os/ossrv/ssl/libcrypto/src/crypto/mem_dbg.c
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/ossrv/ssl/libcrypto/src/crypto/mem_dbg.c	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,840 @@
     1.4 +/* crypto/mem_dbg.c */
     1.5 +/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     1.6 + * All rights reserved.
     1.7 + *
     1.8 + * This package is an SSL implementation written
     1.9 + * by Eric Young (eay@cryptsoft.com).
    1.10 + * The implementation was written so as to conform with Netscapes SSL.
    1.11 + * 
    1.12 + * This library is free for commercial and non-commercial use as long as
    1.13 + * the following conditions are aheared to.  The following conditions
    1.14 + * apply to all code found in this distribution, be it the RC4, RSA,
    1.15 + * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    1.16 + * included with this distribution is covered by the same copyright terms
    1.17 + * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    1.18 + * 
    1.19 + * Copyright remains Eric Young's, and as such any Copyright notices in
    1.20 + * the code are not to be removed.
    1.21 + * If this package is used in a product, Eric Young should be given attribution
    1.22 + * as the author of the parts of the library used.
    1.23 + * This can be in the form of a textual message at program startup or
    1.24 + * in documentation (online or textual) provided with the package.
    1.25 + * 
    1.26 + * Redistribution and use in source and binary forms, with or without
    1.27 + * modification, are permitted provided that the following conditions
    1.28 + * are met:
    1.29 + * 1. Redistributions of source code must retain the copyright
    1.30 + *    notice, this list of conditions and the following disclaimer.
    1.31 + * 2. Redistributions in binary form must reproduce the above copyright
    1.32 + *    notice, this list of conditions and the following disclaimer in the
    1.33 + *    documentation and/or other materials provided with the distribution.
    1.34 + * 3. All advertising materials mentioning features or use of this software
    1.35 + *    must display the following acknowledgement:
    1.36 + *    "This product includes cryptographic software written by
    1.37 + *     Eric Young (eay@cryptsoft.com)"
    1.38 + *    The word 'cryptographic' can be left out if the rouines from the library
    1.39 + *    being used are not cryptographic related :-).
    1.40 + * 4. If you include any Windows specific code (or a derivative thereof) from 
    1.41 + *    the apps directory (application code) you must include an acknowledgement:
    1.42 + *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    1.43 + * 
    1.44 + * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    1.45 + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    1.46 + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    1.47 + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    1.48 + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    1.49 + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    1.50 + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    1.51 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    1.52 + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    1.53 + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    1.54 + * SUCH DAMAGE.
    1.55 + * 
    1.56 + * The licence and distribution terms for any publically available version or
    1.57 + * derivative of this code cannot be changed.  i.e. this code cannot simply be
    1.58 + * copied and put under another distribution licence
    1.59 + * [including the GNU Public Licence.]
    1.60 + */
    1.61 +/*
    1.62 + © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
    1.63 + */
    1.64 +
    1.65 +#include <stdio.h>
    1.66 +#include <stdlib.h>
    1.67 +#include <time.h>	
    1.68 +#include "cryptlib.h"
    1.69 +#include <openssl/crypto.h>
    1.70 +#include <openssl/buffer.h>
    1.71 +#include <openssl/bio.h>
    1.72 +#include <openssl/lhash.h>
    1.73 +
    1.74 +#if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
    1.75 +#include "libcrypto_wsd_macros.h"
    1.76 +#include "libcrypto_wsd.h"
    1.77 +#endif
    1.78 +
    1.79 +#ifndef EMULATOR
    1.80 +static int mh_mode=CRYPTO_MEM_CHECK_OFF;
    1.81 +/* The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE
    1.82 + * when the application asks for it (usually after library initialisation
    1.83 + * for which no book-keeping is desired).
    1.84 + *
    1.85 + * State CRYPTO_MEM_CHECK_ON exists only temporarily when the library
    1.86 + * thinks that certain allocations should not be checked (e.g. the data
    1.87 + * structures used for memory checking).  It is not suitable as an initial
    1.88 + * state: the library will unexpectedly enable memory checking when it
    1.89 + * executes one of those sections that want to disable checking
    1.90 + * temporarily.
    1.91 + *
    1.92 + * State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes no sense whatsoever.
    1.93 + */
    1.94 +
    1.95 +static unsigned long order = 0; /* number of memory requests */
    1.96 +static LHASH *mh=NULL; /* hash-table of memory requests (address as key);
    1.97 +                       * access requires MALLOC2 lock */
    1.98 +                   
    1.99 +
   1.100 +#endif                        
   1.101 +
   1.102 +
   1.103 +typedef struct app_mem_info_st
   1.104 +/* For application-defined information (static C-string `info')
   1.105 + * to be displayed in memory leak list.
