|  | // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <openssl/ex_data.h> | 
|  |  | 
|  | #include <assert.h> | 
|  | #include <limits.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <openssl/crypto.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/mem.h> | 
|  | #include <openssl/thread.h> | 
|  |  | 
|  | #include "internal.h" | 
|  |  | 
|  |  | 
|  | DEFINE_STACK_OF(CRYPTO_EX_DATA_FUNCS) | 
|  |  | 
|  | struct crypto_ex_data_func_st { | 
|  | long argl;   // Arbitary long | 
|  | void *argp;  // Arbitary void pointer | 
|  | CRYPTO_EX_free *free_func; | 
|  | // next points to the next |CRYPTO_EX_DATA_FUNCS| or NULL if this is the last | 
|  | // one. It may only be read if synchronized with a read from |num_funcs|. | 
|  | CRYPTO_EX_DATA_FUNCS *next; | 
|  | }; | 
|  |  | 
|  | int CRYPTO_get_ex_new_index_ex(CRYPTO_EX_DATA_CLASS *ex_data_class, long argl, | 
|  | void *argp, CRYPTO_EX_free *free_func) { | 
|  | CRYPTO_EX_DATA_FUNCS *funcs = reinterpret_cast<CRYPTO_EX_DATA_FUNCS *>( | 
|  | OPENSSL_malloc(sizeof(CRYPTO_EX_DATA_FUNCS))); | 
|  | if (funcs == NULL) { | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | funcs->argl = argl; | 
|  | funcs->argp = argp; | 
|  | funcs->free_func = free_func; | 
|  | funcs->next = NULL; | 
|  |  | 
|  | CRYPTO_MUTEX_lock_write(&ex_data_class->lock); | 
|  |  | 
|  | uint32_t num_funcs = CRYPTO_atomic_load_u32(&ex_data_class->num_funcs); | 
|  | // The index must fit in |int|. | 
|  | if (num_funcs > (size_t)(INT_MAX - ex_data_class->num_reserved)) { | 
|  | OPENSSL_PUT_ERROR(CRYPTO, ERR_R_OVERFLOW); | 
|  | CRYPTO_MUTEX_unlock_write(&ex_data_class->lock); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | // Append |funcs| to the linked list. | 
|  | if (ex_data_class->last == NULL) { | 
|  | assert(num_funcs == 0); | 
|  | ex_data_class->funcs = funcs; | 
|  | ex_data_class->last = funcs; | 
|  | } else { | 
|  | ex_data_class->last->next = funcs; | 
|  | ex_data_class->last = funcs; | 
|  | } | 
|  |  | 
|  | CRYPTO_atomic_store_u32(&ex_data_class->num_funcs, num_funcs + 1); | 
|  | CRYPTO_MUTEX_unlock_write(&ex_data_class->lock); | 
|  | return (int)num_funcs + ex_data_class->num_reserved; | 
|  | } | 
|  |  | 
|  | int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int index, void *val) { | 
|  | if (index < 0) { | 
|  | // A caller that can accidentally pass in an invalid index into this | 
|  | // function will hit an memory error if |index| happened to be valid, and | 
|  | // expected |val| to be of a different type. | 
|  | abort(); | 
|  | } | 
|  |  | 
|  | if (ad->sk == NULL) { | 
|  | ad->sk = sk_void_new_null(); | 
|  | if (ad->sk == NULL) { | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | // Add NULL values until the stack is long enough. | 
|  | for (size_t i = sk_void_num(ad->sk); i <= (size_t)index; i++) { | 
|  | if (!sk_void_push(ad->sk, NULL)) { | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | sk_void_set(ad->sk, (size_t)index, val); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad, int idx) { | 
|  | if (ad->sk == NULL || idx < 0 || (size_t)idx >= sk_void_num(ad->sk)) { | 
|  | return NULL; | 
|  | } | 
|  | return sk_void_value(ad->sk, idx); | 
|  | } | 
|  |  | 
|  | void CRYPTO_new_ex_data(CRYPTO_EX_DATA *ad) { ad->sk = NULL; } | 
|  |  | 
|  | void CRYPTO_free_ex_data(CRYPTO_EX_DATA_CLASS *ex_data_class, void *obj, | 
|  | CRYPTO_EX_DATA *ad) { | 
|  | if (ad->sk == NULL) { | 
|  | // Nothing to do. | 
|  | return; | 
|  | } | 
|  |  | 
|  | uint32_t num_funcs = CRYPTO_atomic_load_u32(&ex_data_class->num_funcs); | 
|  | // |CRYPTO_get_ex_new_index_ex| will not allocate indices beyond |INT_MAX|. | 
|  | assert(num_funcs <= (size_t)(INT_MAX - ex_data_class->num_reserved)); | 
|  |  | 
|  | // Defer dereferencing |ex_data_class->funcs| and |funcs->next|. It must come | 
|  | // after the |num_funcs| comparison to be correctly synchronized. | 
|  | CRYPTO_EX_DATA_FUNCS *const *funcs = &ex_data_class->funcs; | 
|  | for (uint32_t i = 0; i < num_funcs; i++) { | 
|  | if ((*funcs)->free_func != NULL) { | 
|  | int index = (int)i + ex_data_class->num_reserved; | 
|  | void *ptr = CRYPTO_get_ex_data(ad, index); | 
|  | (*funcs)->free_func(obj, ptr, ad, index, (*funcs)->argl, (*funcs)->argp); | 
|  | } | 
|  | funcs = &(*funcs)->next; | 
|  | } | 
|  |  | 
|  | sk_void_free(ad->sk); | 
|  | ad->sk = NULL; | 
|  | } | 
|  |  | 
|  | void CRYPTO_cleanup_all_ex_data(void) {} |