First public contribution.
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
59 © Portions copyright (c) 2006 Nokia Corporation. All rights reserved.
66 #include <openssl/crypto.h>
67 #include <openssl/buffer.h>
68 #include <openssl/bio.h>
69 #include <openssl/lhash.h>
71 #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
72 #include "libcrypto_wsd_macros.h"
73 #include "libcrypto_wsd.h"
77 static int mh_mode=CRYPTO_MEM_CHECK_OFF;
78 /* The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE
79 * when the application asks for it (usually after library initialisation
80 * for which no book-keeping is desired).
82 * State CRYPTO_MEM_CHECK_ON exists only temporarily when the library
83 * thinks that certain allocations should not be checked (e.g. the data
84 * structures used for memory checking). It is not suitable as an initial
85 * state: the library will unexpectedly enable memory checking when it
86 * executes one of those sections that want to disable checking
89 * State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes no sense whatsoever.
92 static unsigned long order = 0; /* number of memory requests */
93 static LHASH *mh=NULL; /* hash-table of memory requests (address as key);
94 * access requires MALLOC2 lock */
100 typedef struct app_mem_info_st
101 /* For application-defined information (static C-string `info')
102 * to be displayed in memory leak list.
103 * Each thread has its own stack. For applications, there is
104 * CRYPTO_push_info("...") to push an entry,
105 * CRYPTO_pop_info() to pop an entry,
106 * CRYPTO_remove_all_info() to pop all entries.
109 unsigned long thread;
113 struct app_mem_info_st *next; /* tail of thread's stack */
117 static void app_info_free(APP_INFO *);
120 static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's
121 * that are at the top of their thread's stack
122 * (with `thread' as key);
123 * access requires MALLOC2 lock */
125 GET_STATIC_VAR_FROM_TLS(amih,mem_dbg,LHASH *)
126 #define amih (*GET_WSD_VAR_NAME(amih,mem_dbg,s)())
129 typedef struct mem_st
130 /* memory-block description */
136 unsigned long thread;
137 unsigned long iorder;
145 GET_STATIC_VAR_FROM_TLS(mh_mode,mem_dbg,int)
146 #define mh_mode (*GET_WSD_VAR_NAME(mh_mode,mem_dbg,s)())
147 GET_STATIC_VAR_FROM_TLS(order,mem_dbg,unsigned long)
148 #define order (*GET_WSD_VAR_NAME(order,mem_dbg,s)())
149 GET_STATIC_VAR_FROM_TLS(mh,mem_dbg,LHASH*)
150 #define mh (*GET_WSD_VAR_NAME(mh,mem_dbg,s)())
154 static long options = /* extra information to be recorded */
155 #if defined(CRYPTO_MDEBUG_TIME) || defined(CRYPTO_MDEBUG_ALL)
156 V_CRYPTO_MDEBUG_TIME |
158 #if defined(CRYPTO_MDEBUG_THREAD) || defined(CRYPTO_MDEBUG_ALL)
159 V_CRYPTO_MDEBUG_THREAD |
162 static unsigned int num_disable = 0; /* num_disable > 0
164 * mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE)
166 static unsigned long disabling_thread = 0; /* Valid iff num_disable > 0.
167 * CRYPTO_LOCK_MALLOC2 is locked
168 * exactly in this case (by the
169 * thread named in disabling_thread).
173 GET_STATIC_VAR_FROM_TLS(options,mem_dbg,unsigned long)
174 #define options (*GET_WSD_VAR_NAME(options,mem_dbg,s)())
175 GET_STATIC_VAR_FROM_TLS(num_disable,mem_dbg,unsigned int)
176 #define num_disable (*GET_WSD_VAR_NAME(num_disable,mem_dbg,s)())
177 GET_STATIC_VAR_FROM_TLS(disabling_thread,mem_dbg,unsigned long)
178 #define disabling_thread (*GET_WSD_VAR_NAME(disabling_thread,mem_dbg,s)())
183 static void app_info_free(APP_INFO *inf)
185 if (--(inf->references) <= 0)
187 if (inf->next != NULL)
189 app_info_free(inf->next);
195 EXPORT_C int CRYPTO_mem_ctrl(int mode)
199 CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
202 /* for applications (not to be called while multiple threads
203 * use the library): */
204 case CRYPTO_MEM_CHECK_ON: /* aka MemCheck_start() */
205 mh_mode = CRYPTO_MEM_CHECK_ON|CRYPTO_MEM_CHECK_ENABLE;
208 case CRYPTO_MEM_CHECK_OFF: /* aka MemCheck_stop() */
210 num_disable = 0; /* should be true *before* MemCheck_stop is used,
211 or there'll be a lot of confusion */
214 /* switch off temporarily (for library-internal use): */
215 case CRYPTO_MEM_CHECK_DISABLE: /* aka MemCheck_off() */
216 if (mh_mode & CRYPTO_MEM_CHECK_ON)
218 if (!num_disable || (disabling_thread != CRYPTO_thread_id())) /* otherwise we already have the MALLOC2 lock */
220 /* Long-time lock CRYPTO_LOCK_MALLOC2 must not be claimed while
221 * we're holding CRYPTO_LOCK_MALLOC, or we'll deadlock if
222 * somebody else holds CRYPTO_LOCK_MALLOC2 (and cannot release
223 * it because we block entry to this function).