   1.106 + * Each thread has its own stack.  For applications, there is
   1.107 + *   CRYPTO_push_info("...")     to push an entry,
   1.108 + *   CRYPTO_pop_info()           to pop an entry,
   1.109 + *   CRYPTO_remove_all_info()    to pop all entries.
   1.110 + */
   1.111 +	{	
   1.112 +	unsigned long thread;
   1.113 +	const char *file;
   1.114 +	int line;
   1.115 +	const char *info;
   1.116 +	struct app_mem_info_st *next; /* tail of thread's stack */
   1.117 +	int references;
   1.118 +	} APP_INFO;
   1.119 +
   1.120 +static void app_info_free(APP_INFO *);
   1.121 +
   1.122 +#ifndef EMULATOR
   1.123 +static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's
   1.124 +                          * that are at the top of their thread's stack
   1.125 +                          * (with `thread' as key);
   1.126 +                          * access requires MALLOC2 lock */
   1.127 +#else
   1.128 + GET_STATIC_VAR_FROM_TLS(amih,mem_dbg,LHASH *)
   1.129 + #define amih (*GET_WSD_VAR_NAME(amih,mem_dbg,s)())
   1.130 +#endif                           
   1.131 +
   1.132 +typedef struct mem_st
   1.133 +/* memory-block description */
   1.134 +	{
   1.135 +	void *addr;
   1.136 +	int num;
   1.137 +	const char *file;
   1.138 +	int line;
   1.139 +	unsigned long thread;
   1.140 +	unsigned long iorder;
   1.141 +	time_t time;
   1.142 +	APP_INFO *app_info;
   1.143 +	} MEM;
   1.144 +
   1.145 +
   1.146 +
   1.147 +#ifdef EMULATOR
   1.148 + GET_STATIC_VAR_FROM_TLS(mh_mode,mem_dbg,int)
   1.149 + #define mh_mode (*GET_WSD_VAR_NAME(mh_mode,mem_dbg,s)())
   1.150 + GET_STATIC_VAR_FROM_TLS(order,mem_dbg,unsigned long)
   1.151 + #define order (*GET_WSD_VAR_NAME(order,mem_dbg,s)())
   1.152 + GET_STATIC_VAR_FROM_TLS(mh,mem_dbg,LHASH*)
   1.153 + #define mh (*GET_WSD_VAR_NAME(mh,mem_dbg,s)())
   1.154 +#endif 
   1.155 +
   1.156 +#ifndef EMULATOR
   1.157 +static long options =             /* extra information to be recorded */
   1.158 +#if defined(CRYPTO_MDEBUG_TIME) || defined(CRYPTO_MDEBUG_ALL)
   1.159 +	V_CRYPTO_MDEBUG_TIME |
   1.160 +#endif
   1.161 +#if defined(CRYPTO_MDEBUG_THREAD) || defined(CRYPTO_MDEBUG_ALL)
   1.162 +	V_CRYPTO_MDEBUG_THREAD |
   1.163 +#endif
   1.164 +	0;
   1.165 +static unsigned int num_disable = 0; /* num_disable > 0
   1.166 +                                      *     iff
   1.167 +                                      * mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE)
   1.168 +                                      */
   1.169 +static unsigned long disabling_thread = 0; /* Valid iff num_disable > 0.
   1.170 +                                            * CRYPTO_LOCK_MALLOC2 is locked
   1.171 +                                            * exactly in this case (by the
   1.172 +                                            * thread named in disabling_thread).
