os/ossrv/ssl/libcrypto/src/crypto/mem_dbg.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 /* crypto/mem_dbg.c */
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     3  * All rights reserved.
     4  *
     5  * This package is an SSL implementation written
     6  * by Eric Young (eay@cryptsoft.com).
     7  * The implementation was written so as to conform with Netscapes SSL.
     8  * 
     9  * This library is free for commercial and non-commercial use as long as
    10  * the following conditions are aheared to.  The following conditions
    11  * apply to all code found in this distribution, be it the RC4, RSA,
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    13  * included with this distribution is covered by the same copyright terms
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    15  * 
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
    17  * the code are not to be removed.
    18  * If this package is used in a product, Eric Young should be given attribution
    19  * as the author of the parts of the library used.
    20  * This can be in the form of a textual message at program startup or
    21  * in documentation (online or textual) provided with the package.
    22  * 
    23  * Redistribution and use in source and binary forms, with or without
    24  * modification, are permitted provided that the following conditions
    25  * are met:
    26  * 1. Redistributions of source code must retain the copyright
    27  *    notice, this list of conditions and the following disclaimer.
    28  * 2. Redistributions in binary form must reproduce the above copyright
    29  *    notice, this list of conditions and the following disclaimer in the
    30  *    documentation and/or other materials provided with the distribution.
    31  * 3. All advertising materials mentioning features or use of this software
    32  *    must display the following acknowledgement:
    33  *    "This product includes cryptographic software written by
    34  *     Eric Young (eay@cryptsoft.com)"
    35  *    The word 'cryptographic' can be left out if the rouines from the library
    36  *    being used are not cryptographic related :-).
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
    38  *    the apps directory (application code) you must include an acknowledgement:
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    40  * 
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    51  * SUCH DAMAGE.
    52  * 
    53  * The licence and distribution terms for any publically available version or
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    55  * copied and put under another distribution licence
    56  * [including the GNU Public Licence.]
    57  */
    58 /*
    59  © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
    60  */
    61 
    62 #include <stdio.h>
    63 #include <stdlib.h>
    64 #include <time.h>	
    65 #include "cryptlib.h"
    66 #include <openssl/crypto.h>
    67 #include <openssl/buffer.h>
    68 #include <openssl/bio.h>
    69 #include <openssl/lhash.h>
    70 
    71 #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
    72 #include "libcrypto_wsd_macros.h"
    73 #include "libcrypto_wsd.h"
    74 #endif
    75 
    76 #ifndef EMULATOR
    77 static int mh_mode=CRYPTO_MEM_CHECK_OFF;
    78 /* The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE
    79  * when the application asks for it (usually after library initialisation
    80  * for which no book-keeping is desired).
    81  *
    82  * State CRYPTO_MEM_CHECK_ON exists only temporarily when the library
    83  * thinks that certain allocations should not be checked (e.g. the data
    84  * structures used for memory checking).  It is not suitable as an initial
    85  * state: the library will unexpectedly enable memory checking when it
    86  * executes one of those sections that want to disable checking
    87  * temporarily.
    88  *
    89  * State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes no sense whatsoever.
    90  */
    91 
    92 static unsigned long order = 0; /* number of memory requests */
    93 static LHASH *mh=NULL; /* hash-table of memory requests (address as key);
    94                        * access requires MALLOC2 lock */
    95                    
    96 
    97 #endif                        
    98 
    99 
   100 typedef struct app_mem_info_st
   101 /* For application-defined information (static C-string `info')
   102  * to be displayed in memory leak list.
   103  * Each thread has its own stack.  For applications, there is
   104  *   CRYPTO_push_info("...")     to push an entry,
   105  *   CRYPTO_pop_info()           to pop an entry,
   106  *   CRYPTO_remove_all_info()    to pop all entries.
