os/ossrv/ssl/libcrypto/src/crypto/ex_data.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* crypto/ex_data.c */
sl@0
     2
sl@0
     3
/*
sl@0
     4
 * Overhaul notes;
sl@0
     5
 *
sl@0
     6
 * This code is now *mostly* thread-safe. It is now easier to understand in what
sl@0
     7
 * ways it is safe and in what ways it is not, which is an improvement. Firstly,
sl@0
     8
 * all per-class stacks and index-counters for ex_data are stored in the same
sl@0
     9
 * global LHASH table (keyed by class). This hash table uses locking for all
sl@0
    10
 * access with the exception of CRYPTO_cleanup_all_ex_data(), which must only be
sl@0
    11
 * called when no other threads can possibly race against it (even if it was
sl@0
    12
 * locked, the race would mean it's possible the hash table might have been
sl@0
    13
 * recreated after the cleanup). As classes can only be added to the hash table,
sl@0
    14
 * and within each class, the stack of methods can only be incremented, the
sl@0
    15
 * locking mechanics are simpler than they would otherwise be. For example, the
sl@0
    16
 * new/dup/free ex_data functions will lock the hash table, copy the method
sl@0
    17
 * pointers it needs from the relevant class, then unlock the hash table before
sl@0
    18
 * actually applying those method pointers to the task of the new/dup/free
sl@0
    19
 * operations. As they can't be removed from the method-stack, only
sl@0
    20
 * supplemented, there's no race conditions associated with using them outside
sl@0
    21
 * the lock. The get/set_ex_data functions are not locked because they do not
sl@0
    22
 * involve this global state at all - they operate directly with a previously
sl@0
    23
 * obtained per-class method index and a particular "ex_data" variable. These
sl@0
    24
 * variables are usually instantiated per-context (eg. each RSA structure has
sl@0
    25
 * one) so locking on read/write access to that variable can be locked locally
sl@0
    26
 * if required (eg. using the "RSA" lock to synchronise access to a
sl@0
    27
 * per-RSA-structure ex_data variable if required).
sl@0
    28
 * [Geoff]
sl@0
    29
 */
sl@0
    30
sl@0
    31
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
    32
 * All rights reserved.
sl@0
    33
 *
sl@0
    34
 * This package is an SSL implementation written
sl@0
    35
 * by Eric Young (eay@cryptsoft.com).
sl@0
    36
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
    37
 * 
sl@0
    38
 * This library is free for commercial and non-commercial use as long as
sl@0
    39
 * the following conditions are aheared to.  The following conditions
sl@0
    40
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    41
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    42
 * included with this distribution is covered by the same copyright terms
sl@0
    43
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    44
 * 
sl@0
    45
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    46
 * the code are not to be removed.
sl@0
    47
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    48
 * as the author of the parts of the library used.
sl@0
    49
 * This can be in the form of a textual message at program startup or
sl@0
    50
 * in documentation (online or textual) provided with the package.
sl@0
    51
 * 
sl@0
    52
 * Redistribution and use in source and binary forms, with or without
sl@0
    53
 * modification, are permitted provided that the following conditions
sl@0
    54
 * are met:
sl@0
    55
 * 1. Redistributions of source code must retain the copyright
sl@0
    56
 *    notice, this list of conditions and the following disclaimer.
sl@0
    57
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    58
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    59
 *    documentation and/or other materials provided with the distribution.
sl@0
    60
 * 3. All advertising materials mentioning features or use of this software
sl@0
    61
 *    must display the following acknowledgement:
sl@0
    62
 *    "This product includes cryptographic software written by
sl@0
    63
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    64
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    65
 *    being used are not cryptographic related :-).
sl@0
    66
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    67
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    68
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    69
 * 
sl@0
    70
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    71
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    72
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    73
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    74
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    75
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    76
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    77
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    78
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    79
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    80
 * SUCH DAMAGE.
sl@0
    81
 * 
sl@0
    82
 * The licence and distribution terms for any publically available version or
sl@0
    83
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    84
 * copied and put under another distribution licence
sl@0
    85
 * [including the GNU Public Licence.]