224 * Give them a chance, first, and then claim the locks in
225 * appropriate order (long-time lock first).
227 CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
228 /* Note that after we have waited for CRYPTO_LOCK_MALLOC2
229 * and CRYPTO_LOCK_MALLOC, we'll still be in the right
230 * "case" and "if" branch because MemCheck_start and
231 * MemCheck_stop may never be used while there are multiple
232 * OpenSSL threads. */
233 CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
234 CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
235 mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE;
236 disabling_thread=CRYPTO_thread_id();
241 case CRYPTO_MEM_CHECK_ENABLE: /* aka MemCheck_on() */
242 if (mh_mode & CRYPTO_MEM_CHECK_ON)
244 if (num_disable) /* always true, or something is going wrong */
247 if (num_disable == 0)
249 mh_mode|=CRYPTO_MEM_CHECK_ENABLE;
250 CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
259 CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
263 EXPORT_C int CRYPTO_is_mem_check_on(void)
267 if (mh_mode & CRYPTO_MEM_CHECK_ON)
269 CRYPTO_r_lock(CRYPTO_LOCK_MALLOC);
271 ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE)
272 || (disabling_thread != CRYPTO_thread_id());
274 CRYPTO_r_unlock(CRYPTO_LOCK_MALLOC);
280 EXPORT_C void CRYPTO_dbg_set_options(long bits)
285 EXPORT_C long CRYPTO_dbg_get_options(void)
290 /* static int mem_cmp(MEM *a, MEM *b) */
291 static int mem_cmp(const void *a_void, const void *b_void)
294 const char *a=(const char *)((const MEM *)a_void)->addr,
295 *b=(const char *)((const MEM *)b_void)->addr;
297 else if (a>b) return 1;
300 return((const char *)((const MEM *)a_void)->addr
301 - (const char *)((const MEM *)b_void)->addr);
305 /* static unsigned long mem_hash(MEM *a) */
306 static unsigned long mem_hash(const void *a_void)
310 ret=(unsigned long)((const MEM *)a_void)->addr;
312 ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
316 /* static int app_info_cmp(APP_INFO *a, APP_INFO *b) */
317 static int app_info_cmp(const void *a_void, const void *b_void)
319 return(((const APP_INFO *)a_void)->thread
320 != ((const APP_INFO *)b_void)->thread);
323 /* static unsigned long app_info_hash(APP_INFO *a) */
324 static unsigned long app_info_hash(const void *a_void)
328 ret=(unsigned long)((const APP_INFO *)a_void)->thread;
330 ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
334 static APP_INFO *pop_info(void)
337 APP_INFO *ret = NULL;
341 tmp.thread=CRYPTO_thread_id();
342 if ((ret=(APP_INFO *)lh_delete(amih,&tmp)) != NULL)
344 APP_INFO *next=ret->next;
349 lh_insert(amih,(char *)next);
351 #ifdef LEVITTE_DEBUG_MEM
352 if (ret->thread != tmp.thread)
354 fprintf(stderr, "pop_info(): deleted info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
355 ret->thread, tmp.thread);
359 if (--(ret->references) <= 0)
371 EXPORT_C int CRYPTO_push_info_(const char *info, const char *file, int line)
373 APP_INFO *ami=NULL, *amim=NULL;
376 if (is_MemCheck_on())
378 MemCheck_off(); /* obtain MALLOC2 lock */
380 if ((ami = (APP_INFO *)OPENSSL_malloc(sizeof(APP_INFO))) == NULL)
387 if ((amih=lh_new(app_info_hash, app_info_cmp)) == NULL)
395 ami->thread=CRYPTO_thread_id();
402 if ((amim=(APP_INFO *)lh_insert(amih,(char *)ami)) != NULL)
404 #ifdef LEVITTE_DEBUG_MEM
405 if (ami->thread != amim->thread)
407 fprintf(stderr, "CRYPTO_push_info(): previous info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
408 amim->thread, ami->thread);