   107  */
   108 	{	
   109 	unsigned long thread;
   110 	const char *file;
   111 	int line;
   112 	const char *info;
   113 	struct app_mem_info_st *next; /* tail of thread's stack */
   114 	int references;
   115 	} APP_INFO;
   116 
   117 static void app_info_free(APP_INFO *);
   118 
   119 #ifndef EMULATOR
   120 static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's
   121                           * that are at the top of their thread's stack
   122                           * (with `thread' as key);
   123                           * access requires MALLOC2 lock */
   124 #else
   125  GET_STATIC_VAR_FROM_TLS(amih,mem_dbg,LHASH *)
   126  #define amih (*GET_WSD_VAR_NAME(amih,mem_dbg,s)())
   127 #endif                           
   128 
   129 typedef struct mem_st
   130 /* memory-block description */
   131 	{
   132 	void *addr;
   133 	int num;
   134 	const char *file;
   135 	int line;
   136 	unsigned long thread;
   137 	unsigned long iorder;
   138 	time_t time;
   139 	APP_INFO *app_info;
   140 	} MEM;
   141 
   142 
   143 
   144 #ifdef EMULATOR
   145  GET_STATIC_VAR_FROM_TLS(mh_mode,mem_dbg,int)
   146  #define mh_mode (*GET_WSD_VAR_NAME(mh_mode,mem_dbg,s)())
   147  GET_STATIC_VAR_FROM_TLS(order,mem_dbg,unsigned long)
   148  #define order (*GET_WSD_VAR_NAME(order,mem_dbg,s)())
   149  GET_STATIC_VAR_FROM_TLS(mh,mem_dbg,LHASH*)
   150  #define mh (*GET_WSD_VAR_NAME(mh,mem_dbg,s)())
   151 #endif 
   152 
   153 #ifndef EMULATOR
   154 static long options =             /* extra information to be recorded */
   155 #if defined(CRYPTO_MDEBUG_TIME) || defined(CRYPTO_MDEBUG_ALL)
   156 	V_CRYPTO_MDEBUG_TIME |
   157 #endif
   158 #if defined(CRYPTO_MDEBUG_THREAD) || defined(CRYPTO_MDEBUG_ALL)
   159 	V_CRYPTO_MDEBUG_THREAD |
   160 #endif
   161 	0;
   162 static unsigned int num_disable = 0; /* num_disable > 0
   163                                       *     iff
   164                                       * mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE)
   165                                       */
   166 static unsigned long disabling_thread = 0; /* Valid iff num_disable > 0.
   167                                             * CRYPTO_LOCK_MALLOC2 is locked
   168                                             * exactly in this case (by the
   169                                             * thread named in disabling_thread).
   170                                             */
   171 
   172 #else
   173  GET_STATIC_VAR_FROM_TLS(options,mem_dbg,unsigned long)
   174  #define options (*GET_WSD_VAR_NAME(options,mem_dbg,s)())
   175  GET_STATIC_VAR_FROM_TLS(num_disable,mem_dbg,unsigned int)
   176  #define num_disable (*GET_WSD_VAR_NAME(num_disable,mem_dbg,s)())
   177  GET_STATIC_VAR_FROM_TLS(disabling_thread,mem_dbg,unsigned long)
   178  #define disabling_thread (*GET_WSD_VAR_NAME(disabling_thread,mem_dbg,s)())
   179 #endif	
   180 
   181 
   182 
   183 static void app_info_free(APP_INFO *inf)
   184 	{
   185 	if (--(inf->references) <= 0)
   186 		{
   187 		if (inf->next != NULL)
   188 			{
   189 			app_info_free(inf->next);
   190 			}
   191 		OPENSSL_free(inf);
   192 		}
   193 	}
   194 
   195 EXPORT_C int CRYPTO_mem_ctrl(int mode)
   196 	{
   197 	int ret=mh_mode;
   198 
   199 	CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   200 	switch (mode)
   201 		{
   202 	/* for applications (not to be called while multiple threads
   203 	 * use the library): */
   204 	case CRYPTO_MEM_CHECK_ON: /* aka MemCheck_start() */
   205 		mh_mode = CRYPTO_MEM_CHECK_ON|CRYPTO_MEM_CHECK_ENABLE;
   206 		num_disable = 0;
   207 		break;
   208 	case CRYPTO_MEM_CHECK_OFF: /* aka MemCheck_stop() */
   209 		mh_mode = 0;
   210 		num_disable = 0; /* should be true *before* MemCheck_stop is used,
   211 		                    or there'll be a lot of confusion */
   212 		break;
   213 
   214 	/* switch off temporarily (for library-internal use): */
   215 	case CRYPTO_MEM_CHECK_DISABLE: /* aka MemCheck_off() */
   216 		if (mh_mode & CRYPTO_MEM_CHECK_ON)
   217 			{
   218 			if (!num_disable || (disabling_thread != CRYPTO_thread_id())) /* otherwise we already have the MALLOC2 lock */
   219 				{
   220 				/* Long-time lock CRYPTO_LOCK_MALLOC2 must not be claimed while
   221 				 * we're holding CRYPTO_LOCK_MALLOC, or we'll deadlock if
   222 				 * somebody else holds CRYPTO_LOCK_MALLOC2 (and cannot release
   223 				 * it because we block entry to this function).