   1.173 +                                            */
   1.174 +
   1.175 +#else
   1.176 + GET_STATIC_VAR_FROM_TLS(options,mem_dbg,unsigned long)
   1.177 + #define options (*GET_WSD_VAR_NAME(options,mem_dbg,s)())
   1.178 + GET_STATIC_VAR_FROM_TLS(num_disable,mem_dbg,unsigned int)
   1.179 + #define num_disable (*GET_WSD_VAR_NAME(num_disable,mem_dbg,s)())
   1.180 + GET_STATIC_VAR_FROM_TLS(disabling_thread,mem_dbg,unsigned long)
   1.181 + #define disabling_thread (*GET_WSD_VAR_NAME(disabling_thread,mem_dbg,s)())
   1.182 +#endif	
   1.183 +
   1.184 +
   1.185 +
   1.186 +static void app_info_free(APP_INFO *inf)
   1.187 +	{
   1.188 +	if (--(inf->references) <= 0)
   1.189 +		{
   1.190 +		if (inf->next != NULL)
   1.191 +			{
   1.192 +			app_info_free(inf->next);
   1.193 +			}
   1.194 +		OPENSSL_free(inf);
   1.195 +		}
   1.196 +	}
   1.197 +
   1.198 +EXPORT_C int CRYPTO_mem_ctrl(int mode)
   1.199 +	{
   1.200 +	int ret=mh_mode;
   1.201 +
   1.202 +	CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   1.203 +	switch (mode)
   1.204 +		{
   1.205 +	/* for applications (not to be called while multiple threads
   1.206 +	 * use the library): */
   1.207 +	case CRYPTO_MEM_CHECK_ON: /* aka MemCheck_start() */
   1.208 +		mh_mode = CRYPTO_MEM_CHECK_ON|CRYPTO_MEM_CHECK_ENABLE;
   1.209 +		num_disable = 0;
   1.210 +		break;
   1.211 +	case CRYPTO_MEM_CHECK_OFF: /* aka MemCheck_stop() */
   1.212 +		mh_mode = 0;
   1.213 +		num_disable = 0; /* should be true *before* MemCheck_stop is used,
   1.214 +		                    or there'll be a lot of confusion */
   1.215 +		break;
   1.216 +
   1.217 +	/* switch off temporarily (for library-internal use): */
   1.218 +	case CRYPTO_MEM_CHECK_DISABLE: /* aka MemCheck_off() */
   1.219 +		if (mh_mode & CRYPTO_MEM_CHECK_ON)
   1.220 +			{
   1.221 +			if (!num_disable || (disabling_thread != CRYPTO_thread_id())) /* otherwise we already have the MALLOC2 lock */
   1.222 +				{
   1.223 +				/* Long-time lock CRYPTO_LOCK_MALLOC2 must not be claimed while
   1.224 +				 * we're holding CRYPTO_LOCK_MALLOC, or we'll deadlock if
   1.225 +				 * somebody else holds CRYPTO_LOCK_MALLOC2 (and cannot release
   1.226 +				 * it because we block entry to this function).
   1.227 +				 * Give them a chance, first, and then claim the locks in
   1.228 +				 * appropriate order (long-time lock first).
   1.229 +				 */
   1.230 +				CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   1.231 +				/* Note that after we have waited for CRYPTO_LOCK_MALLOC2
   1.232 +				 * and CRYPTO_LOCK_MALLOC, we'll still be in the right
   1.233 +				 * "case" and "if" branch because MemCheck_start and
   1.234 +				 * MemCheck_stop may never be used while there are multiple
   1.235 +				 * OpenSSL threads. */
   1.236 +				CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
   1.237 +				CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   1.238 +				mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE;
   1.239 +				disabling_thread=CRYPTO_thread_id();
   1.240 +				}
   1.241 +			num_disable++;
   1.242 +			}
   1.243 +		break;
   1.244 +	case CRYPTO_MEM_CHECK_ENABLE: /* aka MemCheck_on() */
   1.245 +		if (mh_mode & CRYPTO_MEM_CHECK_ON)
   1.246 +			{
   1.247 +			if (num_disable) /* always true, or something is going wrong */
   1.248 +				{
   1.249 +				num_disable--;
   1.250 +				if (num_disable == 0)
   1.251 +					{
   1.252 +					mh_mode|=CRYPTO_MEM_CHECK_ENABLE;
   1.253 +					CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
   1.254 +					}
   1.255 +				}
   1.256 +			}
   1.257 +		break;
   1.258 +
   1.259 +	default:
   1.260 +		break;
   1.261 +		}
   1.262 +	CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   1.263 +	return(ret);
