os/ossrv/ssl/libcrypto/src/crypto/ex_data.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /* crypto/ex_data.c */
     2 
     3 /*
     4  * Overhaul notes;
     5  *
     6  * This code is now *mostly* thread-safe. It is now easier to understand in what
     7  * ways it is safe and in what ways it is not, which is an improvement. Firstly,
     8  * all per-class stacks and index-counters for ex_data are stored in the same
     9  * global LHASH table (keyed by class). This hash table uses locking for all
    10  * access with the exception of CRYPTO_cleanup_all_ex_data(), which must only be
    11  * called when no other threads can possibly race against it (even if it was
    12  * locked, the race would mean it's possible the hash table might have been
    13  * recreated after the cleanup). As classes can only be added to the hash table,
    14  * and within each class, the stack of methods can only be incremented, the
    15  * locking mechanics are simpler than they would otherwise be. For example, the
    16  * new/dup/free ex_data functions will lock the hash table, copy the method
    17  * pointers it needs from the relevant class, then unlock the hash table before
    18  * actually applying those method pointers to the task of the new/dup/free
    19  * operations. As they can't be removed from the method-stack, only
    20  * supplemented, there's no race conditions associated with using them outside
    21  * the lock. The get/set_ex_data functions are not locked because they do not
    22  * involve this global state at all - they operate directly with a previously
    23  * obtained per-class method index and a particular "ex_data" variable. These
    24  * variables are usually instantiated per-context (eg. each RSA structure has
    25  * one) so locking on read/write access to that variable can be locked locally
    26  * if required (eg. using the "RSA" lock to synchronise access to a
    27  * per-RSA-structure ex_data variable if required).
    28  * [Geoff]
    29  */
    30 
    31 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
    32  * All rights reserved.
    33  *
    34  * This package is an SSL implementation written
    35  * by Eric Young (eay@cryptsoft.com).
    36  * The implementation was written so as to conform with Netscapes SSL.
    37  * 
    38  * This library is free for commercial and non-commercial use as long as
    39  * the following conditions are aheared to.  The following conditions
    40  * apply to all code found in this distribution, be it the RC4, RSA,
    41  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    42  * included with this distribution is covered by the same copyright terms
    43  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    44  * 
    45  * Copyright remains Eric Young's, and as such any Copyright notices in
    46  * the code are not to be removed.
    47  * If this package is used in a product, Eric Young should be given attribution
    48  * as the author of the parts of the library used.
    49  * This can be in the form of a textual message at program startup or
    50  * in documentation (online or textual) provided with the package.
    51  * 
    52  * Redistribution and use in source and binary forms, with or without
    53  * modification, are permitted provided that the following conditions
    54  * are met:
    55  * 1. Redistributions of source code must retain the copyright
    56  *    notice, this list of conditions and the following disclaimer.
    57  * 2. Redistributions in binary form must reproduce the above copyright
    58  *    notice, this list of conditions and the following disclaimer in the
    59  *    documentation and/or other materials provided with the distribution.
    60  * 3. All advertising materials mentioning features or use of this software
    61  *    must display the following acknowledgement:
    62  *    "This product includes cryptographic software written by
    63  *     Eric Young (eay@cryptsoft.com)"
    64  *    The word 'cryptographic' can be left out if the rouines from the library
    65  *    being used are not cryptographic related :-).
    66  * 4. If you include any Windows specific code (or a derivative thereof) from 
    67  *    the apps directory (application code) you must include an acknowledgement:
    68  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    69  * 
    70  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    71  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    72  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    73  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    74  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    75  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    76  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    77  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    78  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    79  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    80  * SUCH DAMAGE.
    81  * 
    82  * The licence and distribution terms for any publically available version or
    83  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    84  * copied and put under another distribution licence
    85  * [including the GNU Public Licence.]
