source: EcnlProtoTool/trunk/openssl-1.1.0e/crypto/dso/dso_lib.c@ 331

Last change on this file since 331 was 331, checked in by coas-nagasima, 6 years ago

prototoolに関連するプロジェクトをnewlibからmuslを使うよう変更・更新
ntshellをnewlibの下位の実装から、muslのsyscallの実装に変更・更新
以下のOSSをアップデート
・mruby-1.3.0
・musl-1.1.18
・onigmo-6.1.3
・tcc-0.9.27
以下のOSSを追加
・openssl-1.1.0e
・curl-7.57.0
・zlib-1.2.11
以下のmrbgemsを追加
・iij/mruby-digest
・iij/mruby-env
・iij/mruby-errno
・iij/mruby-iijson
・iij/mruby-ipaddr
・iij/mruby-mock
・iij/mruby-require
・iij/mruby-tls-openssl

  • Property svn:eol-style set to native
  • Property svn:mime-type set to text/x-csrc
File size: 9.3 KB
Line 
1/*
2 * Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include "dso_locl.h"
11
12static DSO_METHOD *default_DSO_meth = NULL;
13
14static DSO *DSO_new_method(DSO_METHOD *meth)
15{
16 DSO *ret;
17
18 if (default_DSO_meth == NULL) {
19 /*
20 * We default to DSO_METH_openssl() which in turn defaults to
21 * stealing the "best available" method. Will fallback to
22 * DSO_METH_null() in the worst case.
23 */
24 default_DSO_meth = DSO_METHOD_openssl();
25 }
26 ret = OPENSSL_zalloc(sizeof(*ret));
27 if (ret == NULL) {
28 DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
29 return (NULL);
30 }
31 ret->meth_data = sk_void_new_null();
32 if (ret->meth_data == NULL) {
33 /* sk_new doesn't generate any errors so we do */
34 DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
35 OPENSSL_free(ret);
36 return (NULL);
37 }
38 ret->meth = default_DSO_meth;
39 ret->references = 1;
40 ret->lock = CRYPTO_THREAD_lock_new();
41 if (ret->lock == NULL) {
42 DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
43 sk_void_free(ret->meth_data);
44 OPENSSL_free(ret);
45 return NULL;
46 }
47
48 if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
49 DSO_free(ret);
50 ret = NULL;
51 }
52
53 return ret;
54}
55
56DSO *DSO_new(void)
57{
58 return DSO_new_method(NULL);
59}
60
61int DSO_free(DSO *dso)
62{
63 int i;
64
65 if (dso == NULL)
66 return (1);
67
68 if (CRYPTO_atomic_add(&dso->references, -1, &i, dso->lock) <= 0)
69 return 0;
70
71 REF_PRINT_COUNT("DSO", dso);
72 if (i > 0)
73 return 1;
74 REF_ASSERT_ISNT(i < 0);
75
76 if ((dso->flags & DSO_FLAG_NO_UNLOAD_ON_FREE) == 0) {
77 if ((dso->meth->dso_unload != NULL) && !dso->meth->dso_unload(dso)) {
78 DSOerr(DSO_F_DSO_FREE, DSO_R_UNLOAD_FAILED);
79 return 0;
80 }
81 }
82
83 if ((dso->meth->finish != NULL) && !dso->meth->finish(dso)) {
84 DSOerr(DSO_F_DSO_FREE, DSO_R_FINISH_FAILED);
85 return 0;
86 }
87
88 sk_void_free(dso->meth_data);
89 OPENSSL_free(dso->filename);
90 OPENSSL_free(dso->loaded_filename);
91 CRYPTO_THREAD_lock_free(dso->lock);
92 OPENSSL_free(dso);
93 return 1;
94}
95
96int DSO_flags(DSO *dso)
97{
98 return ((dso == NULL) ? 0 : dso->flags);
99}
100
101int DSO_up_ref(DSO *dso)
102{
103 int i;
104
105 if (dso == NULL) {
106 DSOerr(DSO_F_DSO_UP_REF, ERR_R_PASSED_NULL_PARAMETER);
107 return 0;
108 }
109
110 if (CRYPTO_atomic_add(&dso->references, 1, &i, dso->lock) <= 0)
