| // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <openssl/ex_data.h> |
| |
| #include <assert.h> |
| #include <limits.h> |
| #include <stdlib.h> |
| #include <string.h> |
| |
| #include <openssl/crypto.h> |
| #include <openssl/err.h> |
| #include <openssl/mem.h> |
| #include <openssl/thread.h> |
| |
| #include "internal.h" |
| |
| |
| DEFINE_STACK_OF(CRYPTO_EX_DATA_FUNCS) |
| |
| struct crypto_ex_data_func_st { |
| long argl; // Arbitary long |
| void *argp; // Arbitary void pointer |
| CRYPTO_EX_free *free_func; |
| // next points to the next |CRYPTO_EX_DATA_FUNCS| or NULL if this is the last |
| // one. It may only be read if synchronized with a read from |num_funcs|. |
| CRYPTO_EX_DATA_FUNCS *next; |
| }; |
| |
| int CRYPTO_get_ex_new_index_ex(CRYPTO_EX_DATA_CLASS *ex_data_class, long argl, |
| void *argp, CRYPTO_EX_free *free_func) { |
| CRYPTO_EX_DATA_FUNCS *funcs = reinterpret_cast<CRYPTO_EX_DATA_FUNCS *>( |
| OPENSSL_malloc(sizeof(CRYPTO_EX_DATA_FUNCS))); |
| if (funcs == NULL) { |
| return -1; |
| } |
| |
| funcs->argl = argl; |
| funcs->argp = argp; |
| funcs->free_func = free_func; |
| funcs->next = NULL; |
| |
| CRYPTO_MUTEX_lock_write(&ex_data_class->lock); |
| |
| uint32_t num_funcs = CRYPTO_atomic_load_u32(&ex_data_class->num_funcs); |
| // The index must fit in |int|. |
| if (num_funcs > (size_t)(INT_MAX - ex_data_class->num_reserved)) { |
| OPENSSL_PUT_ERROR(CRYPTO, ERR_R_OVERFLOW); |
| CRYPTO_MUTEX_unlock_write(&ex_data_class->lock); |
| return -1; |
| } |
| |
| // Append |funcs| to the linked list. |
| if (ex_data_class->last == NULL) { |
| assert(num_funcs == 0); |
| ex_data_class->funcs = funcs; |
| ex_data_class->last = funcs; |
| } else { |
| ex_data_class->last->next = funcs; |
| ex_data_class->last = funcs; |
| } |
| |
| CRYPTO_atomic_store_u32(&ex_data_class->num_funcs, num_funcs + 1); |
| CRYPTO_MUTEX_unlock_write(&ex_data_class->lock); |
| return (int)num_funcs + ex_data_class->num_reserved; |
| } |
| |
| int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int index, void *val) { |
| if (index < 0) { |
| // A caller that can accidentally pass in an invalid index into this |
| // function will hit an memory error if |index| happened to be valid, and |
| // expected |val| to be of a different type. |
| abort(); |
| } |
| |
| if (ad->sk == NULL) { |
| ad->sk = sk_void_new_null(); |
| if (ad->sk == NULL) { |
| return 0; |
| } |
| } |
| |
| // Add NULL values until the stack is long enough. |
| for (size_t i = sk_void_num(ad->sk); i <= (size_t)index; i++) { |
| if (!sk_void_push(ad->sk, NULL)) { |
| return 0; |
| } |
| } |
| |
| sk_void_set(ad->sk, (size_t)index, val); |
| return 1; |
| } |
| |
| void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad, int idx) { |
| if (ad->sk == NULL || idx < 0 || (size_t)idx >= sk_void_num(ad->sk)) { |
| return NULL; |
| } |
| return sk_void_value(ad->sk, idx); |
| } |
| |
| void CRYPTO_new_ex_data(CRYPTO_EX_DATA *ad) { ad->sk = NULL; } |
| |
| void CRYPTO_free_ex_data(CRYPTO_EX_DATA_CLASS *ex_data_class, void *obj, |
| CRYPTO_EX_DATA *ad) { |
| if (ad->sk == NULL) { |
| // Nothing to do. |
| return; |
| } |
| |
| uint32_t num_funcs = CRYPTO_atomic_load_u32(&ex_data_class->num_funcs); |
| // |CRYPTO_get_ex_new_index_ex| will not allocate indices beyond |INT_MAX|. |
| assert(num_funcs <= (size_t)(INT_MAX - ex_data_class->num_reserved)); |
| |
| // Defer dereferencing |ex_data_class->funcs| and |funcs->next|. It must come |
| // after the |num_funcs| comparison to be correctly synchronized. |
| CRYPTO_EX_DATA_FUNCS *const *funcs = &ex_data_class->funcs; |
| for (uint32_t i = 0; i < num_funcs; i++) { |
| if ((*funcs)->free_func != NULL) { |
| int index = (int)i + ex_data_class->num_reserved; |
| void *ptr = CRYPTO_get_ex_data(ad, index); |
| (*funcs)->free_func(obj, ptr, ad, index, (*funcs)->argl, (*funcs)->argp); |
| } |
| funcs = &(*funcs)->next; |
| } |
| |
| sk_void_free(ad->sk); |
| ad->sk = NULL; |
| } |
| |
| void CRYPTO_cleanup_all_ex_data(void) {} |