415 MemCheck_on(); /* release MALLOC2 lock */
421 EXPORT_C int CRYPTO_pop_info(void)
425 if (is_MemCheck_on()) /* _must_ be true, or something went severely wrong */
427 MemCheck_off(); /* obtain MALLOC2 lock */
429 ret=(pop_info() != NULL);
431 MemCheck_on(); /* release MALLOC2 lock */
436 EXPORT_C int CRYPTO_remove_all_info(void)
440 if (is_MemCheck_on()) /* _must_ be true */
442 MemCheck_off(); /* obtain MALLOC2 lock */
444 while(pop_info() != NULL)
447 MemCheck_on(); /* release MALLOC2 lock */
453 static unsigned long break_order_num=0;
455 static const unsigned long break_order_num=0;
457 EXPORT_C void CRYPTO_dbg_malloc(void *addr, int num, const char *file, int line,
460 MEM *m=NULL,*mm=NULL;
461 APP_INFO tmp,*amim=NULL;
463 switch(before_p & 127)
471 if (is_MemCheck_on())
473 MemCheck_off(); /* make sure we hold MALLOC2 lock */
474 if ((m=(MEM *)OPENSSL_malloc(sizeof(MEM))) == NULL)
477 MemCheck_on(); /* release MALLOC2 lock
478 * if num_disabled drops to 0 */
483 if ((mh=lh_new(mem_hash, mem_cmp)) == NULL)
496 if (options & V_CRYPTO_MDEBUG_THREAD)
497 m->thread=CRYPTO_thread_id();
501 if (order == break_order_num)
507 #ifdef LEVITTE_DEBUG_MEM
508 fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] %c 0x%p (%d)\n",
510 (before_p & 128) ? '*' : '+',
513 if (options & V_CRYPTO_MDEBUG_TIME)
518 tmp.thread=CRYPTO_thread_id();
521 && (amim=(APP_INFO *)lh_retrieve(amih,(char *)&tmp)) != NULL)
527 if ((mm=(MEM *)lh_insert(mh,(char *)m)) != NULL)
529 /* Not good, but don't sweat it */
530 if (mm->app_info != NULL)
532 mm->app_info->references--;
537 MemCheck_on(); /* release MALLOC2 lock
538 * if num_disabled drops to 0 */
545 EXPORT_C void CRYPTO_dbg_free(void *addr, int before_p)
555 if (is_MemCheck_on() && (mh != NULL))
557 MemCheck_off(); /* make sure we hold MALLOC2 lock */
560 mp=(MEM *)lh_delete(mh,(char *)&m);
563 #ifdef LEVITTE_DEBUG_MEM
564 fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] - 0x%p (%d)\n",
565 mp->order, mp->addr, mp->num);
567 if (mp->app_info != NULL)
568 app_info_free(mp->app_info);
572 MemCheck_on(); /* release MALLOC2 lock
573 * if num_disabled drops to 0 */
581 EXPORT_C void CRYPTO_dbg_realloc(void *addr1, void *addr2, int num,
582 const char *file, int line, int before_p)
586 #ifdef LEVITTE_DEBUG_MEM
587 fprintf(stderr, "LEVITTE_DEBUG_MEM: --> CRYPTO_dbg_malloc(addr1 = %p, addr2 = %p, num = %d, file = \"%s\", line = %d, before_p = %d)\n",
588 addr1, addr2, num, file, line, before_p);
601 CRYPTO_dbg_malloc(addr2, num, file, line, 128 | before_p);
605 if (is_MemCheck_on())
607 MemCheck_off(); /* make sure we hold MALLOC2 lock */
610 mp=(MEM *)lh_delete(mh,(char *)&m);
613 #ifdef LEVITTE_DEBUG_MEM
614 fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] * 0x%p (%d) -> 0x%p (%d)\n",
621 lh_insert(mh,(char *)mp);
624 MemCheck_on(); /* release MALLOC2 lock
625 * if num_disabled drops to 0 */
633 typedef struct mem_leak_st
640 static void print_leak(const MEM *m, MEM_LEAK *l)
650 struct tm *lcl = NULL;
653 #define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf))
655 if(m->addr == (char *)l->bio)
658 if (options & V_CRYPTO_MDEBUG_TIME)
660 lcl = localtime(&m->time);
662 BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ",
663 lcl->tm_hour,lcl->tm_min,lcl->tm_sec);
664 bufp += strlen(bufp);
667 BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ",
668 m->iorder,m->file,m->line);
669 bufp += strlen(bufp);
671 if (options & V_CRYPTO_MDEBUG_THREAD)