sl@0
    86
 */
sl@0
    87
/* ====================================================================
sl@0
    88
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
sl@0
    89
 *
sl@0
    90
 * Redistribution and use in source and binary forms, with or without
sl@0
    91
 * modification, are permitted provided that the following conditions
sl@0
    92
 * are met:
sl@0
    93
 *
sl@0
    94
 * 1. Redistributions of source code must retain the above copyright
sl@0
    95
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    96
 *
sl@0
    97
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    98
 *    notice, this list of conditions and the following disclaimer in
sl@0
    99
 *    the documentation and/or other materials provided with the
sl@0
   100
 *    distribution.
sl@0
   101
 *
sl@0
   102
 * 3. All advertising materials mentioning features or use of this
sl@0
   103
 *    software must display the following acknowledgment:
sl@0
   104
 *    "This product includes software developed by the OpenSSL Project
sl@0
   105
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
   106
 *
sl@0
   107
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
   108
 *    endorse or promote products derived from this software without
sl@0
   109
 *    prior written permission. For written permission, please contact
sl@0
   110
 *    openssl-core@openssl.org.
sl@0
   111
 *
sl@0
   112
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
   113
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
   114
 *    permission of the OpenSSL Project.
sl@0
   115
 *
sl@0
   116
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
   117
 *    acknowledgment:
sl@0
   118
 *    "This product includes software developed by the OpenSSL Project
sl@0
   119
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
   120
 *
sl@0
   121
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
   122
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
   123
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
   124
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
   125
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
   126
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
   127
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
   128
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
   129
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
   130
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
   131
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
   132
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
   133
 * ====================================================================
sl@0
   134
 *
sl@0
   135
 * This product includes cryptographic software written by Eric Young
sl@0
   136
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
   137
 * Hudson (tjh@cryptsoft.com).
sl@0
   138
 *
sl@0
   139
 */
sl@0
   140
 /*
sl@0
   141
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
sl@0
   142
 */
sl@0
   143
sl@0
   144
#include "cryptlib.h"
sl@0
   145
#include <openssl/lhash.h>
sl@0
   146
#if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
sl@0
   147
#include "libcrypto_wsd_macros.h"
sl@0
   148
#include "libcrypto_wsd.h"
sl@0
   149
#endif
sl@0
   150
sl@0
   151
#ifndef EMULATOR
sl@0
   152
/* What an "implementation of ex_data functionality" looks like */
sl@0
   153
struct st_CRYPTO_EX_DATA_IMPL
sl@0
   154
	{
sl@0
   155
	/*********************/
sl@0
   156
	/* GLOBAL OPERATIONS */
sl@0
   157
	/* Return a new class index */
sl@0
   158
	int (*cb_new_class)(void);
sl@0
   159
	/* Cleanup all state used by the implementation */
sl@0
   160
	void (*cb_cleanup)(void);
sl@0
   161
	/************************/
sl@0
   162
	/* PER-CLASS OPERATIONS */
sl@0
   163
	/* Get a new method index within a class */
sl@0
   164
	int (*cb_get_new_index)(int class_index, long argl, void *argp,
sl@0
   165
			CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
sl@0
   166
			CRYPTO_EX_free *free_func);
sl@0
   167
	/* Initialise a new CRYPTO_EX_DATA of a given class */
sl@0
   168
	int (*cb_new_ex_data)(int class_index, void *obj,
sl@0
   169
			CRYPTO_EX_DATA *ad);
sl@0
   170
	/* Duplicate a CRYPTO_EX_DATA of a given class onto a copy */
sl@0
   171
	int (*cb_dup_ex_data)(int class_index, CRYPTO_EX_DATA *to,
sl@0
   172
			CRYPTO_EX_DATA *from);
sl@0
   173
	/* Cleanup a CRYPTO_EX_DATA of a given class */
sl@0
   174
	void (*cb_free_ex_data)(int class_index, void *obj,
sl@0
   175
			CRYPTO_EX_DATA *ad);
sl@0
   176
	};
sl@0
   177
#endif
sl@0
   178
#ifndef EMULATOR
sl@0
   179
/* The implementation we use at run-time */
sl@0
   180
static const CRYPTO_EX_DATA_IMPL *impl = NULL;
sl@0
   181
#else
sl@0
   182
 GET_STATIC_VAR_FROM_TLS(impl ,ex_data,CRYPTO_EX_DATA_IMPL *)
sl@0
   183
 #define impl  (*GET_WSD_VAR_NAME(impl,ex_data,s)())
sl@0
   184
#endif
sl@0
   185
sl@0
   186
/* To call "impl" functions, use this macro rather than referring to 'impl' directly, eg.
