]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* crypto/cryptlib.c */ |
19b8d06a | 2 | /* ==================================================================== |
48fc582f | 3 | * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. |
19b8d06a BM |
4 | * |
5 | * Redistribution and use in source and binary forms, with or without | |
6 | * modification, are permitted provided that the following conditions | |
7 | * are met: | |
8 | * | |
9 | * 1. Redistributions of source code must retain the above copyright | |
10 | * notice, this list of conditions and the following disclaimer. | |
11 | * | |
12 | * 2. Redistributions in binary form must reproduce the above copyright | |
13 | * notice, this list of conditions and the following disclaimer in | |
14 | * the documentation and/or other materials provided with the | |
15 | * distribution. | |
16 | * | |
17 | * 3. All advertising materials mentioning features or use of this | |
18 | * software must display the following acknowledgment: | |
19 | * "This product includes software developed by the OpenSSL Project | |
20 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
21 | * | |
22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
23 | * endorse or promote products derived from this software without | |
24 | * prior written permission. For written permission, please contact | |
25 | * openssl-core@openssl.org. | |
26 | * | |
27 | * 5. Products derived from this software may not be called "OpenSSL" | |
28 | * nor may "OpenSSL" appear in their names without prior written | |
29 | * permission of the OpenSSL Project. | |
30 | * | |
31 | * 6. Redistributions of any form whatsoever must retain the following | |
32 | * acknowledgment: | |
33 | * "This product includes software developed by the OpenSSL Project | |
34 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
35 | * | |
36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
48 | * ==================================================================== | |
49 | * | |
50 | * This product includes cryptographic software written by Eric Young | |
51 | * (eay@cryptsoft.com). This product includes software written by Tim | |
52 | * Hudson (tjh@cryptsoft.com). | |
53 | * | |
54 | */ | |
58964a49 | 55 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
56 | * All rights reserved. |
57 | * | |
58 | * This package is an SSL implementation written | |
59 | * by Eric Young (eay@cryptsoft.com). | |
60 | * The implementation was written so as to conform with Netscapes SSL. | |
61 | * | |
62 | * This library is free for commercial and non-commercial use as long as | |
63 | * the following conditions are aheared to. The following conditions | |
64 | * apply to all code found in this distribution, be it the RC4, RSA, | |
65 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
66 | * included with this distribution is covered by the same copyright terms | |
67 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
68 | * | |
69 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
70 | * the code are not to be removed. | |
71 | * If this package is used in a product, Eric Young should be given attribution | |
72 | * as the author of the parts of the library used. | |
73 | * This can be in the form of a textual message at program startup or | |
74 | * in documentation (online or textual) provided with the package. | |
75 | * | |
76 | * Redistribution and use in source and binary forms, with or without | |
77 | * modification, are permitted provided that the following conditions | |
78 | * are met: | |
79 | * 1. Redistributions of source code must retain the copyright | |
80 | * notice, this list of conditions and the following disclaimer. | |
81 | * 2. Redistributions in binary form must reproduce the above copyright | |
82 | * notice, this list of conditions and the following disclaimer in the | |
83 | * documentation and/or other materials provided with the distribution. | |
84 | * 3. All advertising materials mentioning features or use of this software | |
85 | * must display the following acknowledgement: | |
86 | * "This product includes cryptographic software written by | |
87 | * Eric Young (eay@cryptsoft.com)" | |
88 | * The word 'cryptographic' can be left out if the rouines from the library | |
89 | * being used are not cryptographic related :-). | |
