2 * Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 /* We need to use some engine deprecated APIs */
11 #define OPENSSL_SUPPRESS_DEPRECATED
13 #include "eng_local.h"
14 #include "internal/dso.h"
15 #include <openssl/crypto.h>
18 * Shared libraries implementing ENGINEs for use by the "dynamic" ENGINE
19 * loader should implement the hook-up functions with the following
23 DEFINE_STACK_OF_STRING()
25 /* Our ENGINE handlers */
26 static int dynamic_init(ENGINE *e);
27 static int dynamic_finish(ENGINE *e);
28 static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p,
30 /* Predeclare our context type */
31 typedef struct st_dynamic_data_ctx dynamic_data_ctx;
32 /* The implementation for the important control command */
33 static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx);
35 #define DYNAMIC_CMD_SO_PATH ENGINE_CMD_BASE
36 #define DYNAMIC_CMD_NO_VCHECK (ENGINE_CMD_BASE + 1)
37 #define DYNAMIC_CMD_ID (ENGINE_CMD_BASE + 2)
38 #define DYNAMIC_CMD_LIST_ADD (ENGINE_CMD_BASE + 3)
39 #define DYNAMIC_CMD_DIR_LOAD (ENGINE_CMD_BASE + 4)
40 #define DYNAMIC_CMD_DIR_ADD (ENGINE_CMD_BASE + 5)
41 #define DYNAMIC_CMD_LOAD (ENGINE_CMD_BASE + 6)
43 /* The constants used when creating the ENGINE */
44 static const char *engine_dynamic_id = "dynamic";
45 static const char *engine_dynamic_name = "Dynamic engine loading support";
46 static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = {
49 "Specifies the path to the new ENGINE shared library",
50 ENGINE_CMD_FLAG_STRING},
51 {DYNAMIC_CMD_NO_VCHECK,
53 "Specifies to continue even if version checking fails (boolean)",
54 ENGINE_CMD_FLAG_NUMERIC},
57 "Specifies an ENGINE id name for loading",
58 ENGINE_CMD_FLAG_STRING},
59 {DYNAMIC_CMD_LIST_ADD,
61 "Whether to add a loaded ENGINE to the internal list (0=no,1=yes,2=mandatory)",
62 ENGINE_CMD_FLAG_NUMERIC},
63 {DYNAMIC_CMD_DIR_LOAD,
65 "Specifies whether to load from 'DIR_ADD' directories (0=no,1=yes,2=mandatory)",
66 ENGINE_CMD_FLAG_NUMERIC},
69 "Adds a directory from which ENGINEs can be loaded",
70 ENGINE_CMD_FLAG_STRING},
73 "Load up the ENGINE specified by other settings",
74 ENGINE_CMD_FLAG_NO_INPUT},
79 * Loading code stores state inside the ENGINE structure via the "ex_data"
80 * element. We load all our state into a single structure and use that as a
81 * single context in the "ex_data" stack.
83 struct st_dynamic_data_ctx {
84 /* The DSO object we load that supplies the ENGINE code */
87 * The function pointer to the version checking shared library function
89 dynamic_v_check_fn v_check;
91 * The function pointer to the engine-binding shared library function
93 dynamic_bind_engine bind_engine;
94 /* The default name/path for loading the shared library */
95 char *DYNAMIC_LIBNAME;
96 /* Whether to continue loading on a version check failure */
98 /* If non-NULL, stipulates the 'id' of the ENGINE to be loaded */
101 * If non-zero, a successfully loaded ENGINE should be added to the
102 * internal ENGINE list. If 2, the add must succeed or the entire load
106 /* The symbol name for the version checking function */
107 const char *DYNAMIC_F1;
108 /* The symbol name for the "initialise ENGINE structure" function */
109 const char *DYNAMIC_F2;
111 * Whether to never use 'dirs', use 'dirs' as a fallback, or only use
112 * 'dirs' for loading. Default is to use 'dirs' as a fallback.
