(STACK_OF(TYPE) *sk, int idx);
78*e71b7053SJung-uk Kim
79*e71b7053SJung-uk KimDEFINE_SPECIAL_STACK_OF() defines a stack of B<TYPE> but
80*e71b7053SJung-uk Kimeach function uses B<FUNCNAME> in the function name. For example:
81*e71b7053SJung-uk Kim
82*e71b7053SJung-uk Kim TYPE *sk_FUNCNAME_value(STACK_OF(TYPE) *sk, int idx);
83*e71b7053SJung-uk Kim
84*e71b7053SJung-uk KimDEFINE_SPECIAL_STACK_OF_CONST() is similar except that each element is
85*e71b7053SJung-uk Kimconstant:
86*e71b7053SJung-uk Kim
87*e71b7053SJung-uk Kim const TYPE *sk_FUNCNAME_value(STACK_OF(TYPE) *sk, int idx);
88*e71b7053SJung-uk Kim
89*e71b7053SJung-uk Kimsk_TYPE_num() returns the number of elements in B<sk> or -1 if B<sk> is
90*e71b7053SJung-uk KimB<NULL>.
91*e71b7053SJung-uk Kim
92*e71b7053SJung-uk Kimsk_TYPE_value() returns element B<idx> in B<sk>, where B<idx> starts at
93*e71b7053SJung-uk Kimzero. If B<idx> is out of range then B<NULL> is returned.
94*e71b7053SJung-uk Kim
95*e71b7053SJung-uk Kimsk_TYPE_new() allocates a new empty stack using comparison function B<compare>.
96*e71b7053SJung-uk KimIf B<compare> is B<NULL> then no comparison function is used. This function is
97*e71b7053SJung-uk Kimequivalent to sk_TYPE_new_reserve(compare, 0).
98*e71b7053SJung-uk Kim
99*e71b7053SJung-uk Kimsk_TYPE_new_null() allocates a new empty stack with no comparison function. This
100*e71b7053SJung-uk Kimfunction is equivalent to sk_TYPE_new_reserve(NULL, 0).
101*e71b7053SJung-uk Kim
102*e71b7053SJung-uk Kimsk_TYPE_reserve() allocates additional memory in the B<sk> structure
103*e71b7053SJung-uk Kimsuch that the next B<n> calls to sk_TYPE_insert(), sk_TYPE_push()
104*e71b7053SJung-uk Kimor sk_TYPE_unshift() will not fail or cause memory to be allocated
105*e71b7053SJung-uk Kimor reallocated. If B<n> is zero, any excess space allocated in the
106*e71b7053SJung-uk KimB<sk> structure is freed. On error B<sk> is unchanged.
107*e71b7053SJung-uk Kim
108*e71b7053SJung-uk Kimsk_TYPE_new_reserve() allocates a new stack. The new stack will have additional
109*e71b7053SJung-uk Kimmemory allocated to hold B<n> elements if B<n> is positive. The next B<n> calls
110*e71b7053SJung-uk Kimto sk_TYPE_insert(), sk_TYPE_push() or sk_TYPE_unshift() will not fail or cause
111*e71b7053SJung-uk Kimmemory to be allocated or reallocated. If B<n> is zero or less than zero, no
112*e71b7053SJung-uk Kimmemory is allocated. sk_TYPE_new_reserve() also sets the comparison function
113*e71b7053SJung-uk KimB<compare> to the newly created stack. If B<compare> is B<NULL> then no
114*e71b7053SJung-uk Kimcomparison function is used.
115*e71b7053SJung-uk Kim
116*e71b7053SJung-uk Kimsk_TYPE_set_cmp_func() sets the comparison function of B<sk> to B<compare>.
117*e71b7053SJung-uk KimThe previous comparison function is returned or B<NULL> if there was
118*e71b7053SJung-uk Kimno previous comparison function.
119*e71b7053SJung-uk Kim
120*e71b7053SJung-uk Kimsk_TYPE_free() frees up the B<sk> structure. It does B<not> free up any
121*e71b7053SJung-uk Kimelements of B<sk>. After this call B<sk> is no longer valid.