    86  */
    87 /* ====================================================================
    88  * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
    89  *
    90  * Redistribution and use in source and binary forms, with or without
    91  * modification, are permitted provided that the following conditions
    92  * are met:
    93  *
    94  * 1. Redistributions of source code must retain the above copyright
    95  *    notice, this list of conditions and the following disclaimer. 
    96  *
    97  * 2. Redistributions in binary form must reproduce the above copyright
    98  *    notice, this list of conditions and the following disclaimer in
    99  *    the documentation and/or other materials provided with the
   100  *    distribution.
   101  *
   102  * 3. All advertising materials mentioning features or use of this
   103  *    software must display the following acknowledgment:
   104  *    "This product includes software developed by the OpenSSL Project
   105  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
   106  *
   107  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
   108  *    endorse or promote products derived from this software without
   109  *    prior written permission. For written permission, please contact
   110  *    openssl-core@openssl.org.
   111  *
   112  * 5. Products derived from this software may not be called "OpenSSL"
   113  *    nor may "OpenSSL" appear in their names without prior written
   114  *    permission of the OpenSSL Project.
   115  *
   116  * 6. Redistributions of any form whatsoever must retain the following
   117  *    acknowledgment:
   118  *    "This product includes software developed by the OpenSSL Project
   119  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
   120  *
   121  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
   122  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   123  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
   124  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
   125  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
   126  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
   127  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
   128  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   129  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
   130  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
   131  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
   132  * OF THE POSSIBILITY OF SUCH DAMAGE.
   133  * ====================================================================
   134  *
   135  * This product includes cryptographic software written by Eric Young
   136  * (eay@cryptsoft.com).  This product includes software written by Tim
   137  * Hudson (tjh@cryptsoft.com).
   138  *
   139  */
   140  /*
   141  © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
   142  */
   143 
   144 #include "cryptlib.h"
   145 #include <openssl/lhash.h>
   146 #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
   147 #include "libcrypto_wsd_macros.h"
   148 #include "libcrypto_wsd.h"
   149 #endif
   150 
   151 #ifndef EMULATOR
   152 /* What an "implementation of ex_data functionality" looks like */
   153 struct st_CRYPTO_EX_DATA_IMPL
   154 	{
   155 	/*********************/
   156 	/* GLOBAL OPERATIONS */
   157 	/* Return a new class index */
   158 	int (*cb_new_class)(void);
   159 	/* Cleanup all state used by the implementation */
   160 	void (*cb_cleanup)(void);
   161 	/************************/
   162 	/* PER-CLASS OPERATIONS */
   163 	/* Get a new method index within a class */
   164 	int (*cb_get_new_index)(int class_index, long argl, void *argp,
   165 			CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
   166 			CRYPTO_EX_free *free_func);
   167 	/* Initialise a new CRYPTO_EX_DATA of a given class */
   168 	int (*cb_new_ex_data)(int class_index, void *obj,
   169 			CRYPTO_EX_DATA *ad);
   170 	/* Duplicate a CRYPTO_EX_DATA of a given class onto a copy */
   171 	int (*cb_dup_ex_data)(int class_index, CRYPTO_EX_DATA *to,
   172 			CRYPTO_EX_DATA *from);
   173 	/* Cleanup a CRYPTO_EX_DATA of a given class */
   174 	void (*cb_free_ex_data)(int class_index, void *obj,
   175 			CRYPTO_EX_DATA *ad);
   176 	};
   177 #endif
   178 #ifndef EMULATOR
   179 /* The implementation we use at run-time */
   180 static const CRYPTO_EX_DATA_IMPL *impl = NULL;
   181 #else
   182  GET_STATIC_VAR_FROM_TLS(impl ,ex_data,CRYPTO_EX_DATA_IMPL *)
   183  #define impl  (*GET_WSD_VAR_NAME(impl,ex_data,s)())
   184 #endif
   185 
   186 /* To call "impl" functions, use this macro rather than referring to 'impl' directly, eg.