   224 				 * Give them a chance, first, and then claim the locks in
   225 				 * appropriate order (long-time lock first).
   226 				 */
   227 				CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   228 				/* Note that after we have waited for CRYPTO_LOCK_MALLOC2
   229 				 * and CRYPTO_LOCK_MALLOC, we'll still be in the right
   230 				 * "case" and "if" branch because MemCheck_start and
   231 				 * MemCheck_stop may never be used while there are multiple
   232 				 * OpenSSL threads. */
   233 				CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
   234 				CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   235 				mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE;
   236 				disabling_thread=CRYPTO_thread_id();
   237 				}
   238 			num_disable++;
   239 			}
   240 		break;
   241 	case CRYPTO_MEM_CHECK_ENABLE: /* aka MemCheck_on() */
   242 		if (mh_mode & CRYPTO_MEM_CHECK_ON)
   243 			{
   244 			if (num_disable) /* always true, or something is going wrong */
   245 				{
   246 				num_disable--;
   247 				if (num_disable == 0)
   248 					{
   249 					mh_mode|=CRYPTO_MEM_CHECK_ENABLE;
   250 					CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
   251 					}
   252 				}
   253 			}
   254 		break;
   255 
   256 	default:
   257 		break;
   258 		}
   259 	CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   260 	return(ret);
   261 	}
   262 
   263 EXPORT_C int CRYPTO_is_mem_check_on(void)
   264 	{
   265 	int ret = 0;
   266 
   267 	if (mh_mode & CRYPTO_MEM_CHECK_ON)
   268 		{
   269 		CRYPTO_r_lock(CRYPTO_LOCK_MALLOC);
   270 
   271 		ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE)
   272 			|| (disabling_thread != CRYPTO_thread_id());
   273 
   274 		CRYPTO_r_unlock(CRYPTO_LOCK_MALLOC);
   275 		}
   276 	return(ret);
   277 	}	
   278 
   279 
   280 EXPORT_C void CRYPTO_dbg_set_options(long bits)
   281 	{
   282 	options = bits;
   283 	}
   284 
   285 EXPORT_C long CRYPTO_dbg_get_options(void)
   286 	{
   287 	return options;
   288 	}
   289 
   290 /* static int mem_cmp(MEM *a, MEM *b) */
   291 static int mem_cmp(const void *a_void, const void *b_void)
   292 	{
   293 #ifdef _WIN64
   294 	const char *a=(const char *)((const MEM *)a_void)->addr,
   295 		   *b=(const char *)((const MEM *)b_void)->addr;
   296 	if (a==b)	return 0;
   297 	else if (a>b)	return 1;
   298 	else		return -1;
   299 #else
   300 	return((const char *)((const MEM *)a_void)->addr
   301 		- (const char *)((const MEM *)b_void)->addr);
   302 #endif
   303 	}
   304 
   305 /* static unsigned long mem_hash(MEM *a) */
   306 static unsigned long mem_hash(const void *a_void)
   307 	{
   308 	unsigned long ret;
   309 
   310 	ret=(unsigned long)((const MEM *)a_void)->addr;
   311 
   312 	ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
   313 	return(ret);
   314 	}
   315 
   316 /* static int app_info_cmp(APP_INFO *a, APP_INFO *b) */
   317 static int app_info_cmp(const void *a_void, const void *b_void)
   318 	{
   319 	return(((const APP_INFO *)a_void)->thread
   320 		!= ((const APP_INFO *)b_void)->thread);
   321 	}
   322 
   323 /* static unsigned long app_info_hash(APP_INFO *a) */
   324 static unsigned long app_info_hash(const void *a_void)
   325 	{
   326 	unsigned long ret;
   327 
   328 	ret=(unsigned long)((const APP_INFO *)a_void)->thread;
   329 
   330 	ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
   331 	return(ret);
   332 	}
   333 
   334 static APP_INFO *pop_info(void)
   335 	{
   336 	APP_INFO tmp;
   337 	APP_INFO *ret = NULL;
   338 
   339 	if (amih != NULL)
   340 		{
   341 		tmp.thread=CRYPTO_thread_id();
   342 		if ((ret=(APP_INFO *)lh_delete(amih,&tmp)) != NULL)