sl@0
   187
 * EX_IMPL(get_new_index)(...); */
sl@0
   188
#define EX_IMPL(a) impl->cb_##a
sl@0
   189
sl@0
   190
/* Predeclare the "default" ex_data implementation */
sl@0
   191
static int int_new_class(void);
sl@0
   192
static void int_cleanup(void);
sl@0
   193
static int int_get_new_index(int class_index, long argl, void *argp,
sl@0
   194
		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
sl@0
   195
		CRYPTO_EX_free *free_func);
sl@0
   196
static int int_new_ex_data(int class_index, void *obj,
sl@0
   197
		CRYPTO_EX_DATA *ad);
sl@0
   198
static int int_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
sl@0
   199
		CRYPTO_EX_DATA *from);
sl@0
   200
static void int_free_ex_data(int class_index, void *obj,
sl@0
   201
		CRYPTO_EX_DATA *ad);
sl@0
   202
		
sl@0
   203
		
sl@0
   204
#ifndef EMULATOR		
sl@0
   205
static CRYPTO_EX_DATA_IMPL impl_default =
sl@0
   206
	{
sl@0
   207
	int_new_class,
sl@0
   208
	int_cleanup,
sl@0
   209
	int_get_new_index,
sl@0
   210
	int_new_ex_data,
sl@0
   211
	int_dup_ex_data,
sl@0
   212
	int_free_ex_data
sl@0
   213
	};
sl@0
   214
#else	
sl@0
   215
  GET_STATIC_VAR_FROM_TLS(impl_default,ex_data,CRYPTO_EX_DATA_IMPL)
sl@0
   216
  #define impl_default (*GET_WSD_VAR_NAME(impl_default,ex_data, s)())
sl@0
   217
  const CRYPTO_EX_DATA_IMPL temp_s_impl_default =
sl@0
   218
	{
sl@0
   219
	int_new_class,
sl@0
   220
	int_cleanup,
sl@0
   221
	int_get_new_index,
sl@0
   222
	int_new_ex_data,
sl@0
   223
	int_dup_ex_data,
sl@0
   224
	int_free_ex_data
sl@0
   225
	};
sl@0
   226
#endif
sl@0
   227
sl@0
   228
/* Internal function that checks whether "impl" is set and if not, sets it to
sl@0
   229
 * the default. */
sl@0
   230
static void impl_check(void)
sl@0
   231
	{
sl@0
   232
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   233
	if(!impl)
sl@0
   234
		impl = &impl_default;
sl@0
   235
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   236
	}
sl@0
   237
/* A macro wrapper for impl_check that first uses a non-locked test before
sl@0
   238
 * invoking the function (which checks again inside a lock). */
sl@0
   239
#define IMPL_CHECK if(!impl) impl_check();
sl@0
   240
sl@0
   241
/* API functions to get/set the "ex_data" implementation */
sl@0
   242
EXPORT_C const CRYPTO_EX_DATA_IMPL *CRYPTO_get_ex_data_implementation(void)
sl@0
   243
	{
sl@0
   244
	IMPL_CHECK
sl@0
   245
	return impl;
sl@0
   246
	}
sl@0
   247
EXPORT_C int CRYPTO_set_ex_data_implementation(CRYPTO_EX_DATA_IMPL *i)
sl@0
   248
	{
sl@0
   249
	int toret = 0;
sl@0
   250
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   251
	if(!impl)
sl@0
   252
		{
sl@0
   253
		impl = i;
sl@0
   254
		toret = 1;
sl@0
   255
		}
sl@0
   256
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   257
	return toret;
sl@0
   258
	}
sl@0
   259
sl@0
   260
/****************************************************************************/
sl@0
   261
/* Interal (default) implementation of "ex_data" support. API functions are
sl@0
   262
 * further down. */
sl@0
   263
sl@0
   264
/* The type that represents what each "class" used to implement locally. A STACK
sl@0
   265
 * of CRYPTO_EX_DATA_FUNCS plus a index-counter. The 'class_index' is the global
