]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/engine/engine_list.c
Some more tweaks to ENGINE code.
[thirdparty/openssl.git] / crypto / engine / engine_list.c
CommitLineData
5270e702
RL
1/* crypto/engine/engine_list.c */
2/* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL
3 * project 2000.
4 */
5/* ====================================================================
6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 * acknowledgment:
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <openssl/crypto.h>
60#include "cryptlib.h"
61#include "engine_int.h"
62#include <openssl/engine.h>
63
64/* The linked-list of pointers to engine types. engine_list_head
65 * incorporates an implicit structural reference but engine_list_tail
66 * does not - the latter is a computational niceity and only points
67 * to something that is already pointed to by its predecessor in the
68 * list (or engine_list_head itself). In the same way, the use of the
69 * "prev" pointer in each ENGINE is to save excessive list iteration,
70 * it doesn't correspond to an extra structural reference. Hence,
71 * engine_list_head, and each non-null "next" pointer account for
72 * the list itself assuming exactly 1 structural reference on each
73 * list member. */
74static ENGINE *engine_list_head = NULL;
75static ENGINE *engine_list_tail = NULL;
76/* A boolean switch, used to ensure we only initialise once. This
77 * is needed because the engine list may genuinely become empty during
78 * use (so we can't use engine_list_head as an indicator for example. */
79static int engine_list_flag = 0;
80
81/* These static functions starting with a lower case "engine_" always
82 * take place when CRYPTO_LOCK_ENGINE has been locked up. */
83static int engine_list_add(ENGINE *e)
84 {
85 int conflict = 0;
86 ENGINE *iterator = NULL;
87
88 if(e == NULL)
89 {
90 ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
91 ERR_R_PASSED_NULL_PARAMETER);
92 return 0;
93 }
94 iterator = engine_list_head;
95 while(iterator && !conflict)
96 {
97 conflict = (strcmp(iterator->id, e->id) == 0);
98 iterator = iterator->next;
99 }
100 if(conflict)
101 {
102 ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
103 ENGINE_R_CONFLICTING_ENGINE_ID);
104 return 0;
105 }
106 if(engine_list_head == NULL)
107 {
108 /* We are adding to an empty list. */
109 if(engine_list_tail)
110 {
111 ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
112 ENGINE_R_INTERNAL_LIST_ERROR);
113 return 0;
114 }
115 engine_list_head = e;
116 e->prev = NULL;
117 }
118 else
119 {
120 /* We are adding to the tail of an existing list. */
121 if((engine_list_tail == NULL) ||
122 (engine_list_tail->next != NULL))
123 {
124 ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
125 ENGINE_R_INTERNAL_LIST_ERROR);
126 return 0;
127 }
128 engine_list_tail->next = e;
129 e->prev = engine_list_tail;
130 }
131 /* Having the engine in the list assumes a structural
132 * reference. */
133 e->struct_ref++;
134 /* However it came to be, e is the last item in the list. */
135 engine_list_tail = e;
136 e->next = NULL;
137 return 1;
138 }
139
140static int engine_list_remove(ENGINE *e)
141 {
142 ENGINE *iterator;
143
144 if(e == NULL)
145 {
146 ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE,
147 ERR_R_PASSED_NULL_PARAMETER);
148 return 0;
149 }
150 /* We need to check that e is in our linked list! */
151 iterator = engine_list_head;
152 while(iterator && (iterator != e))
153 iterator = iterator->next;
154 if(iterator == NULL)
155 {
156 ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE,