90 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
91 | * the apps directory (application code) you must include an acknowledgement: | |
92 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
93 | * | |
94 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
95 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
96 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
97 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
98 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
99 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
100 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
101 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
102 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
103 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
104 | * SUCH DAMAGE. | |
105 | * | |
106 | * The licence and distribution terms for any publically available version or | |
107 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
108 | * copied and put under another distribution licence | |
109 | * [including the GNU Public Licence.] | |
110 | */ | |
e172d60d BM |
111 | /* ==================================================================== |
112 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. | |
113 | * ECDH support in OpenSSL originally developed by | |
114 | * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. | |
115 | */ | |
d02b48c6 | 116 | |
d02b48c6 | 117 | #include "cryptlib.h" |
c7922304 | 118 | #include <openssl/safestack.h> |
d02b48c6 | 119 | |
bc36ee62 | 120 | #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16) |
58964a49 RE |
121 | static double SSLeay_MSVC5_hack=0.0; /* and for VC1.5 */ |
122 | #endif | |
123 | ||
7ef82068 | 124 | DECLARE_STACK_OF(CRYPTO_dynlock) |
c7922304 | 125 | |
d02b48c6 | 126 | /* real #defines in crypto.h, keep these upto date */ |
af32f9fd | 127 | static const char* const lock_names[CRYPTO_NUM_LOCKS] = |
d02b48c6 RE |
128 | { |
129 | "<<ERROR>>", | |
130 | "err", | |
78f79235 | 131 | "ex_data", |
d02b48c6 RE |
132 | "x509", |
133 | "x509_info", | |
134 | "x509_pkey", | |
135 | "x509_crl", | |
136 | "x509_req", | |
137 | "dsa", | |
138 | "rsa", | |
139 | "evp_pkey", | |
140 | "x509_store", | |
141 | "ssl_ctx", | |
142 | "ssl_cert", | |
143 | "ssl_session", | |
d36bcdf5 | 144 | "ssl_sess_cert", |
d02b48c6 | 145 | "ssl", |
e78f1378 | 146 | "ssl_method", |
d02b48c6 | 147 | "rand", |
daba492c | 148 | "rand2", |
d02b48c6 | 149 | "debug_malloc", |
d02b48c6 | 150 | "BIO", |
2a82c7cf BM |
151 | "gethostbyname", |
152 | "getservbyname", | |
153 | "readdir", | |
58964a49 | 154 | "RSA_blinding", |
13066cee | 155 | "dh", |
1f575f1b | 156 | "debug_malloc2", |
9ec0126e | 157 | "dso", |
e73a6965 | 158 | "dynlock", |
5270e702 | 159 | "engine", |
a63d5eaa | 160 | "ui", |
4f85a2e2 BM |
161 | "ecdsa", |
162 | "ec", | |
e172d60d | 163 | "ecdh", |
19b8d06a | 164 | "bn", |
abd22c9c | 165 | "ec_pre_comp", |
9236b5b0 | 166 | "store", |
c40b9bde | 167 | "comp", |
30661b1b DSH |
168 | "fips", |
169 | "fips2", | |
170 | #if CRYPTO_NUM_LOCKS != 41 | |
2a82c7cf | 171 | # error "Inconsistency between crypto.h and cryptlib.c" |
d36bcdf5 | 172 | #endif |
d02b48c6 RE |
173 | }; |
174 | ||
c7922304 RL |
175 | /* This is for applications to allocate new type names in the non-dynamic |
176 | array of lock names. These are numbered with positive numbers. */ | |
c869da88 | 177 | static STACK_OF(OPENSSL_STRING) *app_locks=NULL; |
58964a49 | 178 | |
c7922304 RL |
179 | /* For applications that want a more dynamic way of handling threads, the |
180 | following stack is used. These are externally numbered with negative | |
181 | numbers. */ | |
182 | static STACK_OF(CRYPTO_dynlock) *dyn_locks=NULL; | |
183 | ||
184 | ||
d02b48c6 | 185 | static void (MS_FAR *locking_callback)(int mode,int type, |
48fc582f | 186 | const char *file,int line)=0; |
d02b48c6 | 187 | static int (MS_FAR *add_lock_callback)(int *pointer,int amount, |
48fc582f | 188 | int type,const char *file,int line)=0; |
4c329696 | 189 | #ifndef OPENSSL_NO_DEPRECATED |
48fc582f | 190 | static unsigned long (MS_FAR *id_callback)(void)=0; |
4c329696 GT |
191 | #endif |
192 | static void (MS_FAR *threadid_callback)(CRYPTO_THREADID *)=0; | |
e73a6965 | 193 | static struct CRYPTO_dynlock_value *(MS_FAR *dynlock_create_callback) |