   343 			{
   344 			APP_INFO *next=ret->next;
   345 
   346 			if (next != NULL)
   347 				{
   348 				next->references++;
   349 				lh_insert(amih,(char *)next);
   350 				}
   351 #ifdef LEVITTE_DEBUG_MEM
   352 			if (ret->thread != tmp.thread)
   353 				{
   354 				fprintf(stderr, "pop_info(): deleted info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
   355 					ret->thread, tmp.thread);
   356 				abort();
   357 				}
   358 #endif
   359 			if (--(ret->references) <= 0)
   360 				{
   361 				ret->next = NULL;
   362 				if (next != NULL)
   363 					next->references--;
   364 				OPENSSL_free(ret);
   365 				}
   366 			}
   367 		}
   368 	return(ret);
   369 	}
   370 
   371 EXPORT_C int CRYPTO_push_info_(const char *info, const char *file, int line)
   372 	{
   373 	APP_INFO *ami=NULL, *amim=NULL;
   374 	int ret=0;
   375 
   376 	if (is_MemCheck_on())
   377 		{
   378 		MemCheck_off(); /* obtain MALLOC2 lock */
   379 
   380 		if ((ami = (APP_INFO *)OPENSSL_malloc(sizeof(APP_INFO))) == NULL)
   381 			{
   382 			ret=0;
   383 			goto err;
   384 			}
   385 		if (amih == NULL)
   386 			{
   387 			if ((amih=lh_new(app_info_hash, app_info_cmp)) == NULL)
   388 				{
   389 				OPENSSL_free(ami);
   390 				ret=0;
   391 				goto err;
   392 				}
   393 			}
   394 
   395 		ami->thread=CRYPTO_thread_id();
   396 		ami->file=file;
   397 		ami->line=line;
   398 		ami->info=info;
   399 		ami->references=1;
   400 		ami->next=NULL;
   401 
   402 		if ((amim=(APP_INFO *)lh_insert(amih,(char *)ami)) != NULL)
   403 			{
   404 #ifdef LEVITTE_DEBUG_MEM
   405 			if (ami->thread != amim->thread)
   406 				{
   407 				fprintf(stderr, "CRYPTO_push_info(): previous info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
   408 					amim->thread, ami->thread);
   409 				abort();
   410 				}
   411 #endif
   412 			ami->next=amim;
   413 			}
   414  err:
   415 		MemCheck_on(); /* release MALLOC2 lock */
   416 		}
   417 
   418 	return(ret);
   419 	}
   420 
   421 EXPORT_C int CRYPTO_pop_info(void)
   422 	{
   423 	int ret=0;
   424 
   425 	if (is_MemCheck_on()) /* _must_ be true, or something went severely wrong */
   426 		{
   427 		MemCheck_off(); /* obtain MALLOC2 lock */
   428 
   429 		ret=(pop_info() != NULL);
   430 
   431 		MemCheck_on(); /* release MALLOC2 lock */
   432 		}
   433 	return(ret);
   434 	}
   435 
   436 EXPORT_C int CRYPTO_remove_all_info(void)
   437 	{
   438 	int ret=0;
   439 
   440 	if (is_MemCheck_on()) /* _must_ be true */
   441 		{
   442 		MemCheck_off(); /* obtain MALLOC2 lock */
   443 
   444 		while(pop_info() != NULL)
   445 			ret++;
   446 
   447 		MemCheck_on(); /* release MALLOC2 lock */
   448 		}
   449 	return(ret);
   450 	}
   451 
   452 #ifndef EMULATOR
   453 static unsigned long break_order_num=0;
   454 #else
   455 static const unsigned long break_order_num=0;
   456 #endif
   457 EXPORT_C void CRYPTO_dbg_malloc(void *addr, int num, const char *file, int line,
   458 	int before_p)
   459 	{
   460 	MEM *m=NULL,*mm=NULL;
   461 	APP_INFO tmp,*amim=NULL;
   462 
   463 	switch(before_p & 127)
   464 		{
   465 	case 0:
   466 		break;
   467 	case 1:
   468 		if (addr == NULL)
   469 			break;
   470 
   471 		if (is_MemCheck_on())
   472 			{
   473 			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   474 			if ((m=(MEM *)OPENSSL_malloc(sizeof(MEM))) == NULL)
   475 				{
   476 				OPENSSL_free(addr);
   477 				MemCheck_on(); /* release MALLOC2 lock
   478 				                * if num_disabled drops to 0 */
   479 				return;
   480 				}
   481 			if (mh == NULL)
   482 				{
   483 				if ((mh=lh_new(mem_hash, mem_cmp)) == NULL)