   187  * EX_IMPL(get_new_index)(...); */
   188 #define EX_IMPL(a) impl->cb_##a
   189 
   190 /* Predeclare the "default" ex_data implementation */
   191 static int int_new_class(void);
   192 static void int_cleanup(void);
   193 static int int_get_new_index(int class_index, long argl, void *argp,
   194 		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
   195 		CRYPTO_EX_free *free_func);
   196 static int int_new_ex_data(int class_index, void *obj,
   197 		CRYPTO_EX_DATA *ad);
   198 static int int_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
   199 		CRYPTO_EX_DATA *from);
   200 static void int_free_ex_data(int class_index, void *obj,
   201 		CRYPTO_EX_DATA *ad);
   202 		
   203 		
   204 #ifndef EMULATOR		
   205 static CRYPTO_EX_DATA_IMPL impl_default =
   206 	{
   207 	int_new_class,
   208 	int_cleanup,
   209 	int_get_new_index,
   210 	int_new_ex_data,
   211 	int_dup_ex_data,
   212 	int_free_ex_data
   213 	};
   214 #else	
   215   GET_STATIC_VAR_FROM_TLS(impl_default,ex_data,CRYPTO_EX_DATA_IMPL)
   216   #define impl_default (*GET_WSD_VAR_NAME(impl_default,ex_data, s)())
   217   const CRYPTO_EX_DATA_IMPL temp_s_impl_default =
   218 	{
   219 	int_new_class,
   220 	int_cleanup,
   221 	int_get_new_index,
   222 	int_new_ex_data,
   223 	int_dup_ex_data,
   224 	int_free_ex_data
   225 	};
   226 #endif
   227 
   228 /* Internal function that checks whether "impl" is set and if not, sets it to
   229  * the default. */
   230 static void impl_check(void)
   231 	{
   232 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   233 	if(!impl)
   234 		impl = &impl_default;
   235 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   236 	}
   237 /* A macro wrapper for impl_check that first uses a non-locked test before
   238  * invoking the function (which checks again inside a lock). */
   239 #define IMPL_CHECK if(!impl) impl_check();
   240 
   241 /* API functions to get/set the "ex_data" implementation */
   242 EXPORT_C const CRYPTO_EX_DATA_IMPL *CRYPTO_get_ex_data_implementation(void)
   243 	{
   244 	IMPL_CHECK
   245 	return impl;
   246 	}
   247 EXPORT_C int CRYPTO_set_ex_data_implementation(CRYPTO_EX_DATA_IMPL *i)
   248 	{
   249 	int toret = 0;
   250 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   251 	if(!impl)
   252 		{
   253 		impl = i;
   254 		toret = 1;
   255 		}
   256 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   257 	return toret;
   258 	}
   259 
   260 /****************************************************************************/
   261 /* Interal (default) implementation of "ex_data" support. API functions are
   262  * further down. */
   263 
   264 /* The type that represents what each "class" used to implement locally. A STACK
   265  * of CRYPTO_EX_DATA_FUNCS plus a index-counter. The 'class_index' is the global
   266  * value representing the class that is used to distinguish these items. */
   267 typedef struct st_ex_class_item {
   268 	int class_index;
   269 	STACK_OF(CRYPTO_EX_DATA_FUNCS) *meth;
   270 	int meth_num;
   271 } EX_CLASS_ITEM;
   272 
   273 #ifndef EMULATOR
   274 /* When assigning new class indexes, this is our counter */
   275 static int ex_class = CRYPTO_EX_INDEX_USER;
   276 
   277 /* The global hash table of EX_CLASS_ITEM items */
   278 static LHASH *ex_data = NULL;
   279 #else