48fc582f | 194 | (const char *file,int line)=0; |
55b7688e | 195 | static void (MS_FAR *dynlock_lock_callback)(int mode, |
48fc582f | 196 | struct CRYPTO_dynlock_value *l, const char *file,int line)=0; |
e73a6965 | 197 | static void (MS_FAR *dynlock_destroy_callback)(struct CRYPTO_dynlock_value *l, |
48fc582f | 198 | const char *file,int line)=0; |
c7922304 | 199 | |
6b691a5c | 200 | int CRYPTO_get_new_lockid(char *name) |
58964a49 RE |
201 | { |
202 | char *str; | |
203 | int i; | |
204 | ||
bc36ee62 | 205 | #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16) |
58964a49 RE |
206 | /* A hack to make Visual C++ 5.0 work correctly when linking as |
207 | * a DLL using /MT. Without this, the application cannot use | |
8711efb4 | 208 | * any floating point printf's. |
58964a49 | 209 | * It also seems to be needed for Visual C 1.5 (win16) */ |
58964a49 RE |
210 | SSLeay_MSVC5_hack=(double)name[0]*(double)name[1]; |
211 | #endif | |
212 | ||
c869da88 | 213 | if ((app_locks == NULL) && ((app_locks=sk_OPENSSL_STRING_new_null()) == NULL)) |
dfeab068 RE |
214 | { |
215 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE); | |
216 | return(0); | |
217 | } | |
58964a49 | 218 | if ((str=BUF_strdup(name)) == NULL) |
c7922304 RL |
219 | { |
220 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE); | |
58964a49 | 221 | return(0); |
c7922304 | 222 | } |
c869da88 | 223 | i=sk_OPENSSL_STRING_push(app_locks,str); |
58964a49 | 224 | if (!i) |
26a3a48d | 225 | OPENSSL_free(str); |
58964a49 RE |
226 | else |
227 | i+=CRYPTO_NUM_LOCKS; /* gap of one :-) */ | |
228 | return(i); | |
229 | } | |
230 | ||
a111306b BM |
231 | int CRYPTO_num_locks(void) |
232 | { | |
233 | return CRYPTO_NUM_LOCKS; | |
234 | } | |
235 | ||
c7922304 RL |
236 | int CRYPTO_get_new_dynlockid(void) |
237 | { | |
238 | int i = 0; | |
239 | CRYPTO_dynlock *pointer = NULL; | |
240 | ||
241 | if (dynlock_create_callback == NULL) | |
242 | { | |
243 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK); | |
244 | return(0); | |
245 | } | |
e73a6965 | 246 | CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); |
c7922304 | 247 | if ((dyn_locks == NULL) |
7ef82068 | 248 | && ((dyn_locks=sk_CRYPTO_dynlock_new_null()) == NULL)) |
c7922304 | 249 | { |
e73a6965 | 250 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); |
c7922304 RL |
251 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); |
252 | return(0); | |
253 | } | |
e73a6965 | 254 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); |
c7922304 | 255 | |
e73a6965 | 256 | pointer = (CRYPTO_dynlock *)OPENSSL_malloc(sizeof(CRYPTO_dynlock)); |
c7922304 RL |
257 | if (pointer == NULL) |
258 | { | |
259 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); | |
260 | return(0); | |
261 | } | |
e73a6965 RL |
262 | pointer->references = 1; |
263 | pointer->data = dynlock_create_callback(__FILE__,__LINE__); | |
264 | if (pointer->data == NULL) | |
265 | { | |
266 | OPENSSL_free(pointer); | |
267 | CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); | |
268 | return(0); | |
269 | } | |
270 | ||
271 | CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); | |
55b7688e RL |
272 | /* First, try to find an existing empty slot */ |
273 | i=sk_CRYPTO_dynlock_find(dyn_locks,NULL); | |
274 | /* If there was none, push, thereby creating a new one */ | |
275 | if (i == -1) | |
442d4230 RL |
276 | /* Since sk_push() returns the number of items on the |
277 | stack, not the location of the pushed item, we need | |
278 | to transform the returned number into a position, | |
279 | by decreasing it. */ | |
280 | i=sk_CRYPTO_dynlock_push(dyn_locks,pointer) - 1; | |
281 | else | |
282 | /* If we found a place with a NULL pointer, put our pointer | |
283 | in it. */ | |
56c7754c | 284 | (void)sk_CRYPTO_dynlock_set(dyn_locks,i,pointer); |
e73a6965 RL |
285 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); |
286 | ||
442d4230 | 287 | if (i == -1) |
e73a6965 RL |
288 | { |
289 | dynlock_destroy_callback(pointer->data,__FILE__,__LINE__); | |
290 | OPENSSL_free(pointer); | |
291 | } | |
c7922304 RL |
292 | else |
293 | i += 1; /* to avoid 0 */ | |
294 | return -i; | |
295 | } | |
296 | ||
297 | void CRYPTO_destroy_dynlockid(int i) | |
298 | { | |
e73a6965 | 299 | CRYPTO_dynlock *pointer = NULL; |
c7922304 RL |
300 | if (i) |
301 | i = -i-1; | |
c7922304 RL |
