The callbacks in the NAME_FUNCS structure are not used directly as LHASH
[openssl.git] / crypto / cryptlib.c
1 /* crypto/cryptlib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58
59 #include <stdio.h>
60 #include <string.h>
61 #include "cryptlib.h"
62 #include <openssl/crypto.h>
63 #include <openssl/safestack.h>
64
65 #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16)
66 static double SSLeay_MSVC5_hack=0.0; /* and for VC1.5 */
67 #endif
68
69 DECLARE_STACK_OF(CRYPTO_dynlock)
70 IMPLEMENT_STACK_OF(CRYPTO_dynlock)
71
72 /* real #defines in crypto.h, keep these upto date */
73 static const char* lock_names[CRYPTO_NUM_LOCKS] =
74         {
75         "<<ERROR>>",
76         "err",
77         "err_hash",
78         "x509",
79         "x509_info",
80         "x509_pkey",
81         "x509_crl",
82         "x509_req",
83         "dsa",
84         "rsa",
85         "evp_pkey",
86         "x509_store",
87         "ssl_ctx",
88         "ssl_cert",
89         "ssl_session",
90         "ssl_sess_cert",
91         "ssl",
92         "rand",
93         "debug_malloc",
94         "BIO",
95         "gethostbyname",
96         "getservbyname",
97         "readdir",
98         "RSA_blinding",
99         "dh",
100         "debug_malloc2",
101         "dso",
102         "dynlock",
103         "engine",
104 #if CRYPTO_NUM_LOCKS != 29
105 # error "Inconsistency between crypto.h and cryptlib.c"
106 #endif
107         };
108
109 /* This is for applications to allocate new type names in the non-dynamic
110    array of lock names.  These are numbered with positive numbers.  */
111 static STACK *app_locks=NULL;
112
113 /* For applications that want a more dynamic way of handling threads, the
114    following stack is used.  These are externally numbered with negative
115    numbers.  */
116 static STACK_OF(CRYPTO_dynlock) *dyn_locks=NULL;
117
118
119 static void (MS_FAR *locking_callback)(int mode,int type,
120         const char *file,int line)=NULL;
121 static int (MS_FAR *add_lock_callback)(int *pointer,int amount,
122         int type,const char *file,int line)=NULL;
123 static unsigned long (MS_FAR *id_callback)(void)=NULL;
124 static struct CRYPTO_dynlock_value *(MS_FAR *dynlock_create_callback)
125         (const char *file,int line)=NULL;
126 static void (MS_FAR *dynlock_lock_callback)(int mode,
127         struct CRYPTO_dynlock_value *l, const char *file,int line)=NULL;
128 static void (MS_FAR *dynlock_destroy_callback)(struct CRYPTO_dynlock_value *l,
129         const char *file,int line)=NULL;
130
131 int CRYPTO_get_new_lockid(char *name)
132         {
133         char *str;
134         int i;
135
136 #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16)
137         /* A hack to make Visual C++ 5.0 work correctly when linking as
138          * a DLL using /MT. Without this, the application cannot use
139          * and floating point printf's.
140          * It also seems to be needed for Visual C 1.5 (win16) */
141         SSLeay_MSVC5_hack=(double)name[0]*(double)name[1];
142 #endif
143
144         if ((app_locks == NULL) && ((app_locks=sk_new_null()) == NULL))
145                 {
146                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE);
147                 return(0);
148                 }
149         if ((str=BUF_strdup(name)) == NULL)
150                 {
151                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE);
152                 return(0);
153                 }
154         i=sk_push(app_locks,str);
155         if (!i)
156                 OPENSSL_free(str);
157         else
158                 i+=CRYPTO_NUM_LOCKS; /* gap of one :-) */
159         return(i);
160         }
161
162 int CRYPTO_num_locks(void)
163         {
164         return CRYPTO_NUM_LOCKS;
165         }
166
167 int CRYPTO_get_new_dynlockid(void)
168         {
169         int i = 0;
170         CRYPTO_dynlock *pointer = NULL;
171
172         if (dynlock_create_callback == NULL)
173                 {
174                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK);
175                 return(0);
176                 }
177         CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK);
178         if ((dyn_locks == NULL)
179                 && ((dyn_locks=sk_CRYPTO_dynlock_new_null()) == NULL))
180                 {
181                 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK);
182                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE);
183                 return(0);
184                 }
185         CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK);
186
187         pointer = (CRYPTO_dynlock *)OPENSSL_malloc(sizeof(CRYPTO_dynlock));
188         if (pointer == NULL)
189                 {
190                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE);
191                 return(0);
192                 }
193         pointer->references = 1;
194         pointer->data = dynlock_create_callback(__FILE__,__LINE__);
195         if (pointer->data == NULL)