   1.264 +	}
   1.265 +
   1.266 +EXPORT_C int CRYPTO_is_mem_check_on(void)
   1.267 +	{
   1.268 +	int ret = 0;
   1.269 +
   1.270 +	if (mh_mode & CRYPTO_MEM_CHECK_ON)
   1.271 +		{
   1.272 +		CRYPTO_r_lock(CRYPTO_LOCK_MALLOC);
   1.273 +
   1.274 +		ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE)
   1.275 +			|| (disabling_thread != CRYPTO_thread_id());
   1.276 +
   1.277 +		CRYPTO_r_unlock(CRYPTO_LOCK_MALLOC);
   1.278 +		}
   1.279 +	return(ret);
   1.280 +	}	
   1.281 +
   1.282 +
   1.283 +EXPORT_C void CRYPTO_dbg_set_options(long bits)
   1.284 +	{
   1.285 +	options = bits;
   1.286 +	}
   1.287 +
   1.288 +EXPORT_C long CRYPTO_dbg_get_options(void)
   1.289 +	{
   1.290 +	return options;
   1.291 +	}
   1.292 +
   1.293 +/* static int mem_cmp(MEM *a, MEM *b) */
   1.294 +static int mem_cmp(const void *a_void, const void *b_void)
   1.295 +	{
   1.296 +#ifdef _WIN64
   1.297 +	const char *a=(const char *)((const MEM *)a_void)->addr,
   1.298 +		   *b=(const char *)((const MEM *)b_void)->addr;
   1.299 +	if (a==b)	return 0;
   1.300 +	else if (a>b)	return 1;
   1.301 +	else		return -1;
   1.302 +#else
   1.303 +	return((const char *)((const MEM *)a_void)->addr
   1.304 +		- (const char *)((const MEM *)b_void)->addr);
   1.305 +#endif
   1.306 +	}
   1.307 +
   1.308 +/* static unsigned long mem_hash(MEM *a) */
   1.309 +static unsigned long mem_hash(const void *a_void)
   1.310 +	{
   1.311 +	unsigned long ret;
   1.312 +
   1.313 +	ret=(unsigned long)((const MEM *)a_void)->addr;
   1.314 +
   1.315 +	ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
   1.316 +	return(ret);
   1.317 +	}
   1.318 +
   1.319 +/* static int app_info_cmp(APP_INFO *a, APP_INFO *b) */
   1.320 +static int app_info_cmp(const void *a_void, const void *b_void)
   1.321 +	{
   1.322 +	return(((const APP_INFO *)a_void)->thread
   1.323 +		!= ((const APP_INFO *)b_void)->thread);
   1.324 +	}
   1.325 +
   1.326 +/* static unsigned long app_info_hash(APP_INFO *a) */
   1.327 +static unsigned long app_info_hash(const void *a_void)
   1.328 +	{
   1.329 +	unsigned long ret;
   1.330 +
   1.331 +	ret=(unsigned long)((const APP_INFO *)a_void)->thread;
   1.332 +
   1.333 +	ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
   1.334 +	return(ret);
   1.335 +	}
   1.336 +
   1.337 +static APP_INFO *pop_info(void)
   1.338 +	{
   1.339 +	APP_INFO tmp;
   1.340 +	APP_INFO *ret = NULL;
   1.341 +
   1.342 +	if (amih != NULL)
   1.343 +		{
   1.344 +		tmp.thread=CRYPTO_thread_id();
   1.345 +		if ((ret=(APP_INFO *)lh_delete(amih,&tmp)) != NULL)
   1.346 +			{
   1.347 +			APP_INFO *next=ret->next;
   1.348 +
   1.349 +			if (next != NULL)
   1.350 +				{
   1.351 +				next->references++;
   1.352 +				lh_insert(amih,(char *)next);
   1.353 +				}
   1.354 +#ifdef LEVITTE_DEBUG_MEM
   1.355 +			if (ret->thread != tmp.thread)
   1.356 +				{
   1.357 +				fprintf(stderr, "pop_info(): deleted info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
   1.358 +					ret->thread, tmp.thread);
   1.359 +				abort();
   1.360 +				}
   1.361 +#endif
   1.362 +			if (--(ret->references) <= 0)
   1.363 +				{
   1.364 +				ret->next = NULL;
   1.365 +				if (next != NULL)
   1.366 +					next->references--;
   1.367 +				OPENSSL_free(ret);
   1.368 +				}
   1.369 +			}
   1.370 +		}
   1.371 +	return(ret);
   1.372 +	}
   1.373 +
   1.374 +EXPORT_C int CRYPTO_push_info_(const char *info, const char *file, int line)
   1.375 +	{
   1.376 +	APP_INFO *ami=NULL, *amim=NULL;
   1.377 +	int ret=0;
   1.378 +
   1.379 +	if (is_MemCheck_on())
   1.380 +		{
   1.381 +		MemCheck_off(); /* obtain MALLOC2 lock */
   1.382 +
   1.383 +		if ((ami = (APP_INFO *)OPENSSL_malloc(sizeof(APP_INFO))) == NULL)