   280  GET_STATIC_VAR_FROM_TLS(ex_class ,ex_data,int)
   281  #define ex_class (*GET_WSD_VAR_NAME(ex_class ,ex_data,s)())
   282  GET_STATIC_VAR_FROM_TLS(ex_data ,ex_data,LHASH *)
   283  #define ex_data (*GET_WSD_VAR_NAME(ex_data ,ex_data,s)())
   284 
   285 #endif
   286 
   287 /* The callbacks required in the "ex_data" hash table */
   288 static unsigned long ex_hash_cb(const void *a_void)
   289 	{
   290 	return ((const EX_CLASS_ITEM *)a_void)->class_index;
   291 	}
   292 static int ex_cmp_cb(const void *a_void, const void *b_void)
   293 	{
   294 	return (((const EX_CLASS_ITEM *)a_void)->class_index -
   295 		((const EX_CLASS_ITEM *)b_void)->class_index);
   296 	}
   297 
   298 /* Internal functions used by the "impl_default" implementation to access the
   299  * state */
   300 
   301 static int ex_data_check(void)
   302 	{
   303 	int toret = 1;
   304 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   305 	if(!ex_data && ((ex_data = lh_new(ex_hash_cb, ex_cmp_cb)) == NULL))
   306 		toret = 0;
   307 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   308 	return toret;
   309 	}
   310 /* This macros helps reduce the locking from repeated checks because the
   311  * ex_data_check() function checks ex_data again inside a lock. */
   312 #define EX_DATA_CHECK(iffail) if(!ex_data && !ex_data_check()) {iffail}
   313 
   314 /* This "inner" callback is used by the callback function that follows it */
   315 static void def_cleanup_util_cb(CRYPTO_EX_DATA_FUNCS *funcs)
   316 	{
   317 	OPENSSL_free(funcs);
   318 	}
   319 
   320 /* This callback is used in lh_doall to destroy all EX_CLASS_ITEM values from
   321  * "ex_data" prior to the ex_data hash table being itself destroyed. Doesn't do
   322  * any locking. */
   323 static void def_cleanup_cb(void *a_void)
   324 	{
   325 	EX_CLASS_ITEM *item = (EX_CLASS_ITEM *)a_void;
   326 	sk_CRYPTO_EX_DATA_FUNCS_pop_free(item->meth, def_cleanup_util_cb);
   327 	OPENSSL_free(item);
   328 	}
   329 
   330 /* Return the EX_CLASS_ITEM from the "ex_data" hash table that corresponds to a
   331  * given class. Handles locking. */
   332 static EX_CLASS_ITEM *def_get_class(int class_index)
   333 	{
   334 	EX_CLASS_ITEM d, *p, *gen;
   335 	EX_DATA_CHECK(return NULL;)
   336 	d.class_index = class_index;
   337 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   338 	p = lh_retrieve(ex_data, &d);
   339 	if(!p)
   340 		{
   341 		gen = OPENSSL_malloc(sizeof(EX_CLASS_ITEM));
   342 		if(gen)
   343 			{
   344 			gen->class_index = class_index;
   345 			gen->meth_num = 0;
   346 			gen->meth = sk_CRYPTO_EX_DATA_FUNCS_new_null();
   347 			if(!gen->meth)
   348 				OPENSSL_free(gen);
   349 			else
   350 				{
   351 				/* Because we're inside the ex_data lock, the
   352 				 * return value from the insert will be NULL */
   353 				lh_insert(ex_data, gen);
   354 				p = gen;
   355 				}
   356 			}
   357 		}
   358 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   359 	if(!p)
   360 		CRYPTOerr(CRYPTO_F_DEF_GET_CLASS,ERR_R_MALLOC_FAILURE);
   361 	return p;
   362 	}
   363 
   364 /* Add a new method to the given EX_CLASS_ITEM and return the corresponding
   365  * index (or -1 for error). Handles locking. */
   366 static int def_add_index(EX_CLASS_ITEM *item, long argl, void *argp,
   367 		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