sl@0
   266
 * value representing the class that is used to distinguish these items. */
sl@0
   267
typedef struct st_ex_class_item {
sl@0
   268
	int class_index;
sl@0
   269
	STACK_OF(CRYPTO_EX_DATA_FUNCS) *meth;
sl@0
   270
	int meth_num;
sl@0
   271
} EX_CLASS_ITEM;
sl@0
   272
sl@0
   273
#ifndef EMULATOR
sl@0
   274
/* When assigning new class indexes, this is our counter */
sl@0
   275
static int ex_class = CRYPTO_EX_INDEX_USER;
sl@0
   276
sl@0
   277
/* The global hash table of EX_CLASS_ITEM items */
sl@0
   278
static LHASH *ex_data = NULL;
sl@0
   279
#else
sl@0
   280
 GET_STATIC_VAR_FROM_TLS(ex_class ,ex_data,int)
sl@0
   281
 #define ex_class (*GET_WSD_VAR_NAME(ex_class ,ex_data,s)())
sl@0
   282
 GET_STATIC_VAR_FROM_TLS(ex_data ,ex_data,LHASH *)
sl@0
   283
 #define ex_data (*GET_WSD_VAR_NAME(ex_data ,ex_data,s)())
sl@0
   284
sl@0
   285
#endif
sl@0
   286
sl@0
   287
/* The callbacks required in the "ex_data" hash table */
sl@0
   288
static unsigned long ex_hash_cb(const void *a_void)
sl@0
   289
	{
sl@0
   290
	return ((const EX_CLASS_ITEM *)a_void)->class_index;
sl@0
   291
	}
sl@0
   292
static int ex_cmp_cb(const void *a_void, const void *b_void)
sl@0
   293
	{
sl@0
   294
	return (((const EX_CLASS_ITEM *)a_void)->class_index -
sl@0
   295
		((const EX_CLASS_ITEM *)b_void)->class_index);
sl@0
   296
	}
sl@0
   297
sl@0
   298
/* Internal functions used by the "impl_default" implementation to access the
sl@0
   299
 * state */
sl@0
   300
sl@0
   301
static int ex_data_check(void)
sl@0
   302
	{
sl@0
   303
	int toret = 1;
sl@0
   304
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   305
	if(!ex_data && ((ex_data = lh_new(ex_hash_cb, ex_cmp_cb)) == NULL))
sl@0
   306
		toret = 0;
sl@0
   307
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   308
	return toret;
sl@0
   309
	}
sl@0
   310
/* This macros helps reduce the locking from repeated checks because the
sl@0
   311
 * ex_data_check() function checks ex_data again inside a lock. */
sl@0
   312
#define EX_DATA_CHECK(iffail) if(!ex_data && !ex_data_check()) {iffail}
sl@0
   313
sl@0
   314
/* This "inner" callback is used by the callback function that follows it */
sl@0
   315
static void def_cleanup_util_cb(CRYPTO_EX_DATA_FUNCS *funcs)
sl@0
   316
	{
sl@0
   317
	OPENSSL_free(funcs);
sl@0
   318
	}
sl@0
   319
sl@0
   320
/* This callback is used in lh_doall to destroy all EX_CLASS_ITEM values from
sl@0
   321
 * "ex_data" prior to the ex_data hash table being itself destroyed. Doesn't do
sl@0
   322
 * any locking. */
sl@0
   323
static void def_cleanup_cb(void *a_void)
sl@0
   324
	{
sl@0
   325
	EX_CLASS_ITEM *item = (EX_CLASS_ITEM *)a_void;
sl@0
   326
	sk_CRYPTO_EX_DATA_FUNCS_pop_free(item->meth, def_cleanup_util_cb);
sl@0
   327
	OPENSSL_free(item);
sl@0
   328
	}
sl@0
   329
sl@0
   330
/* Return the EX_CLASS_ITEM from the "ex_data" hash table that corresponds to a
sl@0
   331
 * given class. Handles locking. */
sl@0
   332
static EX_CLASS_ITEM *def_get_class(int class_index)
sl@0
   333
	{
sl@0
   334
	EX_CLASS_ITEM d, *p, *gen;
sl@0
   335
	EX_DATA_CHECK(return NULL;)
sl@0
   336
	d.class_index = class_index;