   1.384 +			{
   1.385 +			ret=0;
   1.386 +			goto err;
   1.387 +			}
   1.388 +		if (amih == NULL)
   1.389 +			{
   1.390 +			if ((amih=lh_new(app_info_hash, app_info_cmp)) == NULL)
   1.391 +				{
   1.392 +				OPENSSL_free(ami);
   1.393 +				ret=0;
   1.394 +				goto err;
   1.395 +				}
   1.396 +			}
   1.397 +
   1.398 +		ami->thread=CRYPTO_thread_id();
   1.399 +		ami->file=file;
   1.400 +		ami->line=line;
   1.401 +		ami->info=info;
   1.402 +		ami->references=1;
   1.403 +		ami->next=NULL;
   1.404 +
   1.405 +		if ((amim=(APP_INFO *)lh_insert(amih,(char *)ami)) != NULL)
   1.406 +			{
   1.407 +#ifdef LEVITTE_DEBUG_MEM
   1.408 +			if (ami->thread != amim->thread)
   1.409 +				{
   1.410 +				fprintf(stderr, "CRYPTO_push_info(): previous info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
   1.411 +					amim->thread, ami->thread);
   1.412 +				abort();
   1.413 +				}
   1.414 +#endif
   1.415 +			ami->next=amim;
   1.416 +			}
   1.417 + err:
   1.418 +		MemCheck_on(); /* release MALLOC2 lock */
   1.419 +		}
   1.420 +
   1.421 +	return(ret);
   1.422 +	}
   1.423 +
   1.424 +EXPORT_C int CRYPTO_pop_info(void)
   1.425 +	{
   1.426 +	int ret=0;
   1.427 +
   1.428 +	if (is_MemCheck_on()) /* _must_ be true, or something went severely wrong */
   1.429 +		{
   1.430 +		MemCheck_off(); /* obtain MALLOC2 lock */
   1.431 +
   1.432 +		ret=(pop_info() != NULL);
   1.433 +
   1.434 +		MemCheck_on(); /* release MALLOC2 lock */
   1.435 +		}
   1.436 +	return(ret);
   1.437 +	}
   1.438 +
   1.439 +EXPORT_C int CRYPTO_remove_all_info(void)
   1.440 +	{
   1.441 +	int ret=0;
   1.442 +
   1.443 +	if (is_MemCheck_on()) /* _must_ be true */
   1.444 +		{
   1.445 +		MemCheck_off(); /* obtain MALLOC2 lock */
   1.446 +
   1.447 +		while(pop_info() != NULL)
   1.448 +			ret++;
   1.449 +
   1.450 +		MemCheck_on(); /* release MALLOC2 lock */
   1.451 +		}
   1.452 +	return(ret);
   1.453 +	}
   1.454 +
   1.455 +#ifndef EMULATOR
   1.456 +static unsigned long break_order_num=0;
   1.457 +#else
   1.458 +static const unsigned long break_order_num=0;
   1.459 +#endif
   1.460 +EXPORT_C void CRYPTO_dbg_malloc(void *addr, int num, const char *file, int line,
   1.461 +	int before_p)
   1.462 +	{
   1.463 +	MEM *m=NULL,*mm=NULL;
   1.464 +	APP_INFO tmp,*amim=NULL;
   1.465 +
   1.466 +	switch(before_p & 127)
   1.467 +		{
   1.468 +	case 0:
   1.469 +		break;
   1.470 +	case 1:
   1.471 +		if (addr == NULL)
   1.472 +			break;
   1.473 +
   1.474 +		if (is_MemCheck_on())
   1.475 +			{
   1.476 +			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   1.477 +			if ((m=(MEM *)OPENSSL_malloc(sizeof(MEM))) == NULL)
   1.478 +				{
   1.479 +				OPENSSL_free(addr);
   1.480 +				MemCheck_on(); /* release MALLOC2 lock
   1.481 +				                * if num_disabled drops to 0 */
   1.482 +				return;
   1.483 +				}
   1.484 +			if (mh == NULL)
   1.485 +				{
   1.486 +				if ((mh=lh_new(mem_hash, mem_cmp)) == NULL)
   1.487 +					{
   1.488 +					OPENSSL_free(addr);
   1.489 +					OPENSSL_free(m);
   1.490 +					addr=NULL;
   1.491 +					goto err;
   1.492 +					}
   1.493 +				}
   1.494 +
   1.495 +			m->addr=addr;
   1.496 +			m->file=file;
   1.497 +			m->line=line;
   1.498 +			m->num=num;
   1.499 +			if (options & V_CRYPTO_MDEBUG_THREAD)
   1.500 +				m->thread=CRYPTO_thread_id();
   1.501 +			else
   1.502 +				m->thread=0;
   1.503 +
   1.504 +			if (order == break_order_num)
   1.505 +				{
   1.506 +				/* BREAK HERE */
   1.507 +				m->iorder=order;
   1.508 +				}
   1.509 +			m->iorder=order++;
   1.510 +#ifdef LEVITTE_DEBUG_MEM
   1.511 +			fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] %c 0x%p (%d)\n",
   1.512 +				m->iorder,