302 | if (dynlock_destroy_callback == NULL) |
303 | return; | |
e73a6965 RL |
304 | |
305 | CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); | |
306 | ||
307 | if (dyn_locks == NULL || i >= sk_CRYPTO_dynlock_num(dyn_locks)) | |
883b0c22 | 308 | { |
bcbe4e52 | 309 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); |
e73a6965 | 310 | return; |
883b0c22 | 311 | } |
e73a6965 RL |
312 | pointer = sk_CRYPTO_dynlock_value(dyn_locks, i); |
313 | if (pointer != NULL) | |
314 | { | |
315 | --pointer->references; | |
316 | #ifdef REF_CHECK | |
317 | if (pointer->references < 0) | |
318 | { | |
319 | fprintf(stderr,"CRYPTO_destroy_dynlockid, bad reference count\n"); | |
320 | abort(); | |
321 | } | |
322 | else | |
323 | #endif | |
80340f1f | 324 | if (pointer->references <= 0) |
e73a6965 | 325 | { |
56c7754c | 326 | (void)sk_CRYPTO_dynlock_set(dyn_locks, i, NULL); |
e73a6965 RL |
327 | } |
328 | else | |
329 | pointer = NULL; | |
330 | } | |
331 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); | |
332 | ||
333 | if (pointer) | |
95a9fea7 | 334 | { |
e73a6965 | 335 | dynlock_destroy_callback(pointer->data,__FILE__,__LINE__); |
95a9fea7 BM |
336 | OPENSSL_free(pointer); |
337 | } | |
c7922304 RL |
338 | } |
339 | ||
e73a6965 | 340 | struct CRYPTO_dynlock_value *CRYPTO_get_dynlock_value(int i) |
c7922304 | 341 | { |
e73a6965 | 342 | CRYPTO_dynlock *pointer = NULL; |
c7922304 RL |
343 | if (i) |
344 | i = -i-1; | |
e73a6965 RL |
345 | |
346 | CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); | |
347 | ||
348 | if (dyn_locks != NULL && i < sk_CRYPTO_dynlock_num(dyn_locks)) | |
349 | pointer = sk_CRYPTO_dynlock_value(dyn_locks, i); | |
350 | if (pointer) | |
351 | pointer->references++; | |
352 | ||
353 | CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); | |
354 | ||
355 | if (pointer) | |
356 | return pointer->data; | |
357 | return NULL; | |
c7922304 RL |
358 | } |
359 | ||
55b7688e RL |
360 | struct CRYPTO_dynlock_value *(*CRYPTO_get_dynlock_create_callback(void)) |
361 | (const char *file,int line) | |
d02b48c6 | 362 | { |
55b7688e | 363 | return(dynlock_create_callback); |
d02b48c6 RE |
364 | } |
365 | ||
e73a6965 RL |
366 | void (*CRYPTO_get_dynlock_lock_callback(void))(int mode, |
367 | struct CRYPTO_dynlock_value *l, const char *file,int line) | |
c7922304 | 368 | { |
55b7688e RL |
369 | return(dynlock_lock_callback); |
370 | } | |
371 | ||
372 | void (*CRYPTO_get_dynlock_destroy_callback(void)) | |
373 | (struct CRYPTO_dynlock_value *l, const char *file,int line) | |
374 | { | |
375 | return(dynlock_destroy_callback); | |
376 | } | |
377 | ||
378 | void CRYPTO_set_dynlock_create_callback(struct CRYPTO_dynlock_value *(*func) | |
379 | (const char *file, int line)) | |
380 | { | |
381 | dynlock_create_callback=func; | |
382 | } | |
383 | ||
384 | void CRYPTO_set_dynlock_lock_callback(void (*func)(int mode, | |
385 | struct CRYPTO_dynlock_value *l, const char *file, int line)) | |
386 | { | |
387 | dynlock_lock_callback=func; | |
388 | } | |
389 | ||
390 | void CRYPTO_set_dynlock_destroy_callback(void (*func) | |
391 | (struct CRYPTO_dynlock_value *l, const char *file, int line)) | |
392 | { | |
393 | dynlock_destroy_callback=func; | |
394 | } | |
395 | ||
396 | ||
397 | void (*CRYPTO_get_locking_callback(void))(int mode,int type,const char *file, | |
398 | int line) | |
399 | { | |
400 | return(locking_callback); | |
c7922304 RL |
401 | } |
402 | ||
e778802f BL |
403 | int (*CRYPTO_get_add_lock_callback(void))(int *num,int mount,int type, |
404 | const char *file,int line) | |
d02b48c6 RE |
405 | { |
406 | return(add_lock_callback); | |
407 | } | |
408 | ||
e778802f BL |
409 | void CRYPTO_set_locking_callback(void (*func)(int mode,int type, |
410 | const char *file,int line)) | |
d02b48c6 RE |
411 | { |
412 | locking_callback=func; | |
413 | } | |
414 | ||
e778802f BL |
415 | void CRYPTO_set_add_lock_callback(int (*func)(int *num,int mount,int type, |
416 | const char *file,int line)) | |
d02b48c6 RE |
417 | { |
418 | add_lock_callback=func; | |
419 | } | |
420 | ||
4c329696 GT |
421 | /* the memset() here and in set_pointer() seem overkill, but for the sake of |
422 | * CRYPTO_THREADID_cmp() this avoids any platform silliness that might cause two | |
423 | * "equal" THREADID structs to not be memcmp()-identical. */ | |
