| OLD | NEW |
| (Empty) |
| 1 /* dso_lib.c -*- mode:C; c-file-style: "eay" -*- */ | |
| 2 /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | |
| 3 * project 2000. | |
| 4 */ | |
| 5 /* ==================================================================== | |
| 6 * Copyright (c) 2000 The OpenSSL Project. All rights reserved. | |
| 7 * | |
| 8 * Redistribution and use in source and binary forms, with or without | |
| 9 * modification, are permitted provided that the following conditions | |
| 10 * are met: | |
| 11 * | |
| 12 * 1. Redistributions of source code must retain the above copyright | |
| 13 * notice, this list of conditions and the following disclaimer. | |
| 14 * | |
| 15 * 2. Redistributions in binary form must reproduce the above copyright | |
| 16 * notice, this list of conditions and the following disclaimer in | |
| 17 * the documentation and/or other materials provided with the | |
| 18 * distribution. | |
| 19 * | |
| 20 * 3. All advertising materials mentioning features or use of this | |
| 21 * software must display the following acknowledgment: | |
| 22 * "This product includes software developed by the OpenSSL Project | |
| 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | |
| 24 * | |
| 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
| 26 * endorse or promote products derived from this software without | |
| 27 * prior written permission. For written permission, please contact | |
| 28 * licensing@OpenSSL.org. | |
| 29 * | |
| 30 * 5. Products derived from this software may not be called "OpenSSL" | |
| 31 * nor may "OpenSSL" appear in their names without prior written | |
| 32 * permission of the OpenSSL Project. | |
| 33 * | |
| 34 * 6. Redistributions of any form whatsoever must retain the following | |
| 35 * acknowledgment: | |
| 36 * "This product includes software developed by the OpenSSL Project | |
| 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | |
| 38 * | |
| 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
| 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
| 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
| 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
| 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
| 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
| 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
| 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
| 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
| 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
| 50 * OF THE POSSIBILITY OF SUCH DAMAGE. | |
| 51 * ==================================================================== | |
| 52 * | |
| 53 * This product includes cryptographic software written by Eric Young | |
| 54 * (eay@cryptsoft.com). This product includes software written by Tim | |
| 55 * Hudson (tjh@cryptsoft.com). | |
| 56 * | |
| 57 */ | |
| 58 | |
| 59 #include <stdio.h> | |
| 60 #include <openssl/crypto.h> | |
| 61 #include "cryptlib.h" | |
| 62 #include <openssl/dso.h> | |
| 63 | |
| 64 static DSO_METHOD *default_DSO_meth = NULL; | |
| 65 | |
| 66 DSO *DSO_new(void) | |
| 67 { | |
| 68 return(DSO_new_method(NULL)); | |
| 69 } | |
| 70 | |
| 71 void DSO_set_default_method(DSO_METHOD *meth) | |