673 BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", m->thread);
674 bufp += strlen(bufp);
677 BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%08lX\n",
678 m->num,(unsigned long)m->addr);
679 bufp += strlen(bufp);
681 BIO_puts(l->bio,buf);
698 memset(buf,'>',ami_cnt);
699 BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt,
700 " thread=%lu, file=%s, line=%d, info=\"",
701 amip->thread, amip->file, amip->line);
703 info_len=strlen(amip->info);
704 if (128 - buf_len - 3 < info_len)
706 memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
711 BUF_strlcpy(buf + buf_len, amip->info,
712 sizeof buf - buf_len);
713 buf_len = strlen(buf);
715 BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n");
717 BIO_puts(l->bio,buf);
721 while(amip && amip->thread == ti);
723 #ifdef LEVITTE_DEBUG_MEM
726 fprintf(stderr, "Thread switch detected in backtrace!!!!\n");
732 static IMPLEMENT_LHASH_DOALL_ARG_FN(print_leak, const MEM *, MEM_LEAK *)
734 EXPORT_C void CRYPTO_mem_leaks(BIO *b)
738 if (mh == NULL && amih == NULL)
741 MemCheck_off(); /* obtain MALLOC2 lock */
747 lh_doall_arg(mh, LHASH_DOALL_ARG_FN(print_leak),
751 BIO_printf(b,"%ld bytes leaked in %d chunks\n",
756 /* Make sure that, if we found no leaks, memory-leak debugging itself
757 * does not introduce memory leaks (which might irritate
758 * external debugging tools).
759 * (When someone enables leak checking, but does not call
760 * this function, we declare it to be their fault.)
762 * XXX This should be in CRYPTO_mem_leaks_cb,
763 * and CRYPTO_mem_leaks should be implemented by
764 * using CRYPTO_mem_leaks_cb.
765 * (Also their should be a variant of lh_doall_arg
766 * that takes a function pointer instead of a void *;
767 * this would obviate the ugly and illegal
768 * void_fn_to_char kludge in CRYPTO_mem_leaks_cb.
769 * Otherwise the code police will come and get us.)
773 CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
775 /* avoid deadlock when lh_free() uses CRYPTO_dbg_free(),
776 * which uses CRYPTO_is_mem_check_on */
777 old_mh_mode = mh_mode;
778 mh_mode = CRYPTO_MEM_CHECK_OFF;
787 if (lh_num_items(amih) == 0)
794 mh_mode = old_mh_mode;
795 CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
797 MemCheck_on(); /* release MALLOC2 lock */
800 #ifndef OPENSSL_NO_FP_API
801 EXPORT_C void CRYPTO_mem_leaks_fp(FILE *fp)
805 if (mh == NULL) return;
806 /* Need to turn off memory checking when allocated BIOs ... especially
807 * as we're creating them at a time when we're trying to check we've not
808 * left anything un-free()'d!! */
810 b = BIO_new(BIO_s_file());
813 BIO_set_fp(b,fp,BIO_NOCLOSE);
821 /* FIXME: We really don't allow much to the callback. For example, it has
822 no chance of reaching the info stack for the item it processes. Should
823 it really be this way? -- Richard Levitte */
824 /* NB: The prototypes have been typedef'd to CRYPTO_MEM_LEAK_CB inside crypto.h
825 * If this code is restructured, remove the callback type if it is no longer
826 * needed. -- Geoff Thorpe */
827 static void cb_leak(const MEM *m, CRYPTO_MEM_LEAK_CB **cb)
829 (**cb)(m->iorder,m->file,m->line,m->num,m->addr);
832 static IMPLEMENT_LHASH_DOALL_ARG_FN(cb_leak, const MEM *, CRYPTO_MEM_LEAK_CB **)
834 EXPORT_C void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb)
836 if (mh == NULL) return;
837 CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
838 lh_doall_arg(mh, LHASH_DOALL_ARG_FN(cb_leak), &cb);
839 CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);