sl@0
   337
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   338
	p = lh_retrieve(ex_data, &d);
sl@0
   339
	if(!p)
sl@0
   340
		{
sl@0
   341
		gen = OPENSSL_malloc(sizeof(EX_CLASS_ITEM));
sl@0
   342
		if(gen)
sl@0
   343
			{
sl@0
   344
			gen->class_index = class_index;
sl@0
   345
			gen->meth_num = 0;
sl@0
   346
			gen->meth = sk_CRYPTO_EX_DATA_FUNCS_new_null();
sl@0
   347
			if(!gen->meth)
sl@0
   348
				OPENSSL_free(gen);
sl@0
   349
			else
sl@0
   350
				{
sl@0
   351
				/* Because we're inside the ex_data lock, the
sl@0
   352
				 * return value from the insert will be NULL */
sl@0
   353
				lh_insert(ex_data, gen);
sl@0
   354
				p = gen;
sl@0
   355
				}
sl@0
   356
			}
sl@0
   357
		}
sl@0
   358
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   359
	if(!p)
sl@0
   360
		CRYPTOerr(CRYPTO_F_DEF_GET_CLASS,ERR_R_MALLOC_FAILURE);
sl@0
   361
	return p;
sl@0
   362
	}
sl@0
   363
sl@0
   364
/* Add a new method to the given EX_CLASS_ITEM and return the corresponding
sl@0
   365
 * index (or -1 for error). Handles locking. */
sl@0
   366
static int def_add_index(EX_CLASS_ITEM *item, long argl, void *argp,
sl@0
   367
		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
sl@0
   368
		CRYPTO_EX_free *free_func)
sl@0
   369
	{
sl@0
   370
	int toret = -1;
sl@0
   371
	CRYPTO_EX_DATA_FUNCS *a = (CRYPTO_EX_DATA_FUNCS *)OPENSSL_malloc(
sl@0
   372
					sizeof(CRYPTO_EX_DATA_FUNCS));
sl@0
   373
	if(!a)
sl@0
   374
		{
sl@0
   375
		CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX,ERR_R_MALLOC_FAILURE);
sl@0
   376
		return -1;
sl@0
   377
		}
sl@0
   378
	a->argl=argl;
sl@0
   379
	a->argp=argp;
sl@0
   380
	a->new_func=new_func;
sl@0
   381
	a->dup_func=dup_func;
sl@0
   382
	a->free_func=free_func;
sl@0
   383
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   384
	while (sk_CRYPTO_EX_DATA_FUNCS_num(item->meth) <= item->meth_num)
sl@0
   385
		{
sl@0
   386
		if (!sk_CRYPTO_EX_DATA_FUNCS_push(item->meth, NULL))
sl@0
   387
			{
sl@0
   388
			CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX,ERR_R_MALLOC_FAILURE);
sl@0
   389
			OPENSSL_free(a);
sl@0
   390
			goto err;
sl@0
   391
			}
sl@0
   392
		}
sl@0
   393
	toret = item->meth_num++;
sl@0
   394
	(void)sk_CRYPTO_EX_DATA_FUNCS_set(item->meth, toret, a);
sl@0
   395
err:
sl@0
   396
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   397
	return toret;
sl@0
   398
	}
sl@0
   399
sl@0
   400
/**************************************************************/
sl@0
   401
/* The functions in the default CRYPTO_EX_DATA_IMPL structure */
sl@0
   402
sl@0
   403
static int int_new_class(void)
sl@0
   404
	{
sl@0
   405
	int toret;
sl@0
   406
	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   407
	toret = ex_class++;
sl@0
   408
	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   409
	return toret;
sl@0
   410
	}
sl@0
   411
sl@0
   412
static void int_cleanup(void)
sl@0
   413
	{
sl@0
   414
	EX_DATA_CHECK(return;)
sl@0
   415
	lh_doall(ex_data, def_cleanup_cb);
sl@0
   416
	lh_free(ex_data);
sl@0
   417
	ex_data = NULL;
sl@0
   418
	impl = NULL;
sl@0
   419
	}
sl@0
   420
sl@0
   421
static int int_get_new_index(int class_index, long argl, void *argp,