   484 					{
   485 					OPENSSL_free(addr);
   486 					OPENSSL_free(m);
   487 					addr=NULL;
   488 					goto err;
   489 					}
   490 				}
   491 
   492 			m->addr=addr;
   493 			m->file=file;
   494 			m->line=line;
   495 			m->num=num;
   496 			if (options & V_CRYPTO_MDEBUG_THREAD)
   497 				m->thread=CRYPTO_thread_id();
   498 			else
   499 				m->thread=0;
   500 
   501 			if (order == break_order_num)
   502 				{
   503 				/* BREAK HERE */
   504 				m->iorder=order;
   505 				}
   506 			m->iorder=order++;
   507 #ifdef LEVITTE_DEBUG_MEM
   508 			fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] %c 0x%p (%d)\n",
   509 				m->iorder,
   510 				(before_p & 128) ? '*' : '+',
   511 				m->addr, m->num);
   512 #endif
   513 			if (options & V_CRYPTO_MDEBUG_TIME)
   514 				m->time=time(NULL);
   515 			else
   516 				m->time=0;
   517 
   518 			tmp.thread=CRYPTO_thread_id();
   519 			m->app_info=NULL;
   520 			if (amih != NULL
   521 				&& (amim=(APP_INFO *)lh_retrieve(amih,(char *)&tmp)) != NULL)
   522 				{
   523 				m->app_info = amim;
   524 				amim->references++;
   525 				}
   526 
   527 			if ((mm=(MEM *)lh_insert(mh,(char *)m)) != NULL)
   528 				{
   529 				/* Not good, but don't sweat it */
   530 				if (mm->app_info != NULL)
   531 					{
   532 					mm->app_info->references--;
   533 					}
   534 				OPENSSL_free(mm);
   535 				}
   536 		err:
   537 			MemCheck_on(); /* release MALLOC2 lock
   538 			                * if num_disabled drops to 0 */
   539 			}
   540 		break;
   541 		}
   542 	return;
   543 	}
   544 
   545 EXPORT_C void CRYPTO_dbg_free(void *addr, int before_p)
   546 	{
   547 	MEM m,*mp=NULL;
   548 
   549 	switch(before_p)
   550 		{
   551 	case 0:
   552 		if (addr == NULL)
   553 			break;
   554 
   555 		if (is_MemCheck_on() && (mh != NULL))
   556 			{
   557 			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   558 
   559 			m.addr=addr;
   560 			mp=(MEM *)lh_delete(mh,(char *)&m);
   561 			if (mp != NULL)
   562 				{
   563 #ifdef LEVITTE_DEBUG_MEM
   564 			fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] - 0x%p (%d)\n",
   565 				mp->order, mp->addr, mp->num);
   566 #endif
   567 				if (mp->app_info != NULL)
   568 					app_info_free(mp->app_info);
   569 				OPENSSL_free(mp);
   570 				}
   571 
   572 			MemCheck_on(); /* release MALLOC2 lock
   573 			                * if num_disabled drops to 0 */
   574 			}
   575 		break;
   576 	case 1:
   577 		break;
   578 		}
   579 	}
   580 
   581 EXPORT_C void CRYPTO_dbg_realloc(void *addr1, void *addr2, int num,
   582 	const char *file, int line, int before_p)
   583 	{
   584 	MEM m,*mp;
   585 
   586 #ifdef LEVITTE_DEBUG_MEM
   587 	fprintf(stderr, "LEVITTE_DEBUG_MEM: --> CRYPTO_dbg_malloc(addr1 = %p, addr2 = %p, num = %d, file = \"%s\", line = %d, before_p = %d)\n",
   588 		addr1, addr2, num, file, line, before_p);
   589 #endif
   590 
   591 	switch(before_p)
   592 		{
   593 	case 0:
   594 		break;
   595 	case 1:
   596 		if (addr2 == NULL)
   597 			break;
   598 
   599 		if (addr1 == NULL)
   600 			{
   601 			CRYPTO_dbg_malloc(addr2, num, file, line, 128 | before_p);
   602 			break;
   603 			}
   604 
   605 		if (is_MemCheck_on())
   606 			{
   607 			MemCheck_off(); /* make sure we hold MALLOC2 lock */
   608 
   609 			m.addr=addr1;
   610 			mp=(MEM *)lh_delete(mh,(char *)&m);
   611 			if (mp != NULL)
   612 				{
   613 #ifdef LEVITTE_DEBUG_MEM
   614 				fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] * 0x%p (%d) -> 0x%p (%d)\n",
   615 					mp->order,
   616 					mp->addr, mp->num,
   617 					addr2, num);
   618 #endif