111 return 0;
112
113 REF_PRINT_COUNT("DSO", r);
114 REF_ASSERT_ISNT(i < 2);
115 return ((i > 1) ? 1 : 0);
116}
117
118DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags)
119{
120 DSO *ret;
121 int allocated = 0;
122
123 if (dso == NULL) {
124 ret = DSO_new_method(meth);
125 if (ret == NULL) {
126 DSOerr(DSO_F_DSO_LOAD, ERR_R_MALLOC_FAILURE);
127 goto err;
128 }
129 allocated = 1;
130 /* Pass the provided flags to the new DSO object */
131 if (DSO_ctrl(ret, DSO_CTRL_SET_FLAGS, flags, NULL) < 0) {
132 DSOerr(DSO_F_DSO_LOAD, DSO_R_CTRL_FAILED);
133 goto err;
134 }
135 } else
136 ret = dso;
137 /* Don't load if we're currently already loaded */
138 if (ret->filename != NULL) {
139 DSOerr(DSO_F_DSO_LOAD, DSO_R_DSO_ALREADY_LOADED);
140 goto err;
141 }
142 /*
143 * filename can only be NULL if we were passed a dso that already has one
144 * set.
145 */
146 if (filename != NULL)
147 if (!DSO_set_filename(ret, filename)) {
148 DSOerr(DSO_F_DSO_LOAD, DSO_R_SET_FILENAME_FAILED);
149 goto err;
150 }
151 filename = ret->filename;
152 if (filename == NULL) {
153 DSOerr(DSO_F_DSO_LOAD, DSO_R_NO_FILENAME);
154 goto err;
155 }
156 if (ret->meth->dso_load == NULL) {
157 DSOerr(DSO_F_DSO_LOAD, DSO_R_UNSUPPORTED);
158 goto err;
159 }
160 if (!ret->meth->dso_load(ret)) {
161 DSOerr(DSO_F_DSO_LOAD, DSO_R_LOAD_FAILED);
162 goto err;
163 }
164 /* Load succeeded */
165 return (ret);
166 err:
167 if (allocated)
168 DSO_free(ret);
169 return (NULL);
170}
171
172DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname)
173{
174 DSO_FUNC_TYPE ret = NULL;
175
176 if ((dso == NULL) || (symname == NULL)) {
177 DSOerr(DSO_F_DSO_BIND_FUNC, ERR_R_PASSED_NULL_PARAMETER);
178 return (NULL);
179 }
180 if (dso->meth->dso_bind_func == NULL) {
181 DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_UNSUPPORTED);
182 return (NULL);
183 }
184 if ((ret = dso->meth->dso_bind_func(dso, symname)) == NULL) {
185 DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_SYM_FAILURE);
186 return (NULL);
187 }
188 /* Success */
189 return (ret);
190}
191
192/*
193 * I don't really like these *_ctrl functions very much to be perfectly
194 * honest. For one thing, I think I have to return a negative value for any
195 * error because possible DSO_ctrl() commands may return values such as
196 * "size"s that can legitimately be zero (making the standard
197 * "if (DSO_cmd(...))" form that works almost everywhere else fail at odd
198 * times. I'd prefer "output" values to be passed by reference and the return
199 * value as success/failure like usual ... but we conform when we must... :-)
200 */
201long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg)
202{
203 if (dso == NULL) {
204 DSOerr(DSO_F_DSO_CTRL, ERR_R_PASSED_NULL_PARAMETER);
205 return (-1);
206 }
207 /*
208 * We should intercept certain generic commands and only pass control to
209 * the method-specific ctrl() function if it's something we don't handle.