115 /* A stack of directories from which ENGINEs could be loaded */
116 STACK_OF(OPENSSL_STRING) *dirs;
120 * This is the "ex_data" index we obtain and reserve for use with our context
123 static int dynamic_ex_data_idx = -1;
125 static void int_free_str(char *s)
131 * Because our ex_data element may or may not get allocated depending on
132 * whether a "first-use" occurs before the ENGINE is freed, we have a memory
133 * leak problem to solve. We can't declare a "new" handler for the ex_data as
134 * we don't want a dynamic_data_ctx in *all* ENGINE structures of all types
135 * (this is a bug in the design of CRYPTO_EX_DATA). As such, we just declare
136 * a "free" handler and that will get called if an ENGINE is being destroyed
137 * and there was an ex_data element corresponding to our context type.
139 static void dynamic_data_ctx_free_func(void *parent, void *ptr,
140 CRYPTO_EX_DATA *ad, int idx, long argl,
144 dynamic_data_ctx *ctx = (dynamic_data_ctx *)ptr;
145 DSO_free(ctx->dynamic_dso);
146 OPENSSL_free(ctx->DYNAMIC_LIBNAME);
147 OPENSSL_free(ctx->engine_id);
148 sk_OPENSSL_STRING_pop_free(ctx->dirs, int_free_str);
154 * Construct the per-ENGINE context. We create it blindly and then use a lock
155 * to check for a race - if so, all but one of the threads "racing" will have
156 * wasted their time. The alternative involves creating everything inside the
157 * lock which is far worse.
159 static int dynamic_set_data_ctx(ENGINE *e, dynamic_data_ctx **ctx)
161 dynamic_data_ctx *c = OPENSSL_zalloc(sizeof(*c));
165 ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE);
168 c->dirs = sk_OPENSSL_STRING_new_null();
169 if (c->dirs == NULL) {
170 ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE);
174 c->DYNAMIC_F1 = "v_check";
175 c->DYNAMIC_F2 = "bind_engine";
177 CRYPTO_THREAD_write_lock(global_engine_lock);
178 if ((*ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e,
179 dynamic_ex_data_idx))
181 /* Good, we're the first */
182 ret = ENGINE_set_ex_data(e, dynamic_ex_data_idx, c);
188 CRYPTO_THREAD_unlock(global_engine_lock);
190 * If we lost the race to set the context, c is non-NULL and *ctx is the
191 * context of the thread that won.
194 sk_OPENSSL_STRING_free(c->dirs);
200 * This function retrieves the context structure from an ENGINE's "ex_data",
201 * or if it doesn't exist yet, sets it up.
203 static dynamic_data_ctx *dynamic_get_data_ctx(ENGINE *e)
205 dynamic_data_ctx *ctx;
206 if (dynamic_ex_data_idx < 0) {
208 * Create and register the ENGINE ex_data, and associate our "free"
209 * function with it to ensure any allocated contexts get freed when
210 * an ENGINE goes underground.
212 int new_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL,
213 dynamic_data_ctx_free_func);
215 ENGINEerr(ENGINE_F_DYNAMIC_GET_DATA_CTX, ENGINE_R_NO_INDEX);
218 CRYPTO_THREAD_write_lock(global_engine_lock);
219 /* Avoid a race by checking again inside this lock */
220 if (dynamic_ex_data_idx < 0) {
221 /* Good, someone didn't beat us to it */
222 dynamic_ex_data_idx = new_idx;
225 CRYPTO_THREAD_unlock(global_engine_lock);
227 * In theory we could "give back" the index here if (new_idx>-1), but
228 * it's not possible and wouldn't gain us much if it were.