122*e71b7053SJung-uk Kim
123*e71b7053SJung-uk Kimsk_TYPE_zero() sets the number of elements in B<sk> to zero. It does not free
124*e71b7053SJung-uk KimB<sk> so after this call B<sk> is still valid.
125*e71b7053SJung-uk Kim
126*e71b7053SJung-uk Kimsk_TYPE_pop_free() frees up all elements of B<sk> and B<sk> itself. The
127*e71b7053SJung-uk Kimfree function freefunc() is called on each element to free it.
128*e71b7053SJung-uk Kim
129*e71b7053SJung-uk Kimsk_TYPE_delete() deletes element B<i> from B<sk>. It returns the deleted
130*e71b7053SJung-uk Kimelement or B<NULL> if B<i> is out of range.
131*e71b7053SJung-uk Kim
132*e71b7053SJung-uk Kimsk_TYPE_delete_ptr() deletes element matching B<ptr> from B<sk>. It returns
133*e71b7053SJung-uk Kimthe deleted element or B<NULL> if no element matching B<ptr> was found.
134*e71b7053SJung-uk Kim
135*e71b7053SJung-uk Kimsk_TYPE_insert() inserts B<ptr> into B<sk> at position B<idx>. Any existing
136*e71b7053SJung-uk Kimelements at or after B<idx> are moved downwards. If B<idx> is out of range
137*e71b7053SJung-uk Kimthe new element is appended to B<sk>. sk_TYPE_insert() either returns the
138*e71b7053SJung-uk Kimnumber of elements in B<sk> after the new element is inserted or zero if
139*e71b7053SJung-uk Kiman error (such as memory allocation failure) occurred.
140*e71b7053SJung-uk Kim
141*e71b7053SJung-uk Kimsk_TYPE_push() appends B<ptr> to B<sk> it is equivalent to:
142*e71b7053SJung-uk Kim
143*e71b7053SJung-uk Kim sk_TYPE_insert(sk, ptr, -1);
144*e71b7053SJung-uk Kim
145*e71b7053SJung-uk Kimsk_TYPE_unshift() inserts B<ptr> at the start of B<sk> it is equivalent to:
146*e71b7053SJung-uk Kim
147*e71b7053SJung-uk Kim sk_TYPE_insert(sk, ptr, 0);
148*e71b7053SJung-uk Kim
149*e71b7053SJung-uk Kimsk_TYPE_pop() returns and removes the last element from B<sk>.
150*e71b7053SJung-uk Kim
151*e71b7053SJung-uk Kimsk_TYPE_shift() returns and removes the first element from B<sk>.
152*e71b7053SJung-uk Kim
153*e71b7053SJung-uk Kimsk_TYPE_set() sets element B<idx> of B<sk> to B<ptr> replacing the current
154*e71b7053SJung-uk Kimelement. The new element value is returned or B<NULL> if an error occurred:
155*e71b7053SJung-uk Kimthis will only happen if B<sk> is B<NULL> or B<idx> is out of range.
156*e71b7053SJung-uk Kim
157*e71b7053SJung-uk Kimsk_TYPE_find() searches B<sk> for the element B<ptr>.  In the case
158*e71b7053SJung-uk Kimwhere no comparison function has been specified, the function performs
159*e71b7053SJung-uk Kima linear search for a pointer equal to B<ptr>. The index of the first
160*e71b7053SJung-uk Kimmatching element is returned or B<-1> if there is no match. In the case
161*e71b7053SJung-uk Kimwhere a comparison function has been specified, B<sk> is sorted then
162*e71b7053SJung-uk Kimsk_TYPE_find() returns the index of a matching element or B<-1> if there
163*e71b7053SJung-uk Kimis no match. Note that, in this case, the matching element returned is
164*e71b7053SJung-uk Kimnot guaranteed to be the first; the comparison function will usually
165*e71b7053SJung-uk Kimcompare the values pointed to rather than the pointers themselves and
166*e71b7053SJung-uk Kimthe order of elements in B<sk> could change.
167*e71b7053SJung-uk Kim
168*e71b7053SJung-uk Kimsk_TYPE_find_ex() operates like sk_TYPE_find() except when a comparison
169*e71b7053SJung-uk Kimfunction has been specified and no matching element is found. Instead
170*e71b7053SJung-uk Kimof returning B<-1>, sk_TYPE_find_ex() returns the index of the element
171*e71b7053SJung-uk Kimeither before or after the location where B<ptr> would be if it were
172*e71b7053SJung-uk Kimpresent in B<sk>.