| 72 { | |
| 73 default_DSO_meth = meth; | |
| 74 } | |
| 75 | |
| 76 DSO_METHOD *DSO_get_default_method(void) | |
| 77 { | |
| 78 return(default_DSO_meth); | |
| 79 } | |
| 80 | |
| 81 DSO_METHOD *DSO_get_method(DSO *dso) | |
| 82 { | |
| 83 return(dso->meth); | |
| 84 } | |
| 85 | |
| 86 DSO_METHOD *DSO_set_method(DSO *dso, DSO_METHOD *meth) | |
| 87 { | |
| 88 DSO_METHOD *mtmp; | |
| 89 mtmp = dso->meth; | |
| 90 dso->meth = meth; | |
| 91 return(mtmp); | |
| 92 } | |
| 93 | |
| 94 DSO *DSO_new_method(DSO_METHOD *meth) | |
| 95 { | |
| 96 DSO *ret; | |
| 97 | |
| 98 if(default_DSO_meth == NULL) | |
| 99 /* We default to DSO_METH_openssl() which in turn defaults | |
| 100 * to stealing the "best available" method. Will fallback | |
| 101 * to DSO_METH_null() in the worst case. */ | |
| 102 default_DSO_meth = DSO_METHOD_openssl(); | |
| 103 ret = (DSO *)OPENSSL_malloc(sizeof(DSO)); | |
| 104 if(ret == NULL) | |
| 105 { | |
| 106 DSOerr(DSO_F_DSO_NEW_METHOD,ERR_R_MALLOC_FAILURE); | |
| 107 return(NULL); | |
| 108 } | |
| 109 memset(ret, 0, sizeof(DSO)); | |
| 110 ret->meth_data = sk_void_new_null(); | |
| 111 if(ret->meth_data == NULL) | |
| 112 { | |
| 113 /* sk_new doesn't generate any errors so we do */ | |
| 114 DSOerr(DSO_F_DSO_NEW_METHOD,ERR_R_MALLOC_FAILURE); | |
| 115 OPENSSL_free(ret); | |
| 116 return(NULL); | |
| 117 } | |
| 118 if(meth == NULL) | |
| 119 ret->meth = default_DSO_meth; | |
| 120 else | |
| 121 ret->meth = meth; | |
| 122 ret->references = 1; | |
| 123 if((ret->meth->init != NULL) && !ret->meth->init(ret)) | |
| 124 { | |
| 125 OPENSSL_free(ret); | |
| 126 ret=NULL; | |
| 127 } | |
| 128 return(ret); | |
| 129 } | |
| 130 | |
| 131 int DSO_free(DSO *dso) | |
| 132 { | |
| 133 int i; | |
| 134 | |
| 135 if(dso == NULL) | |
| 136 { | |
| 137 DSOerr(DSO_F_DSO_FREE,ERR_R_PASSED_NULL_PARAMETER); | |
| 138 return(0); | |
| 139 } | |
| 140 | |
| 141 i=CRYPTO_add(&dso->references,-1,CRYPTO_LOCK_DSO); | |
| 142 #ifdef REF_PRINT | |
| 143 REF_PRINT("DSO",dso); | |
| 144 #endif | |
| 145 if(i > 0) return(1); | |
| 146 #ifdef REF_CHECK | |
| 147 if(i < 0) | |
| 148 { | |
| 149 fprintf(stderr,"DSO_free, bad reference count\n"); | |
| 150 abort(); | |
| 151 } | |
| 152 #endif | |
| 153 | |
| 154 if((dso->meth->dso_unload != NULL) && !dso->meth->dso_unload(dso)) | |
| 155 { | |
| 156 DSOerr(DSO_F_DSO_FREE,DSO_R_UNLOAD_FAILED); | |
| 157 return(0); | |
| 158 } | |
| 159 | |
| 160 if((dso->meth->finish != NULL) && !dso->meth->finish(dso)) | |
| 161 { | |
| 162 DSOerr(DSO_F_DSO_FREE,DSO_R_FINISH_FAILED); | |
| 163 return(0); | |
| 164 } | |
| 165 | |
| 166 sk_void_free(dso->meth_data); | |
| 167 if(dso->filename != NULL) | |
| 168 OPENSSL_free(dso->filename); | |
| 169 if(dso->loaded_filename != NULL) | |
| 170 OPENSSL_free(dso->loaded_filename); | |
| 171 | |
| 172 OPENSSL_free(dso); | |
| 173 return(1); | |
| 174 } | |
| 175 | |
| 176 int DSO_flags(DSO *dso) | |
| 177 { | |
| 178 return((dso == NULL) ? 0 : dso->flags); | |
| 179 } | |
| 180 | |
| 181 | |
| 182 int DSO_up_ref(DSO *dso) | |
| 183 { | |
| 184 if (dso == NULL) | |
| 185 { | |
| 186 DSOerr(DSO_F_DSO_UP_REF,ERR_R_PASSED_NULL_PARAMETER); | |
| 187 return(0); | |