424 | void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val) | |
425 | { | |
426 | memset(id, 0, sizeof(*id)); | |
427 | id->val = val; | |
428 | } | |
429 | ||
430 | static const unsigned char hash_coeffs[] = { 3, 5, 7, 11, 13, 17, 19, 23 }; | |
431 | void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr) | |
432 | { | |
433 | unsigned char *dest = (void *)&id->val; | |
434 | unsigned int accum = 0; | |
435 | unsigned char dnum = sizeof(id->val); | |
436 | ||
437 | memset(id, 0, sizeof(*id)); | |
438 | id->ptr = ptr; | |
439 | if (sizeof(id->val) >= sizeof(id->ptr)) | |
440 | { | |
441 | /* 'ptr' can be embedded in 'val' without loss of uniqueness */ | |
442 | id->val = (unsigned long)id->ptr; | |
443 | return; | |
444 | } | |
445 | /* hash ptr ==> val. Each byte of 'val' gets the mod-256 total of a | |
446 | * linear function over the bytes in 'ptr', the co-efficients of which | |
447 | * are a sequence of low-primes (hash_coeffs is an 8-element cycle) - | |
448 | * the starting prime for the sequence varies for each byte of 'val' | |
449 | * (unique polynomials unless pointers are >64-bit). For added spice, | |
450 | * the totals accumulate rather than restarting from zero, and the index | |
451 | * of the 'val' byte is added each time (position dependence). If I was | |
452 | * a black-belt, I'd scan big-endian pointers in reverse to give | |
453 | * low-order bits more play, but this isn't crypto and I'd prefer nobody | |
454 | * mistake it as such. Plus I'm lazy. */ | |
455 | while (dnum--) | |
456 | { | |
457 | const unsigned char *src = (void *)&id->ptr; | |
458 | unsigned char snum = sizeof(id->ptr); | |
459 | while (snum--) | |
460 | accum += *(src++) * hash_coeffs[(snum + dnum) & 7]; | |
461 | accum += dnum; | |
462 | *(dest++) = accum & 255; | |
463 | } | |
464 | } | |
465 | ||
466 | int CRYPTO_THREADID_set_callback(void (*func)(CRYPTO_THREADID *)) | |
467 | { | |
468 | if (threadid_callback) | |
469 | return 0; | |
470 | threadid_callback = func; | |
471 | return 1; | |
472 | } | |
473 | ||
474 | void (*CRYPTO_THREADID_get_callback(void))(CRYPTO_THREADID *) | |
475 | { | |
476 | return threadid_callback; | |
477 | } | |
478 | ||
479 | void CRYPTO_THREADID_current(CRYPTO_THREADID *id) | |
480 | { | |
481 | if (threadid_callback) | |
482 | { | |
483 | threadid_callback(id); | |
484 | return; | |
485 | } | |
486 | #ifndef OPENSSL_NO_DEPRECATED | |
487 | /* If the deprecated callback was set, fall back to that */ | |
488 | if (id_callback) | |
489 | { | |
490 | CRYPTO_THREADID_set_numeric(id, id_callback()); | |
491 | return; | |
492 | } | |
493 | #endif | |
494 | /* Else pick a backup */ | |
495 | #ifdef OPENSSL_SYS_WIN16 | |
496 | CRYPTO_THREADID_set_numeric(id, (unsigned long)GetCurrentTask()); | |
497 | #elif defined(OPENSSL_SYS_WIN32) | |
498 | CRYPTO_THREADID_set_numeric(id, (unsigned long)GetCurrentThreadId()); | |
499 | #elif defined(OPENSSL_SYS_BEOS) | |
500 | CRYPTO_THREADID_set_numeric(id, (unsigned long)find_thread(NULL)); | |
501 | #else | |
502 | /* For everything else, default to using the address of 'errno' */ | |
503 | CRYPTO_THREADID_set_pointer(id, &errno); | |
504 | #endif | |
505 | } | |
506 | ||
507 | int CRYPTO_THREADID_cmp(const CRYPTO_THREADID *a, const CRYPTO_THREADID *b) | |
508 | { | |
509 | return memcmp(a, b, sizeof(*a)); | |
510 | } | |
511 | ||
512 | void CRYPTO_THREADID_cpy(CRYPTO_THREADID *dest, const CRYPTO_THREADID *src) | |
513 | { | |
514 | memcpy(dest, src, sizeof(*src)); | |
515 | } | |
516 | ||
517 | unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id) | |
518 | { | |
519 | return id->val; | |
520 | } | |
521 | ||
522 | #ifndef OPENSSL_NO_DEPRECATED | |
5f834ab1 | 523 | unsigned long (*CRYPTO_get_id_callback(void))(void) |
f7ccba3e | 524 | { |
5f834ab1 | 525 | return(id_callback); |
f7ccba3e GT |
526 | } |
527 | ||
5f834ab1 | 528 | void CRYPTO_set_id_callback(unsigned long (*func)(void)) |
f7ccba3e | 529 | { |
5f834ab1 | 530 | id_callback=func; |
f7ccba3e GT |
531 | } |
532 | ||
6b691a5c | 533 | unsigned long CRYPTO_thread_id(void) |
d02b48c6 RE |
534 | { |
535 | unsigned long ret=0; | |
536 | ||
537 | if (id_callback == NULL) | |
538 | { | |
bc36ee62 | 539 | #ifdef OPENSSL_SYS_WIN16 |
d02b48c6 | 540 | ret=(unsigned long)GetCurrentTask(); |
bc36ee62 | 541 | #elif defined(OPENSSL_SYS_WIN32) |