173*e71b7053SJung-uk Kim
174*e71b7053SJung-uk Kimsk_TYPE_sort() sorts B<sk> using the supplied comparison function.
175*e71b7053SJung-uk Kim
176*e71b7053SJung-uk Kimsk_TYPE_is_sorted() returns B<1> if B<sk> is sorted and B<0> otherwise.
177*e71b7053SJung-uk Kim
178*e71b7053SJung-uk Kimsk_TYPE_dup() returns a copy of B<sk>. Note the pointers in the copy
179*e71b7053SJung-uk Kimare identical to the original.
180*e71b7053SJung-uk Kim
181*e71b7053SJung-uk Kimsk_TYPE_deep_copy() returns a new stack where each element has been copied.
182*e71b7053SJung-uk KimCopying is performed by the supplied copyfunc() and freeing by freefunc(). The
183*e71b7053SJung-uk Kimfunction freefunc() is only called if an error occurs.
184*e71b7053SJung-uk Kim
185*e71b7053SJung-uk Kim=head1 NOTES
186*e71b7053SJung-uk Kim
187*e71b7053SJung-uk KimCare should be taken when accessing stacks in multi-threaded environments.
188*e71b7053SJung-uk KimAny operation which increases the size of a stack such as sk_TYPE_insert() or
189*e71b7053SJung-uk Kimsk_push() can "grow" the size of an internal array and cause race conditions
190*e71b7053SJung-uk Kimif the same stack is accessed in a different thread. Operations such as
191*e71b7053SJung-uk Kimsk_find() and sk_sort() can also reorder the stack.
192*e71b7053SJung-uk Kim
193*e71b7053SJung-uk KimAny comparison function supplied should use a metric suitable
194*e71b7053SJung-uk Kimfor use in a binary search operation. That is it should return zero, a
195*e71b7053SJung-uk Kimpositive or negative value if B<a> is equal to, greater than
196*e71b7053SJung-uk Kimor less than B<b> respectively.
197*e71b7053SJung-uk Kim
198*e71b7053SJung-uk KimCare should be taken when checking the return values of the functions
199*e71b7053SJung-uk Kimsk_TYPE_find() and sk_TYPE_find_ex(). They return an index to the
200*e71b7053SJung-uk Kimmatching element. In particular B<0> indicates a matching first element.
201*e71b7053SJung-uk KimA failed search is indicated by a B<-1> return value.
202*e71b7053SJung-uk Kim
203*e71b7053SJung-uk KimSTACK_OF(), DEFINE_STACK_OF(), DEFINE_STACK_OF_CONST(), and
204*e71b7053SJung-uk KimDEFINE_SPECIAL_STACK_OF() are implemented as macros.
205*e71b7053SJung-uk Kim
206*e71b7053SJung-uk KimThe underlying utility B<OPENSSL_sk_> API should not be used directly.
207*e71b7053SJung-uk KimIt defines these functions: OPENSSL_sk_deep_copy(),
208*e71b7053SJung-uk KimOPENSSL_sk_delete(), OPENSSL_sk_delete_ptr(), OPENSSL_sk_dup(),
209*e71b7053SJung-uk KimOPENSSL_sk_find(), OPENSSL_sk_find_ex(), OPENSSL_sk_free(),
210*e71b7053SJung-uk KimOPENSSL_sk_insert(), OPENSSL_sk_is_sorted(), OPENSSL_sk_new(),
211*e71b7053SJung-uk KimOPENSSL_sk_new_null(), OPENSSL_sk_num(), OPENSSL_sk_pop(),
212*e71b7053SJung-uk KimOPENSSL_sk_pop_free(), OPENSSL_sk_push(), OPENSSL_sk_reserve(),
213*e71b7053SJung-uk KimOPENSSL_sk_set(), OPENSSL_sk_set_cmp_func(), OPENSSL_sk_shift(),
214*e71b7053SJung-uk KimOPENSSL_sk_sort(), OPENSSL_sk_unshift(), OPENSSL_sk_value(),
215*e71b7053SJung-uk KimOPENSSL_sk_zero().
