]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/dso/dso_dl.c
dl_name_converter: Avoid unnecessary overallocation
[thirdparty/openssl.git] / crypto / dso / dso_dl.c
CommitLineData
0f113f3e 1/*
605856d7 2 * Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
8f4fac7f 3 *
b6a34e9a 4 * Licensed under the Apache License 2.0 (the "License"). You may not use
d2e9e320
RS
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8f4fac7f
GT
8 */
9
706457b7 10#include "dso_local.h"
8f4fac7f 11
38186bfd 12#ifdef DSO_DL
8f4fac7f 13
0f113f3e 14# include <dl.h>
8f4fac7f 15
b9e63915 16/* Part of the hack in "dl_load" ... */
0f113f3e 17# define DSO_MAX_TRANSLATED_SIZE 256
b9e63915 18
51c8dc37 19static int dl_load(DSO *dso);
8f4fac7f 20static int dl_unload(DSO *dso);
e9a68cfb 21static DSO_FUNC_TYPE dl_bind_func(DSO *dso, const char *symname);
51c8dc37 22static char *dl_name_converter(DSO *dso, const char *filename);
0f113f3e
MC
23static char *dl_merger(DSO *dso, const char *filespec1,
24 const char *filespec2);
cb6ea61c 25static int dl_pathbyaddr(void *addr, char *path, int sz);
c6cb42e4 26static void *dl_globallookup(const char *name);
8f4fac7f
GT
27
28static DSO_METHOD dso_meth_dl = {
0f113f3e
MC
29 "OpenSSL 'dl' shared library method",
30 dl_load,
31 dl_unload,
0f113f3e 32 dl_bind_func,
0f113f3e
MC
33 NULL, /* ctrl */
34 dl_name_converter,
35 dl_merger,
36 NULL, /* init */
37 NULL, /* finish */
cb6ea61c 38 dl_pathbyaddr,
0f113f3e
MC
39 dl_globallookup
40};
8f4fac7f 41
38186bfd 42DSO_METHOD *DSO_METHOD_openssl(void)
0f113f3e 43{
38186bfd 44 return &dso_meth_dl;
0f113f3e 45}
8f4fac7f 46
0f113f3e
MC
47/*
48 * For this DSO_METHOD, our meth_data STACK will contain; (i) the handle
49 * (shl_t) returned from shl_load(). NB: I checked on HPUX11 and shl_t is
50 * itself a pointer type so the cast is safe.
8f4fac7f
GT
51 */
52
51c8dc37 53static int dl_load(DSO *dso)
0f113f3e
MC
54{
55 shl_t ptr = NULL;
56 /*
57 * We don't do any fancy retries or anything, just take the method's (or
58 * DSO's if it has the callback set) best translation of the
59 * platform-independent filename and try once with that.
60 */
61 char *filename = DSO_convert_filename(dso, NULL);
8f4fac7f 62
0f113f3e 63 if (filename == NULL) {
9311d0c4 64 ERR_raise(ERR_LIB_DSO, DSO_R_NO_FILENAME);
0f113f3e
MC
65 goto err;
66 }
67 ptr = shl_load(filename, BIND_IMMEDIATE |
68 (dso->flags & DSO_FLAG_NO_NAME_TRANSLATION ? 0 :
69 DYNAMIC_PATH), 0L);
70 if (ptr == NULL) {
7d37818d 71 char errbuf[160];
a150f8e1 72
7d37818d 73 if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
a150f8e1
RL
74 ERR_raise_data(ERR_LIB_DSO, DSO_R_LOAD_FAILED,
75 "filename(%s): %s", filename, errbuf);
76 else
77 ERR_raise_data(ERR_LIB_DSO, DSO_R_LOAD_FAILED,
78 "filename(%s): errno %d", filename, errno);
0f113f3e
MC
79 goto err;
80 }
81 if (!sk_push(dso->meth_data, (char *)ptr)) {
9311d0c4 82 ERR_raise(ERR_LIB_DSO, DSO_R_STACK_ERROR);
0f113f3e
MC
83 goto err;
84 }
85 /*
86 * Success, stick the converted filename we've loaded under into the DSO
87 * (it also serves as the indicator that we are currently loaded).