   1.513 +				(before_p & 128) ? '*' : '+',
   1.514 +				m->addr, m->num);
   1.515 +#endif
   1.516 +			if (options & V_CRYPTO_MDEBUG_TIME)
   1.517 +				m->time=time(NULL);
   1.518 +			else
   1.519 +				m->time=0;
   1.520 +
   1.521 +			tmp.thread=CRYPTO_thread_id();
   1.522 +			m->app_info=NULL;
   1.523 +			if (amih != NULL
   1.524 +				&& (amim=(APP_INFO *)lh_retrieve(amih,(char *)&tmp)) != NULL)
   1.525 +				{
   1.526 +				m->app_info = amim;
   1.527 +				amim->references++;
   1.528 +				}
   1.529 +
   1.530 +			if ((mm=(MEM *)lh_insert(mh,(char *)m)) != NULL)
   1.531 +				{
   1.532 +				/* Not good, but don't sweat it */
   1.533 +				if (mm->app_info != NULL)
   1.534 +					{
   1.535 +					mm->app_info->references--;
   1.536 +					}
   1.537 +				OPENSSL_free(mm);
   1.538 +				}
   1.539 +		err:
   1.540 +			MemCheck_on(); /* release MALLOC2 lock
   1.541 +			                * if num_disabled drops to 0 */
   1.542 +			}
   1.543 +		break;
   1.544 +		}
   1.545 +	return;
   1.546 +	}
   1.547 +
   1.548 +EXPORT_C void CRYPTO_dbg_free(void *addr, int before_p)
   1.549 +	{
   1.550 +	MEM m,*mp=NULL;
   1.551 +
   1.552 +	switch(before_p)
   1.553 +		{
   1.554 +	case 0:
   1.555 +		if (addr == NULL)
   1.556 +			break;
   1.557 +
   1.558 +		if (is_MemCheck_on() && (mh != NULL))
   1.559 +			{
   1.560 +			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   1.561 +
   1.562 +			m.addr=addr;
   1.563 +			mp=(MEM *)lh_delete(mh,(char *)&m);
   1.564 +			if (mp != NULL)
   1.565 +				{
   1.566 +#ifdef LEVITTE_DEBUG_MEM
   1.567 +			fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] - 0x%p (%d)\n",
   1.568 +				mp->order, mp->addr, mp->num);
   1.569 +#endif
   1.570 +				if (mp->app_info != NULL)
   1.571 +					app_info_free(mp->app_info);
   1.572 +				OPENSSL_free(mp);
   1.573 +				}
   1.574 +
   1.575 +			MemCheck_on(); /* release MALLOC2 lock
   1.576 +			                * if num_disabled drops to 0 */
   1.577 +			}
   1.578 +		break;
   1.579 +	case 1:
   1.580 +		break;
   1.581 +		}
   1.582 +	}
   1.583 +
   1.584 +EXPORT_C void CRYPTO_dbg_realloc(void *addr1, void *addr2, int num,
   1.585 +	const char *file, int line, int before_p)
   1.586 +	{
   1.587 +	MEM m,*mp;
   1.588 +
   1.589 +#ifdef LEVITTE_DEBUG_MEM
   1.590 +	fprintf(stderr, "LEVITTE_DEBUG_MEM: --> CRYPTO_dbg_malloc(addr1 = %p, addr2 = %p, num = %d, file = \"%s\", line = %d, before_p = %d)\n",
   1.591 +		addr1, addr2, num, file, line, before_p);
   1.592 +#endif
   1.593 +
   1.594 +	switch(before_p)
   1.595 +		{
   1.596 +	case 0:
   1.597 +		break;
   1.598 +	case 1:
   1.599 +		if (addr2 == NULL)
   1.600 +			break;
   1.601 +
   1.602 +		if (addr1 == NULL)
   1.603 +			{
   1.604 +			CRYPTO_dbg_malloc(addr2, num, file, line, 128 | before_p);
   1.605 +			break;
   1.606 +			}
   1.607 +
   1.608 +		if (is_MemCheck_on())
   1.609 +			{
   1.610 +			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   1.611 +
   1.612 +			m.addr=addr1;
   1.613 +			mp=(MEM *)lh_delete(mh,(char *)&m);
   1.614 +			if (mp != NULL)
   1.615 +				{
   1.616 +#ifdef LEVITTE_DEBUG_MEM
   1.617 +				fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] * 0x%p (%d) -> 0x%p (%d)\n",
   1.618 +					mp->order,
   1.619 +					mp->addr, mp->num,
   1.620 +					addr2, num);
   1.621 +#endif
   1.622 +				mp->addr=addr2;
   1.623 +				mp->num=num;
   1.624 +				lh_insert(mh,(char *)mp);
   1.625 +				}
   1.626 +
   1.627 +			MemCheck_on(); /* release MALLOC2 lock
   1.628 +			                * if num_disabled drops to 0 */
   1.629 +			}
   1.630 +		break;
   1.631 +		}
   1.632 +	return;
   1.633 +	}
   1.634 +
   1.635 +
   1.636 +typedef struct mem_leak_st
   1.637 +	{
   1.638 +	BIO *bio;