d02b48c6 | 542 | ret=(unsigned long)GetCurrentThreadId(); |
a7c5241f | 543 | #elif defined(GETPID_IS_MEANINGLESS) |
d02b48c6 | 544 | ret=1L; |
4700aea9 UM |
545 | #elif defined(OPENSSL_SYS_BEOS) |
546 | ret=(unsigned long)find_thread(NULL); | |
d02b48c6 RE |
547 | #else |
548 | ret=(unsigned long)getpid(); | |
549 | #endif | |
550 | } | |
551 | else | |
552 | ret=id_callback(); | |
553 | return(ret); | |
554 | } | |
4c329696 | 555 | #endif |
48fc582f | 556 | |
6b691a5c | 557 | void CRYPTO_lock(int mode, int type, const char *file, int line) |
d02b48c6 RE |
558 | { |
559 | #ifdef LOCK_DEBUG | |
560 | { | |
4c329696 | 561 | CRYPTO_THREADID id; |
d02b48c6 RE |
562 | char *rw_text,*operation_text; |
563 | ||
564 | if (mode & CRYPTO_LOCK) | |
565 | operation_text="lock "; | |
566 | else if (mode & CRYPTO_UNLOCK) | |
567 | operation_text="unlock"; | |
568 | else | |
569 | operation_text="ERROR "; | |
570 | ||
571 | if (mode & CRYPTO_READ) | |
572 | rw_text="r"; | |
573 | else if (mode & CRYPTO_WRITE) | |
574 | rw_text="w"; | |
575 | else | |
576 | rw_text="ERROR"; | |
577 | ||
4c329696 GT |
578 | CRYPTO_THREADID_current(&id); |
579 | fprintf(stderr,"lock:%08lx:(%s)%s %-18s %s:%d\n", | |
580 | CRYPTO_THREADID_hash(&id), rw_text, operation_text, | |
d02b48c6 RE |
581 | CRYPTO_get_lock_name(type), file, line); |
582 | } | |
583 | #endif | |
c7922304 RL |
584 | if (type < 0) |
585 | { | |
0f7efbc8 DSH |
586 | if (dynlock_lock_callback != NULL) |
587 | { | |
588 | struct CRYPTO_dynlock_value *pointer | |
589 | = CRYPTO_get_dynlock_value(type); | |
590 | ||
591 | OPENSSL_assert(pointer != NULL); | |
592 | ||
593 | dynlock_lock_callback(mode, pointer, file, line); | |
594 | ||
595 | CRYPTO_destroy_dynlockid(type); | |
596 | } | |
c7922304 RL |
597 | } |
598 | else | |
599 | if (locking_callback != NULL) | |
600 | locking_callback(mode,type,file,line); | |
d02b48c6 RE |
601 | } |
602 | ||
6b691a5c UM |
603 | int CRYPTO_add_lock(int *pointer, int amount, int type, const char *file, |
604 | int line) | |
d02b48c6 | 605 | { |
c7922304 | 606 | int ret = 0; |
d02b48c6 RE |
607 | |
608 | if (add_lock_callback != NULL) | |
609 | { | |
610 | #ifdef LOCK_DEBUG | |
611 | int before= *pointer; | |
612 | #endif | |
613 | ||
e73a6965 | 614 | ret=add_lock_callback(pointer,amount,type,file,line); |
d02b48c6 | 615 | #ifdef LOCK_DEBUG |
4c329696 GT |
616 | { |
617 | CRYPTO_THREADID id; | |
618 | CRYPTO_THREADID_current(&id); | |
619 | fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n", | |
620 | CRYPTO_THREADID_hash(&id), before,amount,ret, | |
d02b48c6 RE |
621 | CRYPTO_get_lock_name(type), |
622 | file,line); | |
4c329696 | 623 | } |
d02b48c6 | 624 | #endif |
d02b48c6 RE |
625 | } |
626 | else | |
627 | { | |
628 | CRYPTO_lock(CRYPTO_LOCK|CRYPTO_WRITE,type,file,line); | |
629 | ||
630 | ret= *pointer+amount; | |
631 | #ifdef LOCK_DEBUG | |
4c329696 GT |
632 | { |
633 | CRYPTO_THREADID id; | |
634 | CRYPTO_THREADID_current(&id); | |
635 | fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n", | |
636 | CRYPTO_THREADID_hash(&id), | |
5f834ab1 | 637 | *pointer,amount,ret, |
d02b48c6 RE |
638 | CRYPTO_get_lock_name(type), |
639 | file,line); | |
4c329696 | 640 | } |
d02b48c6 RE |
641 | #endif |
642 | *pointer=ret; | |
643 | CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_WRITE,type,file,line); | |
644 | } | |
645 | return(ret); | |
646 | } | |
647 | ||
6b691a5c | 648 | const char *CRYPTO_get_lock_name(int type) |
d02b48c6 | 649 | { |
58964a49 | 650 | if (type < 0) |
c7922304 | 651 | return("dynamic"); |
58964a49 RE |
652 | else if (type < CRYPTO_NUM_LOCKS) |
653 | return(lock_names[type]); | |
c869da88 | 654 | else if (type-CRYPTO_NUM_LOCKS > sk_OPENSSL_STRING_num(app_locks)) |
d02b48c6 | 655 | return("ERROR"); |
58964a49 | 656 | else |
c869da88 | 657 | return(sk_OPENSSL_STRING_value(app_locks,type-CRYPTO_NUM_LOCKS)); |
d02b48c6 RE |
658 | } |
659 | ||
959f9b11 AP |
660 | #if defined(__i386) || defined(__i386__) || defined(_M_IX86) || \ |
661 | defined(__INTEL__) || \ | |
e303f55f | 662 | defined(__x86_64) || defined(__x86_64__) || defined(_M_AMD64) || defined(_M_X64) |
14e21f86 | 663 | |
e303f55f AP |
664 | unsigned int OPENSSL_ia32cap_P[2]; |
665 | unsigned int *OPENSSL_ia32cap_loc(void) { return OPENSSL_ia32cap_P; } | |
14e21f86 | 666 | |