| 188 } | |
| 189 | |
| 190 CRYPTO_add(&dso->references,1,CRYPTO_LOCK_DSO); | |
| 191 return(1); | |
| 192 } | |
| 193 | |
| 194 DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags) | |
| 195 { | |
| 196 DSO *ret; | |
| 197 int allocated = 0; | |
| 198 | |
| 199 if(dso == NULL) | |
| 200 { | |
| 201 ret = DSO_new_method(meth); | |
| 202 if(ret == NULL) | |
| 203 { | |
| 204 DSOerr(DSO_F_DSO_LOAD,ERR_R_MALLOC_FAILURE); | |
| 205 goto err; | |
| 206 } | |
| 207 allocated = 1; | |
| 208 /* Pass the provided flags to the new DSO object */ | |
| 209 if(DSO_ctrl(ret, DSO_CTRL_SET_FLAGS, flags, NULL) < 0) | |
| 210 { | |
| 211 DSOerr(DSO_F_DSO_LOAD,DSO_R_CTRL_FAILED); | |
| 212 goto err; | |
| 213 } | |
| 214 } | |
| 215 else | |
| 216 ret = dso; | |
| 217 /* Don't load if we're currently already loaded */ | |
| 218 if(ret->filename != NULL) | |
| 219 { | |
| 220 DSOerr(DSO_F_DSO_LOAD,DSO_R_DSO_ALREADY_LOADED); | |
| 221 goto err; | |
| 222 } | |
| 223 /* filename can only be NULL if we were passed a dso that already has | |
| 224 * one set. */ | |
| 225 if(filename != NULL) | |
| 226 if(!DSO_set_filename(ret, filename)) | |
| 227 { | |
| 228 DSOerr(DSO_F_DSO_LOAD,DSO_R_SET_FILENAME_FAILED); | |
| 229 goto err; | |
| 230 } | |
| 231 filename = ret->filename; | |
| 232 if(filename == NULL) | |
| 233 { | |
| 234 DSOerr(DSO_F_DSO_LOAD,DSO_R_NO_FILENAME); | |
| 235 goto err; | |
| 236 } | |
| 237 if(ret->meth->dso_load == NULL) | |
| 238 { | |
| 239 DSOerr(DSO_F_DSO_LOAD,DSO_R_UNSUPPORTED); | |
| 240 /* Make sure we unset the filename on failure, because we use | |
| 241 * this to determine when the DSO has been loaded above. */ | |
| 242 OPENSSL_free(ret->filename); | |
| 243 ret->filename = NULL; | |
| 244 goto err; | |
| 245 } | |
| 246 if(!ret->meth->dso_load(ret)) | |
| 247 { | |
| 248 DSOerr(DSO_F_DSO_LOAD,DSO_R_LOAD_FAILED); | |
| 249 /* Make sure we unset the filename on failure, because we use | |
| 250 * this to determine when the DSO has been loaded above. */ | |
| 251 OPENSSL_free(ret->filename); | |
| 252 ret->filename = NULL; | |
| 253 goto err; | |
| 254 } | |
| 255 /* Load succeeded */ | |
| 256 return(ret); | |
| 257 err: | |
| 258 if(allocated) | |
| 259 DSO_free(ret); | |
| 260 return(NULL); | |
| 261 } | |
| 262 | |
| 263 void *DSO_bind_var(DSO *dso, const char *symname) | |
| 264 { | |
| 265 void *ret = NULL; | |
| 266 | |
| 267 if((dso == NULL) || (symname == NULL)) | |
| 268 { | |
| 269 DSOerr(DSO_F_DSO_BIND_VAR,ERR_R_PASSED_NULL_PARAMETER); | |
| 270 return(NULL); | |
| 271 } | |
| 272 if(dso->meth->dso_bind_var == NULL) | |
| 273 { | |
| 274 DSOerr(DSO_F_DSO_BIND_VAR,DSO_R_UNSUPPORTED); | |
| 275 return(NULL); | |
| 276 } | |
| 277 if((ret = dso->meth->dso_bind_var(dso, symname)) == NULL) | |
| 278 { | |
| 279 DSOerr(DSO_F_DSO_BIND_VAR,DSO_R_SYM_FAILURE); | |
| 280 return(NULL); | |
| 281 } | |
| 282 /* Success */ | |
| 283 return(ret); | |
| 284 } | |
| 285 | |
| 286 DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname) | |
| 287 { | |
| 288 DSO_FUNC_TYPE ret = NULL; | |
| 289 | |
| 290 if((dso == NULL) || (symname == NULL)) | |
| 291 { | |
| 292 DSOerr(DSO_F_DSO_BIND_FUNC,ERR_R_PASSED_NULL_PARAMETER); | |
| 293 return(NULL); | |
