/src/openssl/crypto/dso/dso_lib.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* dso_lib.c */ |
2 | | /* |
3 | | * Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL project |
4 | | * 2000. |
5 | | */ |
6 | | /* ==================================================================== |
7 | | * Copyright (c) 2000 The OpenSSL Project. All rights reserved. |
8 | | * |
9 | | * Redistribution and use in source and binary forms, with or without |
10 | | * modification, are permitted provided that the following conditions |
11 | | * are met: |
12 | | * |
13 | | * 1. Redistributions of source code must retain the above copyright |
14 | | * notice, this list of conditions and the following disclaimer. |
15 | | * |
16 | | * 2. Redistributions in binary form must reproduce the above copyright |
17 | | * notice, this list of conditions and the following disclaimer in |
18 | | * the documentation and/or other materials provided with the |
19 | | * distribution. |
20 | | * |
21 | | * 3. All advertising materials mentioning features or use of this |
22 | | * software must display the following acknowledgment: |
23 | | * "This product includes software developed by the OpenSSL Project |
24 | | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
25 | | * |
26 | | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
27 | | * endorse or promote products derived from this software without |
28 | | * prior written permission. For written permission, please contact |
29 | | * licensing@OpenSSL.org. |
30 | | * |
31 | | * 5. Products derived from this software may not be called "OpenSSL" |
32 | | * nor may "OpenSSL" appear in their names without prior written |
33 | | * permission of the OpenSSL Project. |
34 | | * |
35 | | * 6. Redistributions of any form whatsoever must retain the following |
36 | | * acknowledgment: |
37 | | * "This product includes software developed by the OpenSSL Project |
38 | | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
39 | | * |
40 | | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
41 | | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
42 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
43 | | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
44 | | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
45 | | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
46 | | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
47 | | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
48 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
49 | | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
50 | | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | | * OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | | * ==================================================================== |
53 | | * |
54 | | * This product includes cryptographic software written by Eric Young |
55 | | * (eay@cryptsoft.com). This product includes software written by Tim |
56 | | * Hudson (tjh@cryptsoft.com). |
57 | | * |
58 | | */ |
59 | | |
60 | | #include <stdio.h> |
61 | | #include <openssl/crypto.h> |
62 | | #include "cryptlib.h" |
63 | | #include <openssl/dso.h> |
64 | | |
65 | | static DSO_METHOD *default_DSO_meth = NULL; |
66 | | |
67 | | DSO *DSO_new(void) |
68 | 0 | { |