196                 {
197                 OPENSSL_free(pointer);
198                 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE);
199                 return(0);
200                 }
201
202         CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK);
203         /* First, try to find an existing empty slot */
204         i=sk_CRYPTO_dynlock_find(dyn_locks,NULL);
205         /* If there was none, push, thereby creating a new one */
206         if (i == -1)
207                 i=sk_CRYPTO_dynlock_push(dyn_locks,pointer);
208         CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK);
209
210         if (!i)
211                 {
212                 dynlock_destroy_callback(pointer->data,__FILE__,__LINE__);
213                 OPENSSL_free(pointer);
214                 }
215         else
216                 i += 1; /* to avoid 0 */
217         return -i;
218         }
219
220 void CRYPTO_destroy_dynlockid(int i)
221         {
222         CRYPTO_dynlock *pointer = NULL;
223         if (i)
224                 i = -i-1;
225         if (dynlock_destroy_callback == NULL)
226                 return;
227
228         CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK);
229
230         if (dyn_locks == NULL || i >= sk_CRYPTO_dynlock_num(dyn_locks))
231                 return;
232         pointer = sk_CRYPTO_dynlock_value(dyn_locks, i);
233         if (pointer != NULL)
234                 {
235                 --pointer->references;
236 #ifdef REF_CHECK
237                 if (pointer->references < 0)
238                         {
239                         fprintf(stderr,"CRYPTO_destroy_dynlockid, bad reference count\n");
240                         abort();
241                         }
242                 else
243 #endif
244                         if (--(pointer->references) <= 0)
245                                 {
246                                 sk_CRYPTO_dynlock_set(dyn_locks, i, NULL);
247                                 }
248                         else
249                                 pointer = NULL;
250                 }
251         CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK);
252
253         if (pointer)
254                 {
255                 dynlock_destroy_callback(pointer->data,__FILE__,__LINE__);
256                 OPENSSL_free(pointer);
257                 }
258         }
259
260 struct CRYPTO_dynlock_value *CRYPTO_get_dynlock_value(int i)
261         {
262         CRYPTO_dynlock *pointer = NULL;
263         if (i)
264                 i = -i-1;
265
266         CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK);
267
268         if (dyn_locks != NULL && i < sk_CRYPTO_dynlock_num(dyn_locks))
269                 pointer = sk_CRYPTO_dynlock_value(dyn_locks, i);
270         if (pointer)
271                 pointer->references++;
272
273         CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK);
274
275         if (pointer)
276                 return pointer->data;
277         return NULL;
278         }
279
280 struct CRYPTO_dynlock_value *(*CRYPTO_get_dynlock_create_callback(void))
281         (const char *file,int line)
282         {
283         return(dynlock_create_callback);
284         }
285
286 void (*CRYPTO_get_dynlock_lock_callback(void))(int mode,
287         struct CRYPTO_dynlock_value *l, const char *file,int line)
288         {
289         return(dynlock_lock_callback);
290         }
291
292 void (*CRYPTO_get_dynlock_destroy_callback(void))
293         (struct CRYPTO_dynlock_value *l, const char *file,int line)
294         {
295         return(dynlock_destroy_callback);
296         }
297
298 void CRYPTO_set_dynlock_create_callback(struct CRYPTO_dynlock_value *(*func)
299         (const char *file, int line))
300         {
301         dynlock_create_callback=func;
302         }
303
304 void CRYPTO_set_dynlock_lock_callback(void (*func)(int mode,
305         struct CRYPTO_dynlock_value *l, const char *file, int line))
306         {
307         dynlock_lock_callback=func;
308         }
309
310 void CRYPTO_set_dynlock_destroy_callback(void (*func)
311         (struct CRYPTO_dynlock_value *l, const char *file, int line))
312         {
313         dynlock_destroy_callback=func;
314         }
315
316
317 void (*CRYPTO_get_locking_callback(void))(int mode,int type,const char *file,
318                 int line)
319         {
320         return(locking_callback);
321         }
322
323 int (*CRYPTO_get_add_lock_callback(void))(int *num,int mount,int type,
324                                           const char *file,int line)
325         {
326         return(add_lock_callback);
327         }
328
329 void CRYPTO_set_locking_callback(void (*func)(int mode,int type,
330                                               const char *file,int line))
331         {
332         locking_callback=func;
333         }
334
335 void CRYPTO_set_add_lock_callback(int (*func)(int *num,int mount,int type,
336                                               const char *file,int line))