   368 		CRYPTO_EX_free *free_func)
   369 	{
   370 	int toret = -1;
   371 	CRYPTO_EX_DATA_FUNCS *a = (CRYPTO_EX_DATA_FUNCS *)OPENSSL_malloc(
   372 					sizeof(CRYPTO_EX_DATA_FUNCS));
   373 	if(!a)
   374 		{
   375 		CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX,ERR_R_MALLOC_FAILURE);
   376 		return -1;
   377 		}
   378 	a->argl=argl;
   379 	a->argp=argp;
   380 	a->new_func=new_func;
   381 	a->dup_func=dup_func;
   382 	a->free_func=free_func;
   383 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   384 	while (sk_CRYPTO_EX_DATA_FUNCS_num(item->meth) <= item->meth_num)
   385 		{
   386 		if (!sk_CRYPTO_EX_DATA_FUNCS_push(item->meth, NULL))
   387 			{
   388 			CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX,ERR_R_MALLOC_FAILURE);
   389 			OPENSSL_free(a);
   390 			goto err;
   391 			}
   392 		}
   393 	toret = item->meth_num++;
   394 	(void)sk_CRYPTO_EX_DATA_FUNCS_set(item->meth, toret, a);
   395 err:
   396 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   397 	return toret;
   398 	}
   399 
   400 /**************************************************************/
   401 /* The functions in the default CRYPTO_EX_DATA_IMPL structure */
   402 
   403 static int int_new_class(void)
   404 	{
   405 	int toret;
   406 	CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA);
   407 	toret = ex_class++;
   408 	CRYPTO_w_unlock(CRYPTO_LOCK_EX_DATA);
   409 	return toret;
   410 	}
   411 
   412 static void int_cleanup(void)
   413 	{
   414 	EX_DATA_CHECK(return;)
   415 	lh_doall(ex_data, def_cleanup_cb);
   416 	lh_free(ex_data);
   417 	ex_data = NULL;
   418 	impl = NULL;
   419 	}
   420 
   421 static int int_get_new_index(int class_index, long argl, void *argp,
   422 		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
   423 		CRYPTO_EX_free *free_func)
   424 	{
   425 	EX_CLASS_ITEM *item = def_get_class(class_index);
   426 	if(!item)
   427 		return -1;
   428 	return def_add_index(item, argl, argp, new_func, dup_func, free_func);
   429 	}
   430 
   431 /* Thread-safe by copying a class's array of "CRYPTO_EX_DATA_FUNCS" entries in
   432  * the lock, then using them outside the lock. NB: Thread-safety only applies to
   433  * the global "ex_data" state (ie. class definitions), not thread-safe on 'ad'
   434  * itself. */
   435 static int int_new_ex_data(int class_index, void *obj,
   436 		CRYPTO_EX_DATA *ad)
   437 	{
   438 	int mx,i;
   439 	void *ptr;
   440 	CRYPTO_EX_DATA_FUNCS **storage = NULL;
   441 	EX_CLASS_ITEM *item = def_get_class(class_index);
   442 	if(!item)
   443 		/* error is already set */
   444 		return 0;
   445 	ad->sk = NULL;
   446 	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
   447 	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
   448 	if(mx > 0)
   449 		{
   450 		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
   451 		if(!storage)
   452 			goto skip;
   453 		for(i = 0; i < mx; i++)
   454 			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
   455 		}
   456 skip:
   457 	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
   458 	if((mx > 0) && !storage)
   459 		{
   460 		CRYPTOerr(CRYPTO_F_INT_NEW_EX_DATA,ERR_R_MALLOC_FAILURE);
   461 		return 0;
   462 		}
   463 	for(i = 0; i < mx; i++)
   464 		{
   465 		if(storage[i] && storage[i]->new_func)
   466 			{