sl@0
   422
		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
sl@0
   423
		CRYPTO_EX_free *free_func)
sl@0
   424
	{
sl@0
   425
	EX_CLASS_ITEM *item = def_get_class(class_index);
sl@0
   426
	if(!item)
sl@0
   427
		return -1;
sl@0
   428
	return def_add_index(item, argl, argp, new_func, dup_func, free_func);
sl@0
   429
	}
sl@0
   430
sl@0
   431
/* Thread-safe by copying a class's array of "CRYPTO_EX_DATA_FUNCS" entries in
sl@0
   432
 * the lock, then using them outside the lock. NB: Thread-safety only applies to
sl@0
   433
 * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad'
sl@0
   434
 * itself. */
sl@0
   435
static int int_new_ex_data(int class_index, void *obj,
sl@0
   436
		CRYPTO_EX_DATA *ad)
sl@0
   437
	{
sl@0
   438
	int mx,i;
sl@0
   439
	void *ptr;
sl@0
   440
	CRYPTO_EX_DATA_FUNCS **storage = NULL;
sl@0
   441
	EX_CLASS_ITEM *item = def_get_class(class_index);
sl@0
   442
	if(!item)
sl@0
   443
		/* error is already set */
sl@0
   444
		return 0;
sl@0
   445
	ad->sk = NULL;
sl@0
   446
	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   447
	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
sl@0
   448
	if(mx > 0)
sl@0
   449
		{
sl@0
   450
		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
sl@0
   451
		if(!storage)
sl@0
   452
			goto skip;
sl@0
   453
		for(i = 0; i < mx; i++)
sl@0
   454
			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
sl@0
   455
		}
sl@0
   456
skip:
sl@0
   457
	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   458
	if((mx > 0) && !storage)
sl@0
   459
		{
sl@0
   460
		CRYPTOerr(CRYPTO_F_INT_NEW_EX_DATA,ERR_R_MALLOC_FAILURE);
sl@0
   461
		return 0;
sl@0
   462
		}
sl@0
   463
	for(i = 0; i < mx; i++)
sl@0
   464
		{
sl@0
   465
		if(storage[i] && storage[i]->new_func)
sl@0
   466
			{
sl@0
   467
			ptr = CRYPTO_get_ex_data(ad, i);
sl@0
   468
			storage[i]->new_func(obj,ptr,ad,i,
sl@0
   469
				storage[i]->argl,storage[i]->argp);
sl@0
   470
			}
sl@0
   471
		}
sl@0
   472
	if(storage)
sl@0
   473
		OPENSSL_free(storage);
sl@0
   474
	return 1;
sl@0
   475
	}
sl@0
   476
sl@0
   477
/* Same thread-safety notes as for "int_new_ex_data" */
sl@0
   478
static int int_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
sl@0
   479
		CRYPTO_EX_DATA *from)
sl@0
   480
	{
sl@0
   481
	int mx, j, i;
sl@0
   482
	char *ptr;
sl@0
   483
	CRYPTO_EX_DATA_FUNCS **storage = NULL;
sl@0
   484
	EX_CLASS_ITEM *item;
sl@0
   485
	if(!from->sk)
sl@0
   486
		/* 'to' should be "blank" which *is* just like 'from' */
sl@0
   487
		return 1;
sl@0
   488
	if((item = def_get_class(class_index)) == NULL)
sl@0
   489
		return 0;
sl@0
   490
	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   491
	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
sl@0
   492
	j = sk_num(from->sk);
sl@0
   493
	if(j < mx)
sl@0
   494
		mx = j;
sl@0
   495
	if(mx > 0)
sl@0
   496
		{
sl@0
   497
		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
sl@0
   498
		if(!storage)
sl@0
   499
			goto skip;
sl@0
   500
		for(i = 0; i < mx; i++)
sl@0
   501
			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
sl@0
   502
		}
sl@0
   503
skip:
sl@0
   504