157 ENGINE_R_ENGINE_IS_NOT_IN_LIST);
158 return 0;
159 }
160 /* un-link e from the chain. */
161 if(e->next)
162 e->next->prev = e->prev;
163 if(e->prev)
164 e->prev->next = e->next;
165 /* Correct our head/tail if necessary. */
166 if(engine_list_head == e)
167 engine_list_head = e->next;
168 if(engine_list_tail == e)
169 engine_list_tail = e->prev;
170 /* remove our structural reference. */
171 e->struct_ref--;
172 return 1;
173 }
174
175/* This check always takes place with CRYPTO_LOCK_ENGINE locked up
176 * so we're synchronised, but we can't call anything that tries to
177 * lock it again! :-) NB: For convenience (and code-clarity) we
178 * don't output errors for failures of the engine_list_add function
179 * as it will generate errors itself. */
180static int engine_internal_check(void)
181 {
182 if(engine_list_flag)
183 return 1;
184 /* This is our first time up, we need to populate the list
185 * with our statically compiled-in engines. */
186 if(!engine_list_add(ENGINE_openssl()))
187 return 0;
5270e702
RL
188 engine_list_flag = 1;
189 return 1;
190 }
191
192/* Get the first/last "ENGINE" type available. */
193ENGINE *ENGINE_get_first(void)
194 {
195 ENGINE *ret = NULL;
196
197 CRYPTO_r_lock(CRYPTO_LOCK_ENGINE);
198 if(engine_internal_check())
199 {
200 ret = engine_list_head;
201 if(ret)
202 ret->struct_ref++;
203 }
204 CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE);
205 return ret;
206 }
207ENGINE *ENGINE_get_last(void)
208 {
209 ENGINE *ret = NULL;
210
211 CRYPTO_r_lock(CRYPTO_LOCK_ENGINE);
212 if(engine_internal_check())
213 {
214 ret = engine_list_tail;
215 if(ret)
216 ret->struct_ref++;
217 }
218 CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE);
219 return ret;
220 }
221
222/* Iterate to the next/previous "ENGINE" type (NULL = end of the list). */
223ENGINE *ENGINE_get_next(ENGINE *e)
224 {
225 ENGINE *ret = NULL;
226 if(e == NULL)
227 {
228 ENGINEerr(ENGINE_F_ENGINE_GET_NEXT,
229 ERR_R_PASSED_NULL_PARAMETER);
230 return 0;
231 }
232 CRYPTO_r_lock(CRYPTO_LOCK_ENGINE);
233 ret = e->next;
5270e702 234 if(ret)
ea3a429e 235 /* Return a valid structural refernce to the next ENGINE */
5270e702
RL
236 ret->struct_ref++;
237 CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE);
ea3a429e
GT
238 /* Release the structural reference to the previous ENGINE */
239 ENGINE_free(e);
5270e702
RL
240 return ret;
241 }
242ENGINE *ENGINE_get_prev(ENGINE *e)
243 {
244 ENGINE *ret = NULL;
245 if(e == NULL)
246 {
247 ENGINEerr(ENGINE_F_ENGINE_GET_PREV,
248 ERR_R_PASSED_NULL_PARAMETER);
249 return 0;
250 }
251 CRYPTO_r_lock(CRYPTO_LOCK_ENGINE);
252 ret = e->prev;
5270e702 253 if(ret)
ea3a429e 254 /* Return a valid structural reference to the next ENGINE */
5270e702
RL
255 ret->struct_ref++;
256 CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE);
ea3a429e
GT
257 /* Release the structural reference to the previous ENGINE */
258 ENGINE_free(e);
5270e702
RL
259 return ret;
260 }
261
262/* Add another "ENGINE" type into the list. */
263int ENGINE_add(ENGINE *e)
264 {
265 int to_return = 1;
266 if(e == NULL)
267 {
268 ENGINEerr(ENGINE_F_ENGINE_ADD,
269 ERR_R_PASSED_NULL_PARAMETER);
270 return 0;
271 }
272 if((e->id == NULL) || (e->name == NULL))
273 {
274 ENGINEerr(ENGINE_F_ENGINE_ADD,
275 ENGINE_R_ID_OR_NAME_MISSING);
276 }
277 CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
278 if(!engine_internal_check() || !engine_list_add(e))
279 {
280 ENGINEerr(ENGINE_F_ENGINE_ADD,
281 ENGINE_R_INTERNAL_LIST_ERROR);
282 to_return = 0;
283 }