69 | 0 | return (DSO_new_method(NULL)); |
70 | 0 | } |
71 | | |
72 | | void DSO_set_default_method(DSO_METHOD *meth) |
73 | 0 | { |
74 | 0 | default_DSO_meth = meth; |
75 | 0 | } |
76 | | |
77 | | DSO_METHOD *DSO_get_default_method(void) |
78 | 0 | { |
79 | 0 | return (default_DSO_meth); |
80 | 0 | } |
81 | | |
82 | | DSO_METHOD *DSO_get_method(DSO *dso) |
83 | 0 | { |
84 | 0 | return (dso->meth); |
85 | 0 | } |
86 | | |
87 | | DSO_METHOD *DSO_set_method(DSO *dso, DSO_METHOD *meth) |
88 | 0 | { |
89 | 0 | DSO_METHOD *mtmp; |
90 | 0 | mtmp = dso->meth; |
91 | 0 | dso->meth = meth; |
92 | 0 | return (mtmp); |
93 | 0 | } |
94 | | |
95 | | DSO *DSO_new_method(DSO_METHOD *meth) |
96 | 72 | { |
97 | 72 | DSO *ret; |
98 | | |
99 | 72 | if (default_DSO_meth == NULL) |
100 | | /* |
101 | | * We default to DSO_METH_openssl() which in turn defaults to |
102 | | * stealing the "best available" method. Will fallback to |
103 | | * DSO_METH_null() in the worst case. |
104 | | */ |
105 | 18 | default_DSO_meth = DSO_METHOD_openssl(); |
106 | 72 | ret = (DSO *)OPENSSL_malloc(sizeof(DSO)); |
107 | 72 | if (ret == NULL) { |
108 | 0 | DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE); |
109 | 0 | return (NULL); |
110 | 0 | } |
111 | 72 | memset(ret, 0, sizeof(DSO)); |
112 | 72 | ret->meth_data = sk_void_new_null(); |
113 | 72 | if (ret->meth_data == NULL) { |
114 | | /* sk_new doesn't generate any errors so we do */ |
115 | 0 | DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE); |
116 | 0 | OPENSSL_free(ret); |
117 | 0 | return (NULL); |
118 | 0 | } |
119 | 72 | if (meth == NULL) |
120 | 72 | ret->meth = default_DSO_meth; |
121 | 0 | else |
122 | 0 | ret->meth = meth; |
123 | 72 | ret->references = 1; |
124 | 72 | if ((ret->meth->init != NULL) && !ret->meth->init(ret)) { |
125 | 0 | sk_void_free(ret->meth_data); |
126 | 0 | OPENSSL_free(ret); |
127 | 0 | ret = NULL; |
128 | 0 | } |
129 | 72 | return (ret); |
130 | 72 | } |
131 | | |
132 | | int DSO_free(DSO *dso) |
133 | 72 | { |
134 | 72 | int i; |
135 | | |
136 | 72 | if (dso == NULL) { |
137 | 0 | DSOerr(DSO_F_DSO_FREE, ERR_R_PASSED_NULL_PARAMETER); |
138 | 0 | return (0); |
139 | 0 | } |
140 | | |
141 | 72 | i = CRYPTO_add(&dso->references, -1, CRYPTO_LOCK_DSO); |
142 | | #ifdef REF_PRINT |
143 | | REF_PRINT("DSO", dso); |
144 | | #endif |
145 | 72 | if (i > 0) |
146 | 0 | return (1); |
147 | | #ifdef REF_CHECK |
148 | | if (i < 0) { |
149 | | fprintf(stderr, "DSO_free, bad reference count\n"); |
150 | | abort(); |
151 | | } |
152 | | #endif |
153 | | |
154 | 72 | if ((dso->meth->dso_unload != NULL) && !dso->meth->dso_unload(dso)) { |
155 | 0 | DSOerr(DSO_F_DSO_FREE, DSO_R_UNLOAD_FAILED); |
156 | 0 | return (0); |
157 | 0 | } |
158 | | |
159 | 72 | if ((dso->meth->finish != NULL) && !dso->meth->finish(dso)) { |
160 | 0 | DSOerr(DSO_F_DSO_FREE, DSO_R_FINISH_FAILED); |
161 | 0 | return (0); |
162 | 0 | } |
163 | | |
164 | 72 | sk_void_free(dso->meth_data); |
165 | 72 | if (dso->filename != NULL) |
166 | 72 | OPENSSL_free(dso->filename); |
167 | 72 | if (dso->loaded_filename != NULL) |
168 | 0 | OPENSSL_free(dso->loaded_filename); |
169 | | |
170 | 72 | OPENSSL_free(dso); |
171 | 72 | return (1); |
172 | 72 | } |
173 | | |
174 | | int DSO_flags(DSO *dso) |
175 | 144 | { |