   467 			ptr = CRYPTO_get_ex_data(ad, i);
   468 			storage[i]->new_func(obj,ptr,ad,i,
   469 				storage[i]->argl,storage[i]->argp);
   470 			}
   471 		}
   472 	if(storage)
   473 		OPENSSL_free(storage);
   474 	return 1;
   475 	}
   476 
   477 /* Same thread-safety notes as for "int_new_ex_data" */
   478 static int int_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
   479 		CRYPTO_EX_DATA *from)
   480 	{
   481 	int mx, j, i;
   482 	char *ptr;
   483 	CRYPTO_EX_DATA_FUNCS **storage = NULL;
   484 	EX_CLASS_ITEM *item;
   485 	if(!from->sk)
   486 		/* 'to' should be "blank" which *is* just like 'from' */
   487 		return 1;
   488 	if((item = def_get_class(class_index)) == NULL)
   489 		return 0;
   490 	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
   491 	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
   492 	j = sk_num(from->sk);
   493 	if(j < mx)
   494 		mx = j;
   495 	if(mx > 0)
   496 		{
   497 		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
   498 		if(!storage)
   499 			goto skip;
   500 		for(i = 0; i < mx; i++)
   501 			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
   502 		}
   503 skip:
   504 	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
   505 	if((mx > 0) && !storage)
   506 		{
   507 		CRYPTOerr(CRYPTO_F_INT_DUP_EX_DATA,ERR_R_MALLOC_FAILURE);
   508 		return 0;
   509 		}
   510 	for(i = 0; i < mx; i++)
   511 		{
   512 		ptr = CRYPTO_get_ex_data(from, i);
   513 		if(storage[i] && storage[i]->dup_func)
   514 			storage[i]->dup_func(to,from,&ptr,i,
   515 				storage[i]->argl,storage[i]->argp);
   516 		CRYPTO_set_ex_data(to,i,ptr);
   517 		}
   518 	if(storage)
   519 		OPENSSL_free(storage);
   520 	return 1;
   521 	}
   522 
   523 /* Same thread-safety notes as for "int_new_ex_data" */
   524 static void int_free_ex_data(int class_index, void *obj,
   525 		CRYPTO_EX_DATA *ad)
   526 	{
   527 	int mx,i;
   528 	EX_CLASS_ITEM *item;
   529 	void *ptr;
   530 	CRYPTO_EX_DATA_FUNCS **storage = NULL;
   531 	if((item = def_get_class(class_index)) == NULL)
   532 		return;
   533 	CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
   534 	mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
   535 	if(mx > 0)
   536 		{
   537 		storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*));
   538 		if(!storage)
   539 			goto skip;
   540 		for(i = 0; i < mx; i++)
   541 			storage[i] = sk_CRYPTO_EX_DATA_FUNCS_value(item->meth,i);
   542 		}
   543 skip:
   544 	CRYPTO_r_unlock(CRYPTO_LOCK_EX_DATA);
   545 	if((mx > 0) && !storage)
   546 		{
   547 		CRYPTOerr(CRYPTO_F_INT_FREE_EX_DATA,ERR_R_MALLOC_FAILURE);
   548 		return;
   549 		}
   550 	for(i = 0; i < mx; i++)
   551 		{
   552 		if(storage[i] && storage[i]->free_func)
   553 			{
   554 			ptr = CRYPTO_get_ex_data(ad,i);
   555 			storage[i]->free_func(obj,ptr,ad,i,
   556 				storage[i]->argl,storage[i]->argp);
   557 			}
   558 		}
   559 	if(storage)
   560 		OPENSSL_free(storage);
   561 	if(ad->sk)
   562 		{
   563 		sk_free(ad->sk);
   564 		ad->sk=NULL;
   565 		}
   566 	}
   567 
   568 /********************************************************************/
   569 /* API functions that defer all "state" operations to the "ex_data"
   570  * implementation we have set. */
   571 
   572 /* Obtain an index for a new class (not the same as getting a new index within