210 */
211 switch (cmd) {
212 case DSO_CTRL_GET_FLAGS:
213 return dso->flags;
214 case DSO_CTRL_SET_FLAGS:
215 dso->flags = (int)larg;
216 return (0);
217 case DSO_CTRL_OR_FLAGS:
218 dso->flags |= (int)larg;
219 return (0);
220 default:
221 break;
222 }
223 if ((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) {
224 DSOerr(DSO_F_DSO_CTRL, DSO_R_UNSUPPORTED);
225 return (-1);
226 }
227 return (dso->meth->dso_ctrl(dso, cmd, larg, parg));
228}
229
230const char *DSO_get_filename(DSO *dso)
231{
232 if (dso == NULL) {
233 DSOerr(DSO_F_DSO_GET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
234 return (NULL);
235 }
236 return (dso->filename);
237}
238
239int DSO_set_filename(DSO *dso, const char *filename)
240{
241 char *copied;
242
243 if ((dso == NULL) || (filename == NULL)) {
244 DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
245 return (0);
246 }
247 if (dso->loaded_filename) {
248 DSOerr(DSO_F_DSO_SET_FILENAME, DSO_R_DSO_ALREADY_LOADED);
249 return (0);
250 }
251 /* We'll duplicate filename */
252 copied = OPENSSL_strdup(filename);
253 if (copied == NULL) {
254 DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_MALLOC_FAILURE);
255 return (0);
256 }
257 OPENSSL_free(dso->filename);
258 dso->filename = copied;
259 return (1);
260}
261
262char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2)
263{
264 char *result = NULL;
265
266 if (dso == NULL || filespec1 == NULL) {
267 DSOerr(DSO_F_DSO_MERGE, ERR_R_PASSED_NULL_PARAMETER);
268 return (NULL);
269 }
270 if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
271 if (dso->merger != NULL)
272 result = dso->merger(dso, filespec1, filespec2);
273 else if (dso->meth->dso_merger != NULL)
274 result = dso->meth->dso_merger(dso, filespec1, filespec2);
275 }
276 return (result);
277}
278
279char *DSO_convert_filename(DSO *dso, const char *filename)
280{
281 char *result = NULL;
282
283 if (dso == NULL) {
284 DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
285 return (NULL);
286 }
287 if (filename == NULL)
288 filename = dso->filename;
289 if (filename == NULL) {
290 DSOerr(DSO_F_DSO_CONVERT_FILENAME, DSO_R_NO_FILENAME);
291 return (NULL);
292 }
293 if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
294 if (dso->name_converter != NULL)
295 result = dso->name_converter(dso, filename);
296 else if (dso->meth->dso_name_converter != NULL)
297 result = dso->meth->dso_name_converter(dso, filename);
298 }
299 if (result == NULL) {
300 result = OPENSSL_strdup(filename);
301 if (result == NULL) {
302 DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_MALLOC_FAILURE);
303 return (NULL);
304 }
305 }
306 return (result);
307}
308
309int DSO_pathbyaddr(void *addr, char *path, int sz)
310{
311 DSO_METHOD *meth = default_DSO_meth;
312 if (meth == NULL)
313 meth = DSO_METHOD_openssl();
314 if (meth->pathbyaddr == NULL) {
315 DSOerr(DSO_F_DSO_PATHBYADDR, DSO_R_UNSUPPORTED);
316 return -1;
317 }
318 return (*meth->pathbyaddr) (addr, path, sz);
319}
320
321DSO *DSO_dsobyaddr(void *addr, int flags)
322{
323 DSO *ret = NULL;
324 char *filename = NULL;
325 int len = DSO_pathbyaddr(addr, NULL, 0);
326
327 if (len < 0)
328 return NULL;
329
330 filename = OPENSSL_malloc(len);
331 if (filename != NULL
332 && DSO_pathbyaddr(addr, filename, len) == len)
333 ret = DSO_load(NULL, filename, NULL, flags);
334
335 OPENSSL_free(filename);
336 return ret;
337}
338
339void *DSO_global_lookup(const char *name)
340{
341 DSO_METHOD *meth = default_DSO_meth;
342 if (meth == NULL)
343 meth = DSO_METHOD_openssl();
344 if (meth->globallookup == NULL) {
345 DSOerr(DSO_F_DSO_GLOBAL_LOOKUP, DSO_R_UNSUPPORTED);
346 return NULL;
347 }
348 return (*meth->globallookup) (name);
349}
Note: See TracBrowser for help on using the repository browser.