ebaec63e | 667 | #if defined(OPENSSL_CPUID_OBJ) && !defined(OPENSSL_NO_ASM) && !defined(I386_ONLY) |
14e21f86 | 668 | #define OPENSSL_CPUID_SETUP |
e303f55f AP |
669 | #if defined(_WIN32) |
670 | typedef unsigned __int64 IA32CAP; | |
e303f55f AP |
671 | #else |
672 | typedef unsigned long long IA32CAP; | |
673 | #endif | |
2b247cf8 | 674 | void OPENSSL_cpuid_setup(void) |
14e21f86 | 675 | { static int trigger=0; |
e303f55f AP |
676 | IA32CAP OPENSSL_ia32_cpuid(void); |
677 | IA32CAP vec; | |
14e21f86 AP |
678 | char *env; |
679 | ||
680 | if (trigger) return; | |
681 | ||
682 | trigger=1; | |
683 | if ((env=getenv("OPENSSL_ia32cap"))) | |
f00fdcd1 AP |
684 | #if defined(_WIN32) |
685 | { if (!sscanf(env,"%I64i",&vec)) vec = strtoul(env,NULL,0); } | |
686 | #else | |
e303f55f | 687 | vec = strtoull(env,NULL,0); |
f00fdcd1 | 688 | #endif |
14e21f86 | 689 | else |
e303f55f AP |
690 | vec = OPENSSL_ia32_cpuid(); |
691 | ||
14e21f86 AP |
692 | /* |
693 | * |(1<<10) sets a reserved bit to signal that variable | |
694 | * was initialized already... This is to avoid interference | |
695 | * with cpuid snippets in ELF .init segment. | |
696 | */ | |
e303f55f AP |
697 | OPENSSL_ia32cap_P[0] = (unsigned int)vec|(1<<10); |
698 | OPENSSL_ia32cap_P[1] = (unsigned int)(vec>>32); | |
14e21f86 AP |
699 | } |
700 | #endif | |
701 | ||
630e4a6e | 702 | #else |
d1417be7 | 703 | unsigned int *OPENSSL_ia32cap_loc(void) { return NULL; } |
14e21f86 | 704 | #endif |
1875e6db | 705 | int OPENSSL_NONPIC_relocated = 0; |
a00e414f | 706 | #if !defined(OPENSSL_CPUID_SETUP) && !defined(OPENSSL_CPUID_OBJ) |
2b247cf8 | 707 | void OPENSSL_cpuid_setup(void) {} |
14e21f86 AP |
708 | #endif |
709 | ||
e1d51de4 | 710 | #if (defined(_WIN32) || defined(__CYGWIN__)) && defined(_WINDLL) |
c7709441 AP |
711 | #ifdef __CYGWIN__ |
712 | /* pick DLL_[PROCESS|THREAD]_[ATTACH|DETACH] definitions */ | |
713 | #include <windows.h> | |
6022fe81 AP |
714 | /* this has side-effect of _WIN32 getting defined, which otherwise |
715 | * is mutually exclusive with __CYGWIN__... */ | |
c7709441 | 716 | #endif |
d02b48c6 RE |
717 | |
718 | /* All we really need to do is remove the 'error' state when a thread | |
719 | * detaches */ | |
720 | ||
00555c2f | 721 | BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, |
6b691a5c | 722 | LPVOID lpvReserved) |
d02b48c6 RE |
723 | { |
724 | switch(fdwReason) | |
725 | { | |
726 | case DLL_PROCESS_ATTACH: | |
14e21f86 | 727 | OPENSSL_cpuid_setup(); |
51d28013 AP |
728 | #if defined(_WIN32_WINNT) |
729 | { | |
730 | IMAGE_DOS_HEADER *dos_header = (IMAGE_DOS_HEADER *)hinstDLL; | |
731 | IMAGE_NT_HEADERS *nt_headers; | |
732 | ||
733 | if (dos_header->e_magic==IMAGE_DOS_SIGNATURE) | |
734 | { | |
735 | nt_headers = (IMAGE_NT_HEADERS *)((char *)dos_header | |
736 | + dos_header->e_lfanew); | |
737 | if (nt_headers->Signature==IMAGE_NT_SIGNATURE && | |
1bf95592 | 738 | hinstDLL!=(HINSTANCE)(nt_headers->OptionalHeader.ImageBase)) |
51d28013 AP |
739 | OPENSSL_NONPIC_relocated=1; |
740 | } | |
741 | } | |
742 | #endif | |
d02b48c6 RE |
743 | break; |
744 | case DLL_THREAD_ATTACH: | |
745 | break; | |
746 | case DLL_THREAD_DETACH: | |
747 | ERR_remove_state(0); | |
748 | break; | |
749 | case DLL_PROCESS_DETACH: | |
750 | break; | |
751 | } | |
752 | return(TRUE); | |
753 | } | |
754 | #endif | |
755 | ||
34c7ff6d | 756 | #if defined(_WIN32) && !defined(__CYGWIN__) |
9f2027e5 | 757 | #include <tchar.h> |
3b58c74c | 758 | #include <signal.h> |
9f2027e5 AP |
759 | |
760 | #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 | |
e476f942 | 761 | int OPENSSL_isservice(void) |
9f2027e5 AP |
762 | { HWINSTA h; |
763 | DWORD len; | |
764 | WCHAR *name; | |
765 | ||
766 | (void)GetDesktopWindow(); /* return value is ignored */ | |
767 | ||
768 | h = GetProcessWindowStation(); | |
769 | if (h==NULL) return -1; | |
770 | ||
771 | if (GetUserObjectInformationW (h,UOI_NAME,NULL,0,&len) || | |
772 | GetLastError() != ERROR_INSUFFICIENT_BUFFER) | |
773 | return -1; | |
774 | ||
775 | if (len>512) return -1; /* paranoia */ | |
776 | len++,len&=~1; /* paranoia */ | |
777 | #ifdef _MSC_VER | |
778 | name=(WCHAR *)_alloca(len+sizeof(WCHAR)); | |
779 | #else | |
780 | name=(WCHAR *)alloca(len+sizeof(WCHAR)); | |
781 | #endif | |
782 | if (!GetUserObjectInformationW (h,UOI_NAME,name,len,&len)) | |
783 | return -1; | |