337         {
338         add_lock_callback=func;
339         }
340
341 unsigned long (*CRYPTO_get_id_callback(void))(void)
342         {
343         return(id_callback);
344         }
345
346 void CRYPTO_set_id_callback(unsigned long (*func)(void))
347         {
348         id_callback=func;
349         }
350
351 unsigned long CRYPTO_thread_id(void)
352         {
353         unsigned long ret=0;
354
355         if (id_callback == NULL)
356                 {
357 #ifdef OPENSSL_SYS_WIN16
358                 ret=(unsigned long)GetCurrentTask();
359 #elif defined(OPENSSL_SYS_WIN32)
360                 ret=(unsigned long)GetCurrentThreadId();
361 #elif defined(GETPID_IS_MEANINGLESS)
362                 ret=1L;
363 #else
364                 ret=(unsigned long)getpid();
365 #endif
366                 }
367         else
368                 ret=id_callback();
369         return(ret);
370         }
371
372 void CRYPTO_lock(int mode, int type, const char *file, int line)
373         {
374 #ifdef LOCK_DEBUG
375                 {
376                 char *rw_text,*operation_text;
377
378                 if (mode & CRYPTO_LOCK)
379                         operation_text="lock  ";
380                 else if (mode & CRYPTO_UNLOCK)
381                         operation_text="unlock";
382                 else
383                         operation_text="ERROR ";
384
385                 if (mode & CRYPTO_READ)
386                         rw_text="r";
387                 else if (mode & CRYPTO_WRITE)
388                         rw_text="w";
389                 else
390                         rw_text="ERROR";
391
392                 fprintf(stderr,"lock:%08lx:(%s)%s %-18s %s:%d\n",
393                         CRYPTO_thread_id(), rw_text, operation_text,
394                         CRYPTO_get_lock_name(type), file, line);
395                 }
396 #endif
397         if (type < 0)
398                 {
399                 int i = -type - 1;
400                 struct CRYPTO_dynlock_value *pointer
401                         = CRYPTO_get_dynlock_value(i);
402
403                 if (pointer)
404                         {
405                         dynlock_lock_callback(mode, pointer, file, line);
406                         }
407
408                 CRYPTO_destroy_dynlockid(i);
409                 }
410         else
411                 if (locking_callback != NULL)
412                         locking_callback(mode,type,file,line);
413         }
414
415 int CRYPTO_add_lock(int *pointer, int amount, int type, const char *file,
416              int line)
417         {
418         int ret = 0;
419
420         if (add_lock_callback != NULL)
421                 {
422 #ifdef LOCK_DEBUG
423                 int before= *pointer;
424 #endif
425
426                 ret=add_lock_callback(pointer,amount,type,file,line);
427 #ifdef LOCK_DEBUG
428                 fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n",
429                         CRYPTO_thread_id(),
430                         before,amount,ret,
431                         CRYPTO_get_lock_name(type),
432                         file,line);
433 #endif
434                 *pointer=ret;
435                 }
436         else
437                 {
438                 CRYPTO_lock(CRYPTO_LOCK|CRYPTO_WRITE,type,file,line);
439
440                 ret= *pointer+amount;
441 #ifdef LOCK_DEBUG
442                 fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n",
443                         CRYPTO_thread_id(),
444                         *pointer,amount,ret,
445                         CRYPTO_get_lock_name(type),
446                         file,line);
447 #endif
448                 *pointer=ret;
449                 CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_WRITE,type,file,line);
450                 }
451         return(ret);
452         }
453
454 const char *CRYPTO_get_lock_name(int type)
455         {
456         if (type < 0)
457                 return("dynamic");
458         else if (type < CRYPTO_NUM_LOCKS)
459                 return(lock_names[type]);
460         else if (type-CRYPTO_NUM_LOCKS >= sk_num(app_locks))
461                 return("ERROR");
462         else
463                 return(sk_value(app_locks,type-CRYPTO_NUM_LOCKS));
464         }
465
466 #ifdef _DLL
467 #ifdef OPENSSL_SYS_WIN32
468
469 /* All we really need to do is remove the 'error' state when a thread
470  * detaches */
471
472 BOOL WINAPI DLLEntryPoint(HINSTANCE hinstDLL, DWORD fdwReason,
473              LPVOID lpvReserved)
474         {
475         switch(fdwReason)
476                 {
477         case DLL_PROCESS_ATTACH:
478                 break;
479         case DLL_THREAD_ATTACH:
480                 break;
481         case DLL_THREAD_DETACH:
482                 ERR_remove_state(0);
483                 break;
484         case DLL_PROCESS_DETACH:
485                 break;
486                 }
487         return(TRUE);
488         }
489 #endif
490
491 #endif