| 294 } | |
| 295 if(dso->meth->dso_bind_func == NULL) | |
| 296 { | |
| 297 DSOerr(DSO_F_DSO_BIND_FUNC,DSO_R_UNSUPPORTED); | |
| 298 return(NULL); | |
| 299 } | |
| 300 if((ret = dso->meth->dso_bind_func(dso, symname)) == NULL) | |
| 301 { | |
| 302 DSOerr(DSO_F_DSO_BIND_FUNC,DSO_R_SYM_FAILURE); | |
| 303 return(NULL); | |
| 304 } | |
| 305 /* Success */ | |
| 306 return(ret); | |
| 307 } | |
| 308 | |
| 309 /* I don't really like these *_ctrl functions very much to be perfectly | |
| 310 * honest. For one thing, I think I have to return a negative value for | |
| 311 * any error because possible DSO_ctrl() commands may return values | |
| 312 * such as "size"s that can legitimately be zero (making the standard | |
| 313 * "if(DSO_cmd(...))" form that works almost everywhere else fail at | |
| 314 * odd times. I'd prefer "output" values to be passed by reference and | |
| 315 * the return value as success/failure like usual ... but we conform | |
| 316 * when we must... :-) */ | |
| 317 long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg) | |
| 318 { | |
| 319 if(dso == NULL) | |
| 320 { | |
| 321 DSOerr(DSO_F_DSO_CTRL,ERR_R_PASSED_NULL_PARAMETER); | |
| 322 return(-1); | |
| 323 } | |
| 324 /* We should intercept certain generic commands and only pass control | |
| 325 * to the method-specific ctrl() function if it's something we don't | |
| 326 * handle. */ | |
| 327 switch(cmd) | |
| 328 { | |
| 329 case DSO_CTRL_GET_FLAGS: | |
| 330 return dso->flags; | |
| 331 case DSO_CTRL_SET_FLAGS: | |
| 332 dso->flags = (int)larg; | |
| 333 return(0); | |
| 334 case DSO_CTRL_OR_FLAGS: | |
| 335 dso->flags |= (int)larg; | |
| 336 return(0); | |
| 337 default: | |
| 338 break; | |
| 339 } | |
| 340 if((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) | |
| 341 { | |
| 342 DSOerr(DSO_F_DSO_CTRL,DSO_R_UNSUPPORTED); | |
| 343 return(-1); | |
| 344 } | |
| 345 return(dso->meth->dso_ctrl(dso,cmd,larg,parg)); | |
| 346 } | |
| 347 | |
| 348 int DSO_set_name_converter(DSO *dso, DSO_NAME_CONVERTER_FUNC cb, | |
| 349 DSO_NAME_CONVERTER_FUNC *oldcb) | |
| 350 { | |
| 351 if(dso == NULL) | |
| 352 { | |
| 353 DSOerr(DSO_F_DSO_SET_NAME_CONVERTER, | |
| 354 ERR_R_PASSED_NULL_PARAMETER); | |
| 355 return(0); | |
| 356 } | |
| 357 if(oldcb) | |
| 358 *oldcb = dso->name_converter; | |
| 359 dso->name_converter = cb; | |
| 360 return(1); | |
| 361 } | |
| 362 | |
| 363 const char *DSO_get_filename(DSO *dso) | |
| 364 { | |
| 365 if(dso == NULL) | |
| 366 { | |
| 367 DSOerr(DSO_F_DSO_GET_FILENAME,ERR_R_PASSED_NULL_PARAMETER); | |
| 368 return(NULL); | |
| 369 } | |
| 370 return(dso->filename); | |
| 371 } | |
| 372 | |
| 373 int DSO_set_filename(DSO *dso, const char *filename) | |
| 374 { | |
| 375 char *copied; | |
| 376 | |
| 377 if((dso == NULL) || (filename == NULL)) | |
| 378 { | |
| 379 DSOerr(DSO_F_DSO_SET_FILENAME,ERR_R_PASSED_NULL_PARAMETER); | |
| 380 return(0); | |
| 381 } | |
| 382 if(dso->loaded_filename) | |
| 383 { | |
| 384 DSOerr(DSO_F_DSO_SET_FILENAME,DSO_R_DSO_ALREADY_LOADED); | |
| 385 return(0); | |
| 386 } | |
| 387 /* We'll duplicate filename */ | |
| 388 copied = OPENSSL_malloc(strlen(filename) + 1); | |
| 389 if(copied == NULL) | |