284 CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
285 return to_return;
286 }
287
288/* Remove an existing "ENGINE" type from the array. */
289int ENGINE_remove(ENGINE *e)
290 {
291 int to_return = 1;
292 if(e == NULL)
293 {
294 ENGINEerr(ENGINE_F_ENGINE_REMOVE,
295 ERR_R_PASSED_NULL_PARAMETER);
296 return 0;
297 }
298 CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
299 if(!engine_internal_check() || !engine_list_remove(e))
300 {
301 ENGINEerr(ENGINE_F_ENGINE_REMOVE,
302 ENGINE_R_INTERNAL_LIST_ERROR);
303 to_return = 0;
304 }
305 CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
306 return to_return;
307 }
308
309ENGINE *ENGINE_by_id(const char *id)
310 {
311 ENGINE *iterator = NULL;
312 if(id == NULL)
313 {
314 ENGINEerr(ENGINE_F_ENGINE_BY_ID,
315 ERR_R_PASSED_NULL_PARAMETER);
316 return NULL;
317 }
318 CRYPTO_r_lock(CRYPTO_LOCK_ENGINE);
319 if(!engine_internal_check())
320 ENGINEerr(ENGINE_F_ENGINE_BY_ID,
321 ENGINE_R_INTERNAL_LIST_ERROR);
322 else
323 {
324 iterator = engine_list_head;
325 while(iterator && (strcmp(id, iterator->id) != 0))
326 iterator = iterator->next;
327 if(iterator)
328 /* We need to return a structural reference */
329 iterator->struct_ref++;
330 }
331 CRYPTO_r_unlock(CRYPTO_LOCK_ENGINE);
332 if(iterator == NULL)
333 ENGINEerr(ENGINE_F_ENGINE_BY_ID,
334 ENGINE_R_NO_SUCH_ENGINE);
335 return iterator;
336 }
337
5270e702
RL
338ENGINE *ENGINE_new(void)
339 {
340 ENGINE *ret;
341
342 ret = (ENGINE *)OPENSSL_malloc(sizeof(ENGINE));
343 if(ret == NULL)
344 {
345 ENGINEerr(ENGINE_F_ENGINE_NEW, ERR_R_MALLOC_FAILURE);
346 return NULL;
347 }
348 memset(ret, 0, sizeof(ENGINE));
5270e702
RL
349 ret->struct_ref = 1;
350 return ret;
351 }
5270e702
RL
352
353int ENGINE_free(ENGINE *e)
354 {
355 int i;
356
357 if(e == NULL)
358 {
359 ENGINEerr(ENGINE_F_ENGINE_FREE,
360 ERR_R_PASSED_NULL_PARAMETER);
361 return 0;
362 }
363 i = CRYPTO_add(&e->struct_ref,-1,CRYPTO_LOCK_ENGINE);
364#ifdef REF_PRINT
365 REF_PRINT("ENGINE",e);
366#endif
367 if (i > 0) return 1;
368#ifdef REF_CHECK
369 if (i < 0)
370 {
371 fprintf(stderr,"ENGINE_free, bad reference count\n");
372 abort();
373 }
374#endif
dcd87618 375 OPENSSL_free(e);
5270e702
RL
376 return 1;
377 }
378
379int ENGINE_set_id(ENGINE *e, const char *id)
380 {
d54bf145 381 if(id == NULL)
5270e702
RL
382 {
383 ENGINEerr(ENGINE_F_ENGINE_SET_ID,
384 ERR_R_PASSED_NULL_PARAMETER);
385 return 0;
386 }
387 e->id = id;
388 return 1;
389 }
390
391int ENGINE_set_name(ENGINE *e, const char *name)
392 {
d54bf145 393 if(name == NULL)
5270e702
RL
394 {
395 ENGINEerr(ENGINE_F_ENGINE_SET_NAME,
396 ERR_R_PASSED_NULL_PARAMETER);
397 return 0;
398 }
399 e->name = name;
400 return 1;
401 }
402
10e473e9 403int ENGINE_set_RSA(ENGINE *e, const RSA_METHOD *rsa_meth)
5270e702 404 {
5270e702
RL
405 e->rsa_meth = rsa_meth;
406 return 1;
407 }
408
a4aba800 409int ENGINE_set_DSA(ENGINE *e, const DSA_METHOD *dsa_meth)
5270e702 410 {
5270e702
RL
411 e->dsa_meth = dsa_meth;
412 return 1;
413 }
414
f971ccb2 415int ENGINE_set_DH(ENGINE *e, const DH_METHOD *dh_meth)
5270e702 416 {
5270e702
RL
417 e->dh_meth = dh_meth;
418 return 1;
419 }
420
d54bf145 421int ENGINE_set_RAND(ENGINE *e, const RAND_METHOD *rand_meth)
5270e702 422 {
5270e702
RL
423 e->rand_meth = rand_meth;
424 return 1;
425 }
426
427int ENGINE_set_BN_mod_exp(ENGINE *e, BN_MOD_EXP bn_mod_exp)
428 {
5270e702
RL
429 e->bn_mod_exp = bn_mod_exp;
430 return 1;
431 }
432
433int ENGINE_set_BN_mod_exp_crt(ENGINE *e, BN_MOD_EXP_CRT bn_mod_exp_crt)
434 {
5270e702
RL
435 e->bn_mod_exp_crt = bn_mod_exp_crt;
436 return 1;