   619 				mp->addr=addr2;
   620 				mp->num=num;
   621 				lh_insert(mh,(char *)mp);
   622 				}
   623 
   624 			MemCheck_on(); /* release MALLOC2 lock
   625 			                * if num_disabled drops to 0 */
   626 			}
   627 		break;
   628 		}
   629 	return;
   630 	}
   631 
   632 
   633 typedef struct mem_leak_st
   634 	{
   635 	BIO *bio;
   636 	int chunks;
   637 	long bytes;
   638 	} MEM_LEAK;
   639 
   640 static void print_leak(const MEM *m, MEM_LEAK *l)
   641 	{
   642 #ifndef SYMBIAN		
   643 	char buf[1024];
   644 #else
   645   char buf[512];
   646 #endif	
   647 	char *bufp = buf;
   648 	APP_INFO *amip;
   649 	int ami_cnt;
   650 	struct tm *lcl = NULL;
   651 	unsigned long ti;
   652 
   653 #define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf))
   654 
   655 	if(m->addr == (char *)l->bio)
   656 	    return;
   657 
   658 	if (options & V_CRYPTO_MDEBUG_TIME)
   659 		{
   660 		lcl = localtime(&m->time);
   661 	
   662 		BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ",
   663 			lcl->tm_hour,lcl->tm_min,lcl->tm_sec);
   664 		bufp += strlen(bufp);
   665 		}
   666 
   667 	BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ",
   668 		m->iorder,m->file,m->line);
   669 	bufp += strlen(bufp);
   670 
   671 	if (options & V_CRYPTO_MDEBUG_THREAD)
   672 		{
   673 		BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", m->thread);
   674 		bufp += strlen(bufp);
   675 		}
   676 
   677 	BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%08lX\n",
   678 		m->num,(unsigned long)m->addr);
   679 	bufp += strlen(bufp);
   680 
   681 	BIO_puts(l->bio,buf);
   682 	
   683 	l->chunks++;
   684 	l->bytes+=m->num;
   685 
   686 	amip=m->app_info;
   687 	ami_cnt=0;
   688 	if (!amip)
   689 		return;
   690 	ti=amip->thread;
   691 	
   692 	do
   693 		{
   694 		int buf_len;
   695 		int info_len;
   696 
   697 		ami_cnt++;
   698 		memset(buf,'>',ami_cnt);
   699 		BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt,
   700 			" thread=%lu, file=%s, line=%d, info=\"",
   701 			amip->thread, amip->file, amip->line);
   702 		buf_len=strlen(buf);
   703 		info_len=strlen(amip->info);
   704 		if (128 - buf_len - 3 < info_len)
   705 			{
   706 			memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
   707 			buf_len = 128 - 3;
   708 			}
   709 		else
   710 			{
   711 			BUF_strlcpy(buf + buf_len, amip->info,
   712 				    sizeof buf - buf_len);
   713 			buf_len = strlen(buf);
   714 			}
   715 		BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n");
   716 		
   717 		BIO_puts(l->bio,buf);
   718 
   719 		amip = amip->next;
   720 		}
   721 	while(amip && amip->thread == ti);
   722 		
   723 #ifdef LEVITTE_DEBUG_MEM
   724 	if (amip)
   725 		{
   726 		fprintf(stderr, "Thread switch detected in backtrace!!!!\n");
   727 		abort();
   728 		}
   729 #endif
   730 	}
   731 
   732 static IMPLEMENT_LHASH_DOALL_ARG_FN(print_leak, const MEM *, MEM_LEAK *)
   733 
   734 EXPORT_C void CRYPTO_mem_leaks(BIO *b)
   735 	{
   736 	MEM_LEAK ml;
   737 
   738 	if (mh == NULL && amih == NULL)
   739 		return;
   740 
   741 	MemCheck_off(); /* obtain MALLOC2 lock */
   742 
   743 	ml.bio=b;
   744 	ml.bytes=0;
   745 	ml.chunks=0;
   746 	if (mh != NULL)
   747 		lh_doall_arg(mh, LHASH_DOALL_ARG_FN(print_leak),
   748 				(char *)&ml);
   749 	if (ml.chunks != 0)
   750 		{
   751 		BIO_printf(b,"%ld bytes leaked in %d chunks\n",
   752 			   ml.bytes,ml.chunks);
   753 		}
   754 	else
   755 		{
   756 		/* Make sure that, if we found no leaks, memory-leak debugging itself
   757 		 * does not introduce memory leaks (which might irritate
   758 		 * external debugging tools).