176 | 144 | return ((dso == NULL) ? 0 : dso->flags); |
177 | 144 | } |
178 | | |
179 | | int DSO_up_ref(DSO *dso) |
180 | 0 | { |
181 | 0 | if (dso == NULL) { |
182 | 0 | DSOerr(DSO_F_DSO_UP_REF, ERR_R_PASSED_NULL_PARAMETER); |
183 | 0 | return (0); |
184 | 0 | } |
185 | | |
186 | 0 | CRYPTO_add(&dso->references, 1, CRYPTO_LOCK_DSO); |
187 | 0 | return (1); |
188 | 0 | } |
189 | | |
190 | | DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags) |
191 | 72 | { |
192 | 72 | DSO *ret; |
193 | 72 | int allocated = 0; |
194 | | |
195 | 72 | if (dso == NULL) { |
196 | 72 | ret = DSO_new_method(meth); |
197 | 72 | if (ret == NULL) { |
198 | 0 | DSOerr(DSO_F_DSO_LOAD, ERR_R_MALLOC_FAILURE); |
199 | 0 | goto err; |
200 | 0 | } |
201 | 72 | allocated = 1; |
202 | | /* Pass the provided flags to the new DSO object */ |
203 | 72 | if (DSO_ctrl(ret, DSO_CTRL_SET_FLAGS, flags, NULL) < 0) { |
204 | 0 | DSOerr(DSO_F_DSO_LOAD, DSO_R_CTRL_FAILED); |
205 | 0 | goto err; |
206 | 0 | } |
207 | 72 | } else |
208 | 0 | ret = dso; |
209 | | /* Don't load if we're currently already loaded */ |
210 | 72 | if (ret->filename != NULL) { |
211 | 0 | DSOerr(DSO_F_DSO_LOAD, DSO_R_DSO_ALREADY_LOADED); |
212 | 0 | goto err; |
213 | 0 | } |
214 | | /* |
215 | | * filename can only be NULL if we were passed a dso that already has one |
216 | | * set. |
217 | | */ |
218 | 72 | if (filename != NULL) |
219 | 72 | if (!DSO_set_filename(ret, filename)) { |
220 | 0 | DSOerr(DSO_F_DSO_LOAD, DSO_R_SET_FILENAME_FAILED); |
221 | 0 | goto err; |
222 | 0 | } |
223 | 72 | filename = ret->filename; |
224 | 72 | if (filename == NULL) { |
225 | 0 | DSOerr(DSO_F_DSO_LOAD, DSO_R_NO_FILENAME); |
226 | 0 | goto err; |
227 | 0 | } |
228 | 72 | if (ret->meth->dso_load == NULL) { |
229 | 0 | DSOerr(DSO_F_DSO_LOAD, DSO_R_UNSUPPORTED); |
230 | 0 | goto err; |
231 | 0 | } |
232 | 72 | if (!ret->meth->dso_load(ret)) { |
233 | 72 | DSOerr(DSO_F_DSO_LOAD, DSO_R_LOAD_FAILED); |
234 | 72 | goto err; |
235 | 72 | } |
236 | | /* Load succeeded */ |
237 | 0 | return (ret); |
238 | 72 | err: |
239 | 72 | if (allocated) |
240 | 72 | DSO_free(ret); |
241 | 72 | return (NULL); |
242 | 72 | } |
243 | | |
244 | | void *DSO_bind_var(DSO *dso, const char *symname) |
245 | 0 | { |
246 | 0 | void *ret = NULL; |
247 | |
|
248 | 0 | if ((dso == NULL) || (symname == NULL)) { |
249 | 0 | DSOerr(DSO_F_DSO_BIND_VAR, ERR_R_PASSED_NULL_PARAMETER); |
250 | 0 | return (NULL); |
251 | 0 | } |
252 | 0 | if (dso->meth->dso_bind_var == NULL) { |
253 | 0 | DSOerr(DSO_F_DSO_BIND_VAR, DSO_R_UNSUPPORTED); |
254 | 0 | return (NULL); |
255 | 0 | } |
256 | 0 | if ((ret = dso->meth->dso_bind_var(dso, symname)) == NULL) { |
257 | 0 | DSOerr(DSO_F_DSO_BIND_VAR, DSO_R_SYM_FAILURE); |
258 | 0 | return (NULL); |
259 | 0 | } |
260 | | /* Success */ |
261 | 0 | return (ret); |
262 | 0 | } |
263 | | |
264 | | DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname) |
265 | 0 | { |
266 | 0 | DSO_FUNC_TYPE ret = NULL; |
267 | |
|
268 | 0 | if ((dso == NULL) || (symname == NULL)) { |
269 | 0 | DSOerr(DSO_F_DSO_BIND_FUNC, ERR_R_PASSED_NULL_PARAMETER); |
270 | 0 | return (NULL); |
271 | 0 | } |
272 | 0 | if (dso->meth->dso_bind_func == NULL) { |
273 | 0 | DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_UNSUPPORTED); |