   1.639 +	int chunks;
   1.640 +	long bytes;
   1.641 +	} MEM_LEAK;
   1.642 +
   1.643 +static void print_leak(const MEM *m, MEM_LEAK *l)
   1.644 +	{
   1.645 +#ifndef SYMBIAN		
   1.646 +	char buf[1024];
   1.647 +#else
   1.648 +  char buf[512];
   1.649 +#endif	
   1.650 +	char *bufp = buf;
   1.651 +	APP_INFO *amip;
   1.652 +	int ami_cnt;
   1.653 +	struct tm *lcl = NULL;
   1.654 +	unsigned long ti;
   1.655 +
   1.656 +#define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf))
   1.657 +
   1.658 +	if(m->addr == (char *)l->bio)
   1.659 +	    return;
   1.660 +
   1.661 +	if (options & V_CRYPTO_MDEBUG_TIME)
   1.662 +		{
   1.663 +		lcl = localtime(&m->time);
   1.664 +	
   1.665 +		BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ",
   1.666 +			lcl->tm_hour,lcl->tm_min,lcl->tm_sec);
   1.667 +		bufp += strlen(bufp);
   1.668 +		}
   1.669 +
   1.670 +	BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ",
   1.671 +		m->iorder,m->file,m->line);
   1.672 +	bufp += strlen(bufp);
   1.673 +
   1.674 +	if (options & V_CRYPTO_MDEBUG_THREAD)
   1.675 +		{
   1.676 +		BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", m->thread);
   1.677 +		bufp += strlen(bufp);
   1.678 +		}
   1.679 +
   1.680 +	BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%08lX\n",
   1.681 +		m->num,(unsigned long)m->addr);
   1.682 +	bufp += strlen(bufp);
   1.683 +
   1.684 +	BIO_puts(l->bio,buf);
   1.685 +	
   1.686 +	l->chunks++;
   1.687 +	l->bytes+=m->num;
   1.688 +
   1.689 +	amip=m->app_info;
   1.690 +	ami_cnt=0;
   1.691 +	if (!amip)
   1.692 +		return;
   1.693 +	ti=amip->thread;
   1.694 +	
   1.695 +	do
   1.696 +		{
   1.697 +		int buf_len;
   1.698 +		int info_len;
   1.699 +
   1.700 +		ami_cnt++;
   1.701 +		memset(buf,'>',ami_cnt);
   1.702 +		BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt,
   1.703 +			" thread=%lu, file=%s, line=%d, info=\"",
   1.704 +			amip->thread, amip->file, amip->line);
   1.705 +		buf_len=strlen(buf);
   1.706 +		info_len=strlen(amip->info);
   1.707 +		if (128 - buf_len - 3 < info_len)
   1.708 +			{
   1.709 +			memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
   1.710 +			buf_len = 128 - 3;
   1.711 +			}
   1.712 +		else
   1.713 +			{
   1.714 +			BUF_strlcpy(buf + buf_len, amip->info,
   1.715 +				    sizeof buf - buf_len);
   1.716 +			buf_len = strlen(buf);
   1.717 +			}
   1.718 +		BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n");
   1.719 +		
   1.720 +		BIO_puts(l->bio,buf);
   1.721 +
   1.722 +		amip = amip->next;
   1.723 +		}
   1.724 +	while(amip && amip->thread == ti);
   1.725 +		
   1.726 +#ifdef LEVITTE_DEBUG_MEM
   1.727 +	if (amip)
   1.728 +		{
   1.729 +		fprintf(stderr, "Thread switch detected in backtrace!!!!\n");
   1.730 +		abort();
   1.731 +		}
   1.732 +#endif
   1.733 +	}
   1.734 +
   1.735 +static IMPLEMENT_LHASH_DOALL_ARG_FN(print_leak, const MEM *, MEM_LEAK *)
   1.736 +
   1.737 +EXPORT_C void CRYPTO_mem_leaks(BIO *b)
   1.738 +	{
   1.739 +	MEM_LEAK ml;
   1.740 +
   1.741 +	if (mh == NULL && amih == NULL)
   1.742 +		return;
   1.743 +
   1.744 +	MemCheck_off(); /* obtain MALLOC2 lock */
   1.745 +
   1.746 +	ml.bio=b;
   1.747 +	ml.bytes=0;
   1.748 +	ml.chunks=0;
   1.749 +	if (mh != NULL)
   1.750 +		lh_doall_arg(mh, LHASH_DOALL_ARG_FN(print_leak),
   1.751 +				(char *)&ml);
   1.752 +	if (ml.chunks != 0)
   1.753 +		{
   1.754 +		BIO_printf(b,"%ld bytes leaked in %d chunks\n",
   1.755 +			   ml.bytes,ml.chunks);
   1.756 +		}
   1.757 +	else
   1.758 +		{
   1.759 +		/* Make sure that, if we found no leaks, memory-leak debugging itself
   1.760 +		 * does not introduce memory leaks (which might irritate
   1.761 +		 * external debugging tools).