   759 		 * (When someone enables leak checking, but does not call
   760 		 * this function, we declare it to be their fault.)
   761 		 *
   762 		 * XXX    This should be in CRYPTO_mem_leaks_cb,
   763 		 * and CRYPTO_mem_leaks should be implemented by
   764 		 * using CRYPTO_mem_leaks_cb.
   765 		 * (Also their should be a variant of lh_doall_arg
   766 		 * that takes a function pointer instead of a void *;
   767 		 * this would obviate the ugly and illegal
   768 		 * void_fn_to_char kludge in CRYPTO_mem_leaks_cb.
   769 		 * Otherwise the code police will come and get us.)
   770 		 */
   771 		int old_mh_mode;
   772 
   773 		CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
   774 
   775 		/* avoid deadlock when lh_free() uses CRYPTO_dbg_free(),
   776 		 * which uses CRYPTO_is_mem_check_on */
   777 		old_mh_mode = mh_mode;
   778 		mh_mode = CRYPTO_MEM_CHECK_OFF;
   779 
   780 		if (mh != NULL)
   781 			{
   782 			lh_free(mh);
   783 			mh = NULL;
   784 			}
   785 		if (amih != NULL)
   786 			{
   787 			if (lh_num_items(amih) == 0) 
   788 				{
   789 				lh_free(amih);
   790 				amih = NULL;
   791 				}
   792 			}
   793 
   794 		mh_mode = old_mh_mode;
   795 		CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
   796 		}
   797 	MemCheck_on(); /* release MALLOC2 lock */
   798 	}
   799 
   800 #ifndef OPENSSL_NO_FP_API
   801 EXPORT_C void CRYPTO_mem_leaks_fp(FILE *fp)
   802 	{
   803 	BIO *b=NULL;
   804 
   805 	if (mh == NULL) return;
   806 	/* Need to turn off memory checking when allocated BIOs ... especially
   807 	 * as we're creating them at a time when we're trying to check we've not
   808 	 * left anything un-free()'d!! */
   809 	MemCheck_off();
   810 	b = BIO_new(BIO_s_file());
   811 	MemCheck_on();
   812 	if(!b) return;
   813 	BIO_set_fp(b,fp,BIO_NOCLOSE);
   814 	CRYPTO_mem_leaks(b);
   815 	BIO_free(b);
   816 	}
   817 #endif
   818 
   819 
   820 
   821 /* FIXME: We really don't allow much to the callback.  For example, it has
   822    no chance of reaching the info stack for the item it processes.  Should
   823    it really be this way?  -- Richard Levitte */
   824 /* NB: The prototypes have been typedef'd to CRYPTO_MEM_LEAK_CB inside crypto.h
   825  * If this code is restructured, remove the callback type if it is no longer
   826  * needed. -- Geoff Thorpe */
   827 static void cb_leak(const MEM *m, CRYPTO_MEM_LEAK_CB **cb)
   828 	{
   829 	(**cb)(m->iorder,m->file,m->line,m->num,m->addr);
   830 	}
   831 
   832 static IMPLEMENT_LHASH_DOALL_ARG_FN(cb_leak, const MEM *, CRYPTO_MEM_LEAK_CB **)
   833 
   834 EXPORT_C void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb)
   835 	{
   836 	if (mh == NULL) return;
   837 	CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
   838 	lh_doall_arg(mh, LHASH_DOALL_ARG_FN(cb_leak), &cb);
   839 	CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
   840 	}