274 | 0 | return (NULL); |
275 | 0 | } |
276 | 0 | if ((ret = dso->meth->dso_bind_func(dso, symname)) == NULL) { |
277 | 0 | DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_SYM_FAILURE); |
278 | 0 | return (NULL); |
279 | 0 | } |
280 | | /* Success */ |
281 | 0 | return (ret); |
282 | 0 | } |
283 | | |
284 | | /* |
285 | | * I don't really like these *_ctrl functions very much to be perfectly |
286 | | * honest. For one thing, I think I have to return a negative value for any |
287 | | * error because possible DSO_ctrl() commands may return values such as |
288 | | * "size"s that can legitimately be zero (making the standard |
289 | | * "if (DSO_cmd(...))" form that works almost everywhere else fail at odd |
290 | | * times. I'd prefer "output" values to be passed by reference and the return |
291 | | * value as success/failure like usual ... but we conform when we must... :-) |
292 | | */ |
293 | | long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg) |
294 | 72 | { |
295 | 72 | if (dso == NULL) { |
296 | 0 | DSOerr(DSO_F_DSO_CTRL, ERR_R_PASSED_NULL_PARAMETER); |
297 | 0 | return (-1); |
298 | 0 | } |
299 | | /* |
300 | | * We should intercept certain generic commands and only pass control to |
301 | | * the method-specific ctrl() function if it's something we don't handle. |
302 | | */ |
303 | 72 | switch (cmd) { |
304 | 0 | case DSO_CTRL_GET_FLAGS: |
305 | 0 | return dso->flags; |
306 | 72 | case DSO_CTRL_SET_FLAGS: |
307 | 72 | dso->flags = (int)larg; |
308 | 72 | return (0); |
309 | 0 | case DSO_CTRL_OR_FLAGS: |
310 | 0 | dso->flags |= (int)larg; |
311 | 0 | return (0); |
312 | 0 | default: |
313 | 0 | break; |
314 | 72 | } |
315 | 0 | if ((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) { |
316 | 0 | DSOerr(DSO_F_DSO_CTRL, DSO_R_UNSUPPORTED); |
317 | 0 | return (-1); |
318 | 0 | } |
319 | 0 | return (dso->meth->dso_ctrl(dso, cmd, larg, parg)); |
320 | 0 | } |
321 | | |
322 | | int DSO_set_name_converter(DSO *dso, DSO_NAME_CONVERTER_FUNC cb, |
323 | | DSO_NAME_CONVERTER_FUNC *oldcb) |
324 | 0 | { |
325 | 0 | if (dso == NULL) { |
326 | 0 | DSOerr(DSO_F_DSO_SET_NAME_CONVERTER, ERR_R_PASSED_NULL_PARAMETER); |
327 | 0 | return (0); |
328 | 0 | } |
329 | 0 | if (oldcb) |
330 | 0 | *oldcb = dso->name_converter; |
331 | 0 | dso->name_converter = cb; |
332 | 0 | return (1); |
333 | 0 | } |
334 | | |
335 | | const char *DSO_get_filename(DSO *dso) |
336 | 0 | { |
337 | 0 | if (dso == NULL) { |
338 | 0 | DSOerr(DSO_F_DSO_GET_FILENAME, ERR_R_PASSED_NULL_PARAMETER); |
339 | 0 | return (NULL); |
340 | 0 | } |
341 | 0 | return (dso->filename); |
342 | 0 | } |
343 | | |
344 | | int DSO_set_filename(DSO *dso, const char *filename) |
345 | 72 | { |
346 | 72 | char *copied; |
347 | | |
348 | 72 | if ((dso == NULL) || (filename == NULL)) { |
349 | 0 | DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_PASSED_NULL_PARAMETER); |
350 | 0 | return (0); |
351 | 0 | } |
352 | 72 | if (dso->loaded_filename) { |
353 | 0 | DSOerr(DSO_F_DSO_SET_FILENAME, DSO_R_DSO_ALREADY_LOADED); |
354 | 0 | return (0); |
355 | 0 | } |
356 | | /* We'll duplicate filename */ |
357 | 72 | copied = OPENSSL_malloc(strlen(filename) + 1); |
358 | 72 | if (copied == NULL) { |
359 | 0 | DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_MALLOC_FAILURE); |