   1.762 +		 * (When someone enables leak checking, but does not call
   1.763 +		 * this function, we declare it to be their fault.)
   1.764 +		 *
   1.765 +		 * XXX    This should be in CRYPTO_mem_leaks_cb,
   1.766 +		 * and CRYPTO_mem_leaks should be implemented by
   1.767 +		 * using CRYPTO_mem_leaks_cb.
   1.768 +		 * (Also their should be a variant of lh_doall_arg
   1.769 +		 * that takes a function pointer instead of a void *;
   1.770 +		 * this would obviate the ugly and illegal
   1.771 +		 * void_fn_to_char kludge in CRYPTO_mem_leaks_cb.
   1.772 +		 * Otherwise the code police will come and get us.)
   1.773 +		 */
   1.774 +		int old_mh_mode;
   1.775 +
   1.776 +		CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   1.777 +
   1.778 +		/* avoid deadlock when lh_free() uses CRYPTO_dbg_free(),
   1.779 +		 * which uses CRYPTO_is_mem_check_on */
   1.780 +		old_mh_mode = mh_mode;
   1.781 +		mh_mode = CRYPTO_MEM_CHECK_OFF;
   1.782 +
   1.783 +		if (mh != NULL)
   1.784 +			{
   1.785 +			lh_free(mh);
   1.786 +			mh = NULL;
   1.787 +			}
   1.788 +		if (amih != NULL)
   1.789 +			{
   1.790 +			if (lh_num_items(amih) == 0) 
   1.791 +				{
   1.792 +				lh_free(amih);
   1.793 +				amih = NULL;
   1.794 +				}
   1.795 +			}
   1.796 +
   1.797 +		mh_mode = old_mh_mode;
   1.798 +		CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   1.799 +		}
   1.800 +	MemCheck_on(); /* release MALLOC2 lock */
   1.801 +	}
   1.802 +
   1.803 +#ifndef OPENSSL_NO_FP_API
   1.804 +EXPORT_C void CRYPTO_mem_leaks_fp(FILE *fp)
   1.805 +	{
   1.806 +	BIO *b=NULL;
   1.807 +
   1.808 +	if (mh == NULL) return;
   1.809 +	/* Need to turn off memory checking when allocated BIOs ... especially
   1.810 +	 * as we're creating them at a time when we're trying to check we've not
   1.811 +	 * left anything un-free()'d!! */
   1.812 +	MemCheck_off();
   1.813 +	b = BIO_new(BIO_s_file());
   1.814 +	MemCheck_on();
   1.815 +	if(!b) return;
   1.816 +	BIO_set_fp(b,fp,BIO_NOCLOSE);
   1.817 +	CRYPTO_mem_leaks(b);
   1.818 +	BIO_free(b);
   1.819 +	}
   1.820 +#endif
   1.821 +
   1.822 +
   1.823 +
   1.824 +/* FIXME: We really don't allow much to the callback.  For example, it has
   1.825 +   no chance of reaching the info stack for the item it processes.  Should
   1.826 +   it really be this way?  -- Richard Levitte */
   1.827 +/* NB: The prototypes have been typedef'd to CRYPTO_MEM_LEAK_CB inside crypto.h
   1.828 + * If this code is restructured, remove the callback type if it is no longer
   1.829 + * needed. -- Geoff Thorpe */
   1.830 +static void cb_leak(const MEM *m, CRYPTO_MEM_LEAK_CB **cb)
   1.831 +	{
   1.832 +	(**cb)(m->iorder,m->file,m->line,m->num,m->addr);
   1.833 +	}
   1.834 +
   1.835 +static IMPLEMENT_LHASH_DOALL_ARG_FN(cb_leak, const MEM *, CRYPTO_MEM_LEAK_CB **)
   1.836 +
   1.837 +EXPORT_C void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb)
   1.838 +	{
   1.839 +	if (mh == NULL) return;
   1.840 +	CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
   1.841 +	lh_doall_arg(mh, LHASH_DOALL_ARG_FN(cb_leak), &cb);
   1.842 +	CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
   1.843 +	}