88 */
89 dso->loaded_filename = filename;
208fb891 90 return 1;
0f113f3e
MC
91 err:
92 /* Cleanup! */
b548a1f1 93 OPENSSL_free(filename);
0f113f3e
MC
94 if (ptr != NULL)
95 shl_unload(ptr);
26a7d938 96 return 0;
0f113f3e 97}
8f4fac7f
GT
98
99static int dl_unload(DSO *dso)
0f113f3e
MC
100{
101 shl_t ptr;
102 if (dso == NULL) {
9311d0c4 103 ERR_raise(ERR_LIB_DSO, ERR_R_PASSED_NULL_PARAMETER);
26a7d938 104 return 0;
0f113f3e
MC
105 }
106 if (sk_num(dso->meth_data) < 1)
208fb891 107 return 1;
0f113f3e
MC
108 /* Is this statement legal? */
109 ptr = (shl_t) sk_pop(dso->meth_data);
110 if (ptr == NULL) {
9311d0c4 111 ERR_raise(ERR_LIB_DSO, DSO_R_NULL_HANDLE);
0f113f3e
MC
112 /*
113 * Should push the value back onto the stack in case of a retry.
114 */
115 sk_push(dso->meth_data, (char *)ptr);
26a7d938 116 return 0;
0f113f3e
MC
117 }
118 shl_unload(ptr);
208fb891 119 return 1;
0f113f3e 120}
8f4fac7f 121
e9a68cfb 122static DSO_FUNC_TYPE dl_bind_func(DSO *dso, const char *symname)
0f113f3e
MC
123{
124 shl_t ptr;
125 void *sym;
e9a68cfb 126
0f113f3e 127 if ((dso == NULL) || (symname == NULL)) {
9311d0c4 128 ERR_raise(ERR_LIB_DSO, ERR_R_PASSED_NULL_PARAMETER);
26a7d938 129 return NULL;
0f113f3e
MC
130 }
131 if (sk_num(dso->meth_data) < 1) {
9311d0c4 132 ERR_raise(ERR_LIB_DSO, DSO_R_STACK_ERROR);
26a7d938 133 return NULL;
0f113f3e
MC
134 }
135 ptr = (shl_t) sk_value(dso->meth_data, sk_num(dso->meth_data) - 1);
136 if (ptr == NULL) {
9311d0c4 137 ERR_raise(ERR_LIB_DSO, DSO_R_NULL_HANDLE);
26a7d938 138 return NULL;
0f113f3e
MC
139 }
140 if (shl_findsym(&ptr, symname, TYPE_UNDEFINED, &sym) < 0) {
7d37818d 141 char errbuf[160];
a150f8e1 142
7d37818d 143 if (openssl_strerror_r(errno, errbuf, sizeof(errbuf)))
a150f8e1
RL
144 ERR_raise_data(ERR_LIB_DSO, DSO_R_SYM_FAILURE,
145 "symname(%s): %s", symname, errbuf);
146 else
147 ERR_raise_data(ERR_LIB_DSO, DSO_R_SYM_FAILURE,
148 "symname(%s): errno %d", symname, errno);
26a7d938 149 return NULL;
0f113f3e 150 }
26a7d938 151 return (DSO_FUNC_TYPE)sym;
0f113f3e 152}
8f4fac7f 153
cbecb3ac 154static char *dl_merger(DSO *dso, const char *filespec1, const char *filespec2)
0f113f3e
MC
155{
156 char *merged;
cbecb3ac 157
0f113f3e 158 if (!filespec1 && !filespec2) {
9311d0c4 159 ERR_raise(ERR_LIB_DSO, ERR_R_PASSED_NULL_PARAMETER);
26a7d938 160 return NULL;
0f113f3e
MC
161 }
162 /*
163 * If the first file specification is a rooted path, it rules. same goes
164 * if the second file specification is missing.
165 */
166 if (!filespec2 || filespec1[0] == '/') {
297002a3 167 merged = OPENSSL_strdup(filespec1);
90945fa3 168 if (merged == NULL) {
9311d0c4 169 ERR_raise(ERR_LIB_DSO, ERR_R_MALLOC_FAILURE);
26a7d938 170 return NULL;
0f113f3e 171 }
0f113f3e
MC
172 }
173 /*
174 * If the first file specification is missing, the second one rules.
175 */
176 else if (!filespec1) {
297002a3 177 merged = OPENSSL_strdup(filespec2);
90945fa3 178 if (merged == NULL) {
9311d0c4 179 ERR_raise(ERR_LIB_DSO, ERR_R_MALLOC_FAILURE);
26a7d938 180 return NULL;
0f113f3e 181 }
0f113f3e
MC
182 } else
183 /*
184 * This part isn't as trivial as it looks. It assumes that the
185 * second file specification really is a directory, and makes no
186 * checks whatsoever. Therefore, the result becomes the
187 * concatenation of filespec2 followed by a slash followed by
188 * filespec1.