360 | 0 | return (0); |
361 | 0 | } |
362 | 72 | BUF_strlcpy(copied, filename, strlen(filename) + 1); |
363 | 72 | if (dso->filename) |
364 | 0 | OPENSSL_free(dso->filename); |
365 | 72 | dso->filename = copied; |
366 | 72 | return (1); |
367 | 72 | } |
368 | | |
369 | | char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2) |
370 | 0 | { |
371 | 0 | char *result = NULL; |
372 | |
|
373 | 0 | if (dso == NULL || filespec1 == NULL) { |
374 | 0 | DSOerr(DSO_F_DSO_MERGE, ERR_R_PASSED_NULL_PARAMETER); |
375 | 0 | return (NULL); |
376 | 0 | } |
377 | 0 | if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) { |
378 | 0 | if (dso->merger != NULL) |
379 | 0 | result = dso->merger(dso, filespec1, filespec2); |
380 | 0 | else if (dso->meth->dso_merger != NULL) |
381 | 0 | result = dso->meth->dso_merger(dso, filespec1, filespec2); |
382 | 0 | } |
383 | 0 | return (result); |
384 | 0 | } |
385 | | |
386 | | char *DSO_convert_filename(DSO *dso, const char *filename) |
387 | 72 | { |
388 | 72 | char *result = NULL; |
389 | | |
390 | 72 | if (dso == NULL) { |
391 | 0 | DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_PASSED_NULL_PARAMETER); |
392 | 0 | return (NULL); |
393 | 0 | } |
394 | 72 | if (filename == NULL) |
395 | 72 | filename = dso->filename; |
396 | 72 | if (filename == NULL) { |
397 | 0 | DSOerr(DSO_F_DSO_CONVERT_FILENAME, DSO_R_NO_FILENAME); |
398 | 0 | return (NULL); |
399 | 0 | } |
400 | 72 | if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) { |
401 | 72 | if (dso->name_converter != NULL) |
402 | 0 | result = dso->name_converter(dso, filename); |
403 | 72 | else if (dso->meth->dso_name_converter != NULL) |
404 | 72 | result = dso->meth->dso_name_converter(dso, filename); |
405 | 72 | } |
406 | 72 | if (result == NULL) { |
407 | 0 | result = OPENSSL_malloc(strlen(filename) + 1); |
408 | 0 | if (result == NULL) { |
409 | 0 | DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_MALLOC_FAILURE); |
410 | 0 | return (NULL); |
411 | 0 | } |
412 | 0 | BUF_strlcpy(result, filename, strlen(filename) + 1); |
413 | 0 | } |
414 | 72 | return (result); |
415 | 72 | } |
416 | | |
417 | | const char *DSO_get_loaded_filename(DSO *dso) |
418 | 0 | { |
419 | 0 | if (dso == NULL) { |
420 | 0 | DSOerr(DSO_F_DSO_GET_LOADED_FILENAME, ERR_R_PASSED_NULL_PARAMETER); |
421 | 0 | return (NULL); |
422 | 0 | } |
423 | 0 | return (dso->loaded_filename); |
424 | 0 | } |
425 | | |
426 | | int DSO_pathbyaddr(void *addr, char *path, int sz) |
427 | 0 | { |
428 | 0 | DSO_METHOD *meth = default_DSO_meth; |
429 | 0 | if (meth == NULL) |
430 | 0 | meth = DSO_METHOD_openssl(); |
431 | 0 | if (meth->pathbyaddr == NULL) { |
432 | 0 | DSOerr(DSO_F_DSO_PATHBYADDR, DSO_R_UNSUPPORTED); |
433 | 0 | return -1; |
434 | 0 | } |
435 | 0 | return (*meth->pathbyaddr) (addr, path, sz); |
436 | 0 | } |
437 | | |
438 | | void *DSO_global_lookup(const char *name) |
439 | 0 | { |
440 | 0 | DSO_METHOD *meth = default_DSO_meth; |
441 | 0 | if (meth == NULL) |
442 | 0 | meth = DSO_METHOD_openssl(); |
443 | 0 | if (meth->globallookup == NULL) { |
444 | 0 | DSOerr(DSO_F_DSO_GLOBAL_LOOKUP, DSO_R_UNSUPPORTED); |
445 | 0 | return NULL; |
446 | 0 | } |
447 | 0 | return (*meth->globallookup) (name); |
448 | 0 | } |