   573  * an existing class - this is actually getting a new *class*) */
   574 EXPORT_C int CRYPTO_ex_data_new_class(void)
   575 	{
   576 	IMPL_CHECK
   577 	return EX_IMPL(new_class)();
   578 	}
   579 
   580 /* Release all "ex_data" state to prevent memory leaks. This can't be made
   581  * thread-safe without overhauling a lot of stuff, and shouldn't really be
   582  * called under potential race-conditions anyway (it's for program shutdown
   583  * after all). */
   584 EXPORT_C void CRYPTO_cleanup_all_ex_data(void)
   585 	{
   586 	IMPL_CHECK
   587 	EX_IMPL(cleanup)();
   588 	}
   589 
   590 /* Inside an existing class, get/register a new index. */
   591 EXPORT_C int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp,
   592 		CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
   593 		CRYPTO_EX_free *free_func)
   594 	{
   595 	int ret = -1;
   596 
   597 	IMPL_CHECK
   598 	ret = EX_IMPL(get_new_index)(class_index,
   599 			argl, argp, new_func, dup_func, free_func);
   600 	return ret;
   601 	}
   602 
   603 /* Initialise a new CRYPTO_EX_DATA for use in a particular class - including
   604  * calling new() callbacks for each index in the class used by this variable */
   605 EXPORT_C int CRYPTO_new_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad)
   606 	{
   607 	IMPL_CHECK
   608 	return EX_IMPL(new_ex_data)(class_index, obj, ad);
   609 	}
   610 
   611 /* Duplicate a CRYPTO_EX_DATA variable - including calling dup() callbacks for
   612  * each index in the class used by this variable */
   613 EXPORT_C int CRYPTO_dup_ex_data(int class_index, CRYPTO_EX_DATA *to,
   614 	     CRYPTO_EX_DATA *from)
   615 	{
   616 	IMPL_CHECK
   617 	return EX_IMPL(dup_ex_data)(class_index, to, from);
   618 	}
   619 
   620 /* Cleanup a CRYPTO_EX_DATA variable - including calling free() callbacks for
   621  * each index in the class used by this variable */
   622 EXPORT_C void CRYPTO_free_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad)
   623 	{
   624 	IMPL_CHECK
   625 	EX_IMPL(free_ex_data)(class_index, obj, ad);
   626 	}
   627 
   628 /* For a given CRYPTO_EX_DATA variable, set the value corresponding to a
   629  * particular index in the class used by this variable */
   630 EXPORT_C int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int idx, void *val)
   631 	{
   632 	int i;
   633 
   634 	if (ad->sk == NULL)
   635 		{
   636 		if ((ad->sk=sk_new_null()) == NULL)
   637 			{
   638 			CRYPTOerr(CRYPTO_F_CRYPTO_SET_EX_DATA,ERR_R_MALLOC_FAILURE);
   639 			return(0);
   640 			}
   641 		}
   642 	i=sk_num(ad->sk);
   643 
   644 	while (i <= idx)
   645 		{
   646 		if (!sk_push(ad->sk,NULL))
   647 			{
   648 			CRYPTOerr(CRYPTO_F_CRYPTO_SET_EX_DATA,ERR_R_MALLOC_FAILURE);
   649 			return(0);
   650 			}
   651 		i++;
   652 		}
   653 	sk_set(ad->sk,idx,val);
   654 	return(1);
   655 	}
   656 
   657 /* For a given CRYPTO_EX_DATA_ variable, get the value corresponding to a
   658  * particular index in the class used by this variable */
   659 EXPORT_C void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad, int idx)
   660 	{
   661 	if (ad->sk == NULL)
   662 		return(0);
   663 	else if (idx >= sk_num(ad->sk))
   664 		return(0);
   665 	else
   666 		return(sk_value(ad->sk,idx));
   667 	}
   668 
   669 IMPLEMENT_STACK_OF(CRYPTO_EX_DATA_FUNCS)