189 */
190 {
191 int spec2len, len;
cbecb3ac 192
0f113f3e
MC
193 spec2len = (filespec2 ? strlen(filespec2) : 0);
194 len = spec2len + (filespec1 ? strlen(filespec1) : 0);
cbecb3ac 195
947f9da1 196 if (spec2len && filespec2[spec2len - 1] == '/') {
0f113f3e
MC
197 spec2len--;
198 len--;
199 }
200 merged = OPENSSL_malloc(len + 2);
90945fa3 201 if (merged == NULL) {
9311d0c4 202 ERR_raise(ERR_LIB_DSO, ERR_R_MALLOC_FAILURE);
26a7d938 203 return NULL;
0f113f3e
MC
204 }
205 strcpy(merged, filespec2);
206 merged[spec2len] = '/';
207 strcpy(&merged[spec2len + 1], filespec1);
208 }
26a7d938 209 return merged;
0f113f3e 210}
cbecb3ac 211
0f113f3e
MC
212/*
213 * This function is identical to the one in dso_dlfcn.c, but as it is highly
214 * unlikely that both the "dl" *and* "dlfcn" variants are being compiled at
215 * the same time, there's no great duplicating the code. Figuring out an
216 * elegant way to share one copy of the code would be more difficult and
217 * would not leave the implementations independent.
218 */
51c8dc37 219static char *dl_name_converter(DSO *dso, const char *filename)
0f113f3e
MC
220{
221 char *translated;
222 int len, rsize, transform;
51c8dc37 223
0f113f3e
MC
224 len = strlen(filename);
225 rsize = len + 1;
226 transform = (strstr(filename, "/") == NULL);
d475a9ef 227 if (transform) {
0f113f3e 228 /* We will convert this to "%s.s?" or "lib%s.s?" */
e987f9f2 229 rsize += strlen(DSO_EXTENSION); /* The length of ".s?" */
0f113f3e
MC
230 if ((DSO_flags(dso) & DSO_FLAG_NAME_TRANSLATION_EXT_ONLY) == 0)
231 rsize += 3; /* The length of "lib" */
232 }
233 translated = OPENSSL_malloc(rsize);
234 if (translated == NULL) {
9311d0c4 235 ERR_raise(ERR_LIB_DSO, DSO_R_NAME_TRANSLATION_FAILED);
26a7d938 236 return NULL;
0f113f3e
MC
237 }
238 if (transform) {
239 if ((DSO_flags(dso) & DSO_FLAG_NAME_TRANSLATION_EXT_ONLY) == 0)
e987f9f2 240 sprintf(translated, "lib%s%s", filename, DSO_EXTENSION);
0f113f3e 241 else
e987f9f2 242 sprintf(translated, "%s%s", filename, DSO_EXTENSION);
0f113f3e
MC
243 } else
244 sprintf(translated, "%s", filename);
26a7d938 245 return translated;
0f113f3e 246}
51c8dc37 247
cb6ea61c
MC
248static int dl_pathbyaddr(void *addr, char *path, int sz)
249{
250 struct shl_descriptor inf;
251 int i, len;
252
253 if (addr == NULL) {
254 union {
255 int (*f) (void *, char *, int);
256 void *p;
257 } t = {
258 dl_pathbyaddr
259 };
260 addr = t.p;
261 }
262
263 for (i = -1; shl_get_r(i, &inf) == 0; i++) {
264 if (((size_t)addr >= inf.tstart && (size_t)addr < inf.tend) ||
265 ((size_t)addr >= inf.dstart && (size_t)addr < inf.dend)) {
266 len = (int)strlen(inf.filename);
267 if (sz <= 0)
268 return len + 1;
269 if (len >= sz)
270 len = sz - 1;
271 memcpy(path, inf.filename, len);
272 path[len++] = 0;
273 return len;
274 }
275 }
276
277 return -1;
278}
279
c6cb42e4 280static void *dl_globallookup(const char *name)
0f113f3e
MC
281{
282 void *ret;
283 shl_t h = NULL;
68b64fb6 284
0f113f3e
MC
285 return shl_findsym(&h, name, TYPE_UNDEFINED, &ret) ? NULL : ret;
286}
287#endif /* DSO_DL */