784 | ||
785 | len++,len&=~1; /* paranoia */ | |
786 | name[len/sizeof(WCHAR)]=L'\0'; /* paranoia */ | |
787 | #if 1 | |
788 | /* This doesn't cover "interactive" services [working with real | |
789 | * WinSta0's] nor programs started non-interactively by Task | |
790 | * Scheduler [those are working with SAWinSta]. */ | |
791 | if (wcsstr(name,L"Service-0x")) return 1; | |
792 | #else | |
793 | /* This covers all non-interactive programs such as services. */ | |
794 | if (!wcsstr(name,L"WinSta0")) return 1; | |
795 | #endif | |
796 | else return 0; | |
797 | } | |
2031eca5 AP |
798 | #else |
799 | int OPENSSL_isservice(void) { return 0; } | |
9f2027e5 AP |
800 | #endif |
801 | ||
9e88c827 | 802 | void OPENSSL_showfatal (const char *fmta,...) |
9f2027e5 | 803 | { va_list ap; |
1bf95592 | 804 | TCHAR buf[256]; |
9e88c827 | 805 | const TCHAR *fmt; |
19bd66fe | 806 | #ifdef STD_ERROR_HANDLE /* what a dirty trick! */ |
9f2027e5 AP |
807 | HANDLE h; |
808 | ||
809 | if ((h=GetStdHandle(STD_ERROR_HANDLE)) != NULL && | |
810 | GetFileType(h)!=FILE_TYPE_UNKNOWN) | |
811 | { /* must be console application */ | |
812 | va_start (ap,fmta); | |
813 | vfprintf (stderr,fmta,ap); | |
814 | va_end (ap); | |
815 | return; | |
816 | } | |
2031eca5 | 817 | #endif |
9f2027e5 AP |
818 | |
819 | if (sizeof(TCHAR)==sizeof(char)) | |
2031eca5 | 820 | fmt=(const TCHAR *)fmta; |
9f2027e5 AP |
821 | else do |
822 | { int keepgoing; | |
823 | size_t len_0=strlen(fmta)+1,i; | |
824 | WCHAR *fmtw; | |
825 | ||
826 | #ifdef _MSC_VER | |
827 | fmtw = (WCHAR *)_alloca (len_0*sizeof(WCHAR)); | |
828 | #else | |
829 | fmtw = (WCHAR *)alloca (len_0*sizeof(WCHAR)); | |
830 | #endif | |
9e88c827 | 831 | if (fmtw == NULL) { fmt=(const TCHAR *)L"no stack?"; break; } |
9f2027e5 AP |
832 | |
833 | #ifndef OPENSSL_NO_MULTIBYTE | |
834 | if (!MultiByteToWideChar(CP_ACP,0,fmta,len_0,fmtw,len_0)) | |
835 | #endif | |
836 | for (i=0;i<len_0;i++) fmtw[i]=(WCHAR)fmta[i]; | |
837 | ||
838 | for (i=0;i<len_0;i++) | |
839 | { if (fmtw[i]==L'%') do | |
840 | { keepgoing=0; | |
841 | switch (fmtw[i+1]) | |
842 | { case L'0': case L'1': case L'2': case L'3': case L'4': | |
843 | case L'5': case L'6': case L'7': case L'8': case L'9': | |
844 | case L'.': case L'*': | |
845 | case L'-': i++; keepgoing=1; break; | |
846 | case L's': fmtw[i+1]=L'S'; break; | |
847 | case L'S': fmtw[i+1]=L's'; break; | |
848 | case L'c': fmtw[i+1]=L'C'; break; | |
849 | case L'C': fmtw[i+1]=L'c'; break; | |
850 | } | |
851 | } while (keepgoing); | |
852 | } | |
9e88c827 | 853 | fmt = (const TCHAR *)fmtw; |
9f2027e5 AP |
854 | } while (0); |
855 | ||
856 | va_start (ap,fmta); | |
857 | _vsntprintf (buf,sizeof(buf)/sizeof(TCHAR)-1,fmt,ap); | |
858 | buf [sizeof(buf)/sizeof(TCHAR)-1] = _T('\0'); | |
859 | va_end (ap); | |
860 | ||
861 | #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 | |
862 | /* this -------------v--- guards NT-specific calls */ | |
a25f33d2 | 863 | if (GetVersion() < 0x80000000 && OPENSSL_isservice() > 0) |
9f2027e5 AP |
864 | { HANDLE h = RegisterEventSource(0,_T("OPENSSL")); |
865 | const TCHAR *pmsg=buf; | |
866 | ReportEvent(h,EVENTLOG_ERROR_TYPE,0,0,0,1,0,&pmsg,0); | |
867 | DeregisterEventSource(h); | |
868 | } | |
869 | else | |
870 | #endif | |
19bd66fe | 871 | MessageBox (NULL,buf,_T("OpenSSL: FATAL"),MB_OK|MB_ICONSTOP); |
9f2027e5 AP |
872 | } |
873 | #else | |
9e88c827 | 874 | void OPENSSL_showfatal (const char *fmta,...) |
9f2027e5 AP |
875 | { va_list ap; |
876 | ||
877 | va_start (ap,fmta); | |
878 | vfprintf (stderr,fmta,ap); | |
879 | va_end (ap); | |
880 | } | |
e476f942 | 881 | int OPENSSL_isservice (void) { return 0; } |
9f2027e5 AP |
882 | #endif |
883 | ||
54a656ef BL |
884 | void OpenSSLDie(const char *file,int line,const char *assertion) |
885 | { | |
9f2027e5 | 886 | OPENSSL_showfatal( |
54a656ef BL |
887 | "%s(%d): OpenSSL internal error, assertion failed: %s\n", |
888 | file,line,assertion); | |
6022fe81 | 889 | #if !defined(_WIN32) || defined(__CYGWIN__) |
54a656ef | 890 | abort(); |
3b58c74c | 891 | #else |
6022fe81 | 892 | /* Win32 abort() customarily shows a dialog, but we just did that... */ |
3b58c74c AP |
893 | raise(SIGABRT); |
894 | _exit(3); | |
895 | #endif | |
54a656ef | 896 | } |
9e88c827 AP |
897 | |
898 | void *OPENSSL_stderr(void) { return stderr; } |