	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   505
	if((mx > 0) && !storage)
sl@0
   506
		{
sl@0
   507
		CRYPTOerr(CRYPTO_F_INT_DUP_EX_DATA,ERR_R_MALLOC_FAILURE);
sl@0
   508
		return 0;
sl@0
   509
		}
sl@0
   510
	for(i = 0; i < mx; i++)
sl@0
   511
		{
sl@0
   512
		ptr = CRYPTO_get_ex_data(from, i);
sl@0
   513
		if(storage[i] && storage[i]->dup_func)
sl@0
   514
			storage[i]->dup_func(to,from,&ptr,i,
sl@0
   515
				storage[i]->argl,storage[i]->argp);
sl@0
   516
		CRYPTO_set_ex_data(to,i,ptr);
sl@0
   517
		}
sl@0
   518
	if(storage)
sl@0
   519
		OPENSSL_free(storage);
sl@0
   520
	return 1;
sl@0
   521
	}
sl@0
   522
sl@0
   523
/* Same thread-safety notes as for "int_new_ex_data" */
sl@0
   524
static void int_free_ex_data(int class_index, void *obj,
sl@0
   525
		CRYPTO_EX_DATA *ad)
sl@0
   526
	{
sl@0
   527
	int mx,i;
sl@0
   528
	EX_CLASS_ITEM *item;
sl@0
   529
	void *ptr;
sl@0
   530
	CRYPTO_EX_DATA_FUNCS **storage = NULL;
sl@0
   531
	if((item = def_get_class(class_index)) == NULL)
sl@0
   532
		return;
sl@0
   533
	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
sl@0
   534
	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
sl@0
   535
	if(mx > 0)
sl@0
   536
		{
sl@0
   537
		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
sl@0
   538
		if(!storage)
sl@0
   539
			goto skip;
sl@0
   540
		for(i = 0; i < mx; i++)
sl@0
   541
			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
sl@0
   542
		}
sl@0
   543
skip:
sl@0
   544
	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
sl@0
   545
	if((mx > 0) && !storage)
sl@0
   546
		{
sl@0
   547
		CRYPTOerr(CRYPTO_F_INT_FREE_EX_DATA,ERR_R_MALLOC_FAILURE);
sl@0
   548
		return;
sl@0
   549
		}
sl@0
   550
	for(i = 0; i < mx; i++)
sl@0
   551
		{
sl@0
   552
		if(storage[i] && storage[i]->free_func)
sl@0
   553
			{
sl@0
   554
			ptr = CRYPTO_get_ex_data(ad,i);
sl@0
   555
			storage[i]->free_func(obj,ptr,ad,i,
sl@0
   556
				storage[i]->argl,storage[i]->argp);
sl@0
   557
			}
sl@0
   558
		}
sl@0
   559
	if(storage)
sl@0
   560
		OPENSSL_free(storage);
sl@0
   561
	if(ad->sk)
sl@0
   562
		{
sl@0
   563
		sk_free(ad->sk);
sl@0
   564
		ad->sk=NULL;
sl@0
   565
		}
sl@0
   566
	}
sl@0
   567
sl@0
   568
/********************************************************************/
sl@0
   569
/* API functions that defer all "state" operations to the "ex_data"
sl@0
   570
 * implementation we have set. */
sl@0
   571
sl@0
   572
/* Obtain an index for a new class (not the same as getting a new index within
sl@0
   573
 * an existing class - this is actually getting a new *class*) */
sl@0
   574
EXPORT_C int CRYPTO_ex_data_new_class(void)
sl@0
   575
	{
sl@0
   576
	IMPL_CHECK
sl@0
   577
	return EX_IMPL(new_class)();
sl@0
   578
	}
sl@0
   579
sl@0
   580
/* Release all "ex_data" state to prevent memory leaks. This can't be made
sl@0
   581
 * thread-safe without overhauling a lot of stuff, and shouldn't really be
sl@0
   582
 * called under potential race-conditions anyway (it's for program shutdown
sl@0
   583
 * after all). */
sl@0
   584
EXPORT_C void CRYPTO_cleanup_all_ex_data(void)
sl@0
   585
	{
sl@0
   586
	IMPL_CHECK
sl@0
   587
	EX_IMPL(cleanup)();