231 ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, dynamic_ex_data_idx);
232 /* Check if the context needs to be created */
233 if ((ctx == NULL) && !dynamic_set_data_ctx(e, &ctx))
234 /* "set_data" will set errors if necessary */
239 static ENGINE *engine_dynamic(void)
241 ENGINE *ret = ENGINE_new();
244 if (!ENGINE_set_id(ret, engine_dynamic_id) ||
245 !ENGINE_set_name(ret, engine_dynamic_name) ||
246 !ENGINE_set_init_function(ret, dynamic_init) ||
247 !ENGINE_set_finish_function(ret, dynamic_finish) ||
248 !ENGINE_set_ctrl_function(ret, dynamic_ctrl) ||
249 !ENGINE_set_flags(ret, ENGINE_FLAGS_BY_ID_COPY) ||
250 !ENGINE_set_cmd_defns(ret, dynamic_cmd_defns)) {
257 void engine_load_dynamic_int(void)
259 ENGINE *toadd = engine_dynamic();
264 * If the "add" worked, it gets a structural reference. So either way, we
265 * release our just-created reference.
269 * If the "add" didn't work, it was probably a conflict because it was
270 * already added (eg. someone calling ENGINE_load_blah then calling
271 * ENGINE_load_builtin_engines() perhaps).
276 static int dynamic_init(ENGINE *e)
279 * We always return failure - the "dynamic" engine itself can't be used
285 static int dynamic_finish(ENGINE *e)
288 * This should never be called on account of "dynamic_init" always
294 static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void))
296 dynamic_data_ctx *ctx = dynamic_get_data_ctx(e);
300 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_NOT_LOADED);
303 initialised = ((ctx->dynamic_dso == NULL) ? 0 : 1);
304 /* All our control commands require the ENGINE to be uninitialised */
306 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_ALREADY_LOADED);
310 case DYNAMIC_CMD_SO_PATH:
311 /* a NULL 'p' or a string of zero-length is the same thing */
312 if (p && (strlen((const char *)p) < 1))
314 OPENSSL_free(ctx->DYNAMIC_LIBNAME);
316 ctx->DYNAMIC_LIBNAME = OPENSSL_strdup(p);
318 ctx->DYNAMIC_LIBNAME = NULL;
319 return (ctx->DYNAMIC_LIBNAME ? 1 : 0);
320 case DYNAMIC_CMD_NO_VCHECK:
321 ctx->no_vcheck = ((i == 0) ? 0 : 1);
324 /* a NULL 'p' or a string of zero-length is the same thing */
325 if (p && (strlen((const char *)p) < 1))
327 OPENSSL_free(ctx->engine_id);
329 ctx->engine_id = OPENSSL_strdup(p);
331 ctx->engine_id = NULL;
332 return (ctx->engine_id ? 1 : 0);
333 case DYNAMIC_CMD_LIST_ADD:
334 if ((i < 0) || (i > 2)) {
335 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_INVALID_ARGUMENT);
338 ctx->list_add_value = (int)i;
340 case DYNAMIC_CMD_LOAD:
341 return dynamic_load(e, ctx);
342 case DYNAMIC_CMD_DIR_LOAD:
343 if ((i < 0) || (i > 2)) {
344 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_INVALID_ARGUMENT);
347 ctx->dir_load = (int)i;
349 case DYNAMIC_CMD_DIR_ADD:
350 /* a NULL 'p' or a string of zero-length is the same thing */
351 if (p == NULL || (strlen((const char *)p) < 1)) {
352 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_INVALID_ARGUMENT);
356 char *tmp_str = OPENSSL_strdup(p);
357 if (tmp_str == NULL) {
358 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ERR_R_MALLOC_FAILURE);
361 if (!sk_OPENSSL_STRING_push(ctx->dirs, tmp_str)) {
362 OPENSSL_free(tmp_str);
363 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ERR_R_MALLOC_FAILURE);
371 ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED);
375 static int int_load(dynamic_data_ctx *ctx)
378 /* Unless told not to, try a direct load */
379 if ((ctx->dir_load != 2) && (DSO_load(ctx->dynamic_dso,
380 ctx->DYNAMIC_LIBNAME, NULL,
383 /* If we're not allowed to use 'dirs' or we have none, fail */
384 if (!ctx->dir_load || (num = sk_OPENSSL_STRING_num(ctx->dirs)) < 1)
386 for (loop = 0; loop < num; loop++) {
387 const char *s = sk_OPENSSL_STRING_value(ctx->dirs, loop);
388 char