216*e71b7053SJung-uk Kim
217*e71b7053SJung-uk Kim=head1 RETURN VALUES
218*e71b7053SJung-uk Kim
219*e71b7053SJung-uk Kimsk_TYPE_num() returns the number of elements in the stack or B<-1> if the
220*e71b7053SJung-uk Kimpassed stack is B<NULL>.
221*e71b7053SJung-uk Kim
222*e71b7053SJung-uk Kimsk_TYPE_value() returns a pointer to a stack element or B<NULL> if the
223*e71b7053SJung-uk Kimindex is out of range.
224*e71b7053SJung-uk Kim
225*e71b7053SJung-uk Kimsk_TYPE_new(), sk_TYPE_new_null() and sk_TYPE_new_reserve() return an empty
226*e71b7053SJung-uk Kimstack or B<NULL> if an error occurs.
227*e71b7053SJung-uk Kim
228*e71b7053SJung-uk Kimsk_TYPE_reserve() returns B<1> on successful allocation of the required memory
229*e71b7053SJung-uk Kimor B<0> on error.
230*e71b7053SJung-uk Kim
231*e71b7053SJung-uk Kimsk_TYPE_set_cmp_func() returns the old comparison function or B<NULL> if
232*e71b7053SJung-uk Kimthere was no old comparison function.
233*e71b7053SJung-uk Kim
234*e71b7053SJung-uk Kimsk_TYPE_free(), sk_TYPE_zero(), sk_TYPE_pop_free() and sk_TYPE_sort() do
235*e71b7053SJung-uk Kimnot return values.
236*e71b7053SJung-uk Kim
237*e71b7053SJung-uk Kimsk_TYPE_pop(), sk_TYPE_shift(), sk_TYPE_delete() and sk_TYPE_delete_ptr()
238*e71b7053SJung-uk Kimreturn a pointer to the deleted element or B<NULL> on error.
239*e71b7053SJung-uk Kim
240*e71b7053SJung-uk Kimsk_TYPE_insert(), sk_TYPE_push() and sk_TYPE_unshift() return the total
241*e71b7053SJung-uk Kimnumber of elements in the stack and 0 if an error occurred.
242*e71b7053SJung-uk Kim
243*e71b7053SJung-uk Kimsk_TYPE_set() returns a pointer to the replacement element or B<NULL> on
244*e71b7053SJung-uk Kimerror.
245*e71b7053SJung-uk Kim
246*e71b7053SJung-uk Kimsk_TYPE_find() and sk_TYPE_find_ex() return an index to the found element
247*e71b7053SJung-uk Kimor B<-1> on error.
248*e71b7053SJung-uk Kim
249*e71b7053SJung-uk Kimsk_TYPE_is_sorted() returns B<1> if the stack is sorted and B<0> if it is
250*e71b7053SJung-uk Kimnot.
251*e71b7053SJung-uk Kim
252*e71b7053SJung-uk Kimsk_TYPE_dup() and sk_TYPE_deep_copy() return a pointer to the copy of the
253*e71b7053SJung-uk Kimstack.
254*e71b7053SJung-uk Kim
255*e71b7053SJung-uk Kim=head1 HISTORY
256*e71b7053SJung-uk Kim
257*e71b7053SJung-uk KimBefore OpenSSL 1.1.0, this was implemented via macros and not inline functions
258*e71b7053SJung-uk Kimand was not a public API.
259*e71b7053SJung-uk Kim
260*e71b7053SJung-uk Kimsk_TYPE_reserve() and sk_TYPE_new_reserve() were added in OpenSSL 1.1.1.
261*e71b7053SJung-uk Kim
262*e71b7053SJung-uk Kim=head1 COPYRIGHT
263*e71b7053SJung-uk Kim
264*e71b7053SJung-uk KimCopyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
265*e71b7053SJung-uk Kim
266*e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License").  You may not use
267*e71b7053SJung-uk Kimthis file except in compliance with the License.  You can obtain a copy
268*e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at
269*e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>.
270*e71b7053SJung-uk Kim
271*e71b7053SJung-uk Kim=cut
272