sl@0
   588
	}
sl@0
   589
sl@0
   590
/* Inside an existing class, get/register a new index. */
sl@0
   591
EXPORT_C int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp,
sl@0
   592
		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
sl@0
   593
		CRYPTO_EX_free *free_func)
sl@0
   594
	{
sl@0
   595
	int ret = -1;
sl@0
   596
sl@0
   597
	IMPL_CHECK
sl@0
   598
	ret = EX_IMPL(get_new_index)(class_index,
sl@0
   599
			argl, argp, new_func, dup_func, free_func);
sl@0
   600
	return ret;
sl@0
   601
	}
sl@0
   602
sl@0
   603
/* Initialise a new CRYPTO_EX_DATA for use in a particular class - including
sl@0
   604
 * calling new() callbacks for each index in the class used by this variable */
sl@0
   605
EXPORT_C int CRYPTO_new_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad)
sl@0
   606
	{
sl@0
   607
	IMPL_CHECK
sl@0
   608
	return EX_IMPL(new_ex_data)(class_index, obj, ad);
sl@0
   609
	}
sl@0
   610
sl@0
   611
/* Duplicate a CRYPTO_EX_DATA variable - including calling dup() callbacks for
sl@0
   612
 * each index in the class used by this variable */
sl@0
   613
EXPORT_C int CRYPTO_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
sl@0
   614
	     CRYPTO_EX_DATA *from)
sl@0
   615
	{
sl@0
   616
	IMPL_CHECK
sl@0
   617
	return EX_IMPL(dup_ex_data)(class_index, to, from);
sl@0
   618
	}
sl@0
   619
sl@0
   620
/* Cleanup a CRYPTO_EX_DATA variable - including calling free() callbacks for
sl@0
   621
 * each index in the class used by this variable */
sl@0
   622
EXPORT_C void CRYPTO_free_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad)
sl@0
   623
	{
sl@0
   624
	IMPL_CHECK
sl@0
   625
	EX_IMPL(free_ex_data)(class_index, obj, ad);
sl@0
   626
	}
sl@0
   627
sl@0
   628
/* For a given CRYPTO_EX_DATA variable, set the value corresponding to a
sl@0
   629
 * particular index in the class used by this variable */
sl@0
   630
EXPORT_C int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int idx, void *val)
sl@0
   631
	{
sl@0
   632
	int i;
sl@0
   633
sl@0
   634
	if (ad->sk == NULL)
sl@0
   635
		{
sl@0
   636
		if ((ad->sk=sk_new_null()) == NULL)
sl@0
   637
			{
sl@0
   638
			CRYPTOerr(CRYPTO_F_CRYPTO_SET_EX_DATA,ERR_R_MALLOC_FAILURE);
sl@0
   639
			return(0);
sl@0
   640
			}
sl@0
   641
		}
sl@0
   642
	i=sk_num(ad->sk);
sl@0
   643
sl@0
   644
	while (i <= idx)
sl@0
   645
		{
sl@0
   646
		if (!sk_push(ad->sk,NULL))
sl@0
   647
			{
sl@0
   648
			CRYPTOerr(CRYPTO_F_CRYPTO_SET_EX_DATA,ERR_R_MALLOC_FAILURE);
sl@0
   649
			return(0);
sl@0
   650
			}
sl@0
   651
		i++;
sl@0
   652
		}
sl@0
   653
	sk_set(ad->sk,idx,val);
sl@0
   654
	return(1);
sl@0
   655
	}
sl@0
   656
sl@0
   657
/* For a given CRYPTO_EX_DATA_ variable, get the value corresponding to a
sl@0
   658
 * particular index in the class used by this variable */
sl@0
   659
EXPORT_C void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad, int idx)
sl@0
   660
	{
sl@0
   661
	if (ad->sk == NULL)
sl@0
   662
		return(0);
sl@0
   663
	else if (idx >= sk_num(ad->sk))
sl@0
   664
		return(0);
sl@0
   665
	else
sl@0
   666
		return(sk_value(ad->sk,idx));
sl@0
   667
	}
sl@0
   668
sl@0
   669
IMPLEMENT_STACK_OF(CRYPTO_EX_DATA_FUNCS)