437 }
438
439int ENGINE_set_init_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR init_f)
440 {
5270e702
RL
441 e->init = init_f;
442 return 1;
443 }
444
445int ENGINE_set_finish_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR finish_f)
446 {
5270e702
RL
447 e->finish = finish_f;
448 return 1;
449 }
450
451int ENGINE_set_ctrl_function(ENGINE *e, ENGINE_CTRL_FUNC_PTR ctrl_f)
452 {
5270e702
RL
453 e->ctrl = ctrl_f;
454 return 1;
455 }
456
d54bf145
GT
457int ENGINE_set_load_privkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpriv_f)
458 {
459 e->load_privkey = loadpriv_f;
460 return 1;
461 }
462
463int ENGINE_set_load_pubkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpub_f)
464 {
465 e->load_pubkey = loadpub_f;
466 return 1;
467 }
468
469int ENGINE_set_flags(ENGINE *e, int flags)
470 {
471 e->flags = flags;
472 return 1;
473 }
474
475int ENGINE_cpy(ENGINE *dest, const ENGINE *src)
476 {
477 if(ENGINE_set_id(dest, ENGINE_get_id(src)) &&
478 ENGINE_set_name(dest, ENGINE_get_name(src)) &&
479 ENGINE_set_RSA(dest, ENGINE_get_RSA(src)) &&
480 ENGINE_set_DSA(dest, ENGINE_get_DSA(src)) &&
481 ENGINE_set_DH(dest, ENGINE_get_DH(src)) &&
482 ENGINE_set_RAND(dest, ENGINE_get_RAND(src)) &&
483 ENGINE_set_BN_mod_exp(dest,
484 ENGINE_get_BN_mod_exp(src)) &&
485 ENGINE_set_BN_mod_exp_crt(dest,
486 ENGINE_get_BN_mod_exp_crt(src)) &&
487 ENGINE_set_init_function(dest,
488 ENGINE_get_init_function(src)) &&
489 ENGINE_set_finish_function(dest,
490 ENGINE_get_finish_function(src)) &&
491 ENGINE_set_ctrl_function(dest,
492 ENGINE_get_ctrl_function(src)) &&
493 ENGINE_set_load_privkey_function(dest,
494 ENGINE_get_load_privkey_function(src)) &&
495 ENGINE_set_load_pubkey_function(dest,
496 ENGINE_get_load_pubkey_function(src)) &&
497 ENGINE_set_flags(dest, ENGINE_get_flags(src)))
498 return 1;
499 return 0;
500 }
501
502const char *ENGINE_get_id(const ENGINE *e)
5270e702 503 {
5270e702
RL
504 return e->id;
505 }
506
d54bf145 507const char *ENGINE_get_name(const ENGINE *e)
5270e702 508 {
5270e702
RL
509 return e->name;
510 }
511
d54bf145 512const RSA_METHOD *ENGINE_get_RSA(const ENGINE *e)
5270e702 513 {
5270e702
RL
514 return e->rsa_meth;
515 }
516
d54bf145 517const DSA_METHOD *ENGINE_get_DSA(const ENGINE *e)
5270e702 518 {
5270e702
RL
519 return e->dsa_meth;
520 }
521
d54bf145 522const DH_METHOD *ENGINE_get_DH(const ENGINE *e)
5270e702 523 {
5270e702
RL
524 return e->dh_meth;
525 }
526
d54bf145 527const RAND_METHOD *ENGINE_get_RAND(const ENGINE *e)
5270e702 528 {
5270e702
RL
529 return e->rand_meth;
530 }
531
d54bf145 532BN_MOD_EXP ENGINE_get_BN_mod_exp(const ENGINE *e)
5270e702 533 {
5270e702
RL
534 return e->bn_mod_exp;
535 }
536
d54bf145 537BN_MOD_EXP_CRT ENGINE_get_BN_mod_exp_crt(const ENGINE *e)
5270e702 538 {
5270e702
RL
539 return e->bn_mod_exp_crt;
540 }
541
d54bf145 542ENGINE_GEN_INT_FUNC_PTR ENGINE_get_init_function(const ENGINE *e)
5270e702 543 {
5270e702
RL
544 return e->init;
545 }
546
d54bf145 547ENGINE_GEN_INT_FUNC_PTR ENGINE_get_finish_function(const ENGINE *e)
5270e702 548 {
5270e702
RL
549 return e->finish;
550 }
551
d54bf145 552ENGINE_CTRL_FUNC_PTR ENGINE_get_ctrl_function(const ENGINE *e)
5270e702 553 {
5270e702
RL
554 return e->ctrl;
555 }
556
d54bf145
GT
557ENGINE_LOAD_KEY_PTR ENGINE_get_load_privkey_function(const ENGINE *e)
558 {
559 return e->load_privkey;
560 }
561
562ENGINE_LOAD_KEY_PTR ENGINE_get_load_pubkey_function(const ENGINE *e)
563 {
564 return e->load_pubkey;
565 }
566
567int ENGINE_get_flags(const ENGINE *e)
568 {
569 return e->flags;
570 }