| 390 { | |
| 391 DSOerr(DSO_F_DSO_SET_FILENAME,ERR_R_MALLOC_FAILURE); | |
| 392 return(0); | |
| 393 } | |
| 394 BUF_strlcpy(copied, filename, strlen(filename) + 1); | |
| 395 if(dso->filename) | |
| 396 OPENSSL_free(dso->filename); | |
| 397 dso->filename = copied; | |
| 398 return(1); | |
| 399 } | |
| 400 | |
| 401 char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2) | |
| 402 { | |
| 403 char *result = NULL; | |
| 404 | |
| 405 if(dso == NULL || filespec1 == NULL) | |
| 406 { | |
| 407 DSOerr(DSO_F_DSO_MERGE,ERR_R_PASSED_NULL_PARAMETER); | |
| 408 return(NULL); | |
| 409 } | |
| 410 if((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) | |
| 411 { | |
| 412 if(dso->merger != NULL) | |
| 413 result = dso->merger(dso, filespec1, filespec2); | |
| 414 else if(dso->meth->dso_merger != NULL) | |
| 415 result = dso->meth->dso_merger(dso, | |
| 416 filespec1, filespec2); | |
| 417 } | |
| 418 return(result); | |
| 419 } | |
| 420 | |
| 421 char *DSO_convert_filename(DSO *dso, const char *filename) | |
| 422 { | |
| 423 char *result = NULL; | |
| 424 | |
| 425 if(dso == NULL) | |
| 426 { | |
| 427 DSOerr(DSO_F_DSO_CONVERT_FILENAME,ERR_R_PASSED_NULL_PARAMETER); | |
| 428 return(NULL); | |
| 429 } | |
| 430 if(filename == NULL) | |
| 431 filename = dso->filename; | |
| 432 if(filename == NULL) | |
| 433 { | |
| 434 DSOerr(DSO_F_DSO_CONVERT_FILENAME,DSO_R_NO_FILENAME); | |
| 435 return(NULL); | |
| 436 } | |
| 437 if((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) | |
| 438 { | |
| 439 if(dso->name_converter != NULL) | |
| 440 result = dso->name_converter(dso, filename); | |
| 441 else if(dso->meth->dso_name_converter != NULL) | |
| 442 result = dso->meth->dso_name_converter(dso, filename); | |
| 443 } | |
| 444 if(result == NULL) | |
| 445 { | |
| 446 result = OPENSSL_malloc(strlen(filename) + 1); | |
| 447 if(result == NULL) | |
| 448 { | |
| 449 DSOerr(DSO_F_DSO_CONVERT_FILENAME, | |
| 450 ERR_R_MALLOC_FAILURE); | |
| 451 return(NULL); | |
| 452 } | |
| 453 BUF_strlcpy(result, filename, strlen(filename) + 1); | |
| 454 } | |
| 455 return(result); | |
| 456 } | |
| 457 | |
| 458 const char *DSO_get_loaded_filename(DSO *dso) | |
| 459 { | |
| 460 if(dso == NULL) | |
| 461 { | |
| 462 DSOerr(DSO_F_DSO_GET_LOADED_FILENAME, | |
| 463 ERR_R_PASSED_NULL_PARAMETER); | |
| 464 return(NULL); | |
| 465 } | |
| 466 return(dso->loaded_filename); | |
| 467 } | |
| 468 | |
| 469 int DSO_pathbyaddr(void *addr,char *path,int sz) | |
| 470 { | |
| 471 DSO_METHOD *meth = default_DSO_meth; | |
| 472 if (meth == NULL) meth = DSO_METHOD_openssl(); | |
| 473 if (meth->pathbyaddr == NULL) | |
| 474 { | |
| 475 DSOerr(DSO_F_DSO_PATHBYADDR,DSO_R_UNSUPPORTED); | |
| 476 return -1; | |
| 477 } | |
| 478 return (*meth->pathbyaddr)(addr,path,sz); | |
| 479 } | |
| 480 | |
| 481 void *DSO_global_lookup(const char *name) | |
| 482 { | |
| 483 DSO_METHOD *meth = default_DSO_meth; | |
| 484 if (meth == NULL) meth = DSO_METHOD_openssl(); | |
| 485 if (meth->globallookup == NULL) | |
| 486 { | |
| 487 DSOerr(DSO_F_DSO_GLOBAL_LOOKUP,DSO_R_UNSUPPORTED); | |
| 488 return NULL; | |
| 489 } | |
| 490 return (*meth->globallookup)(name); | |
| 491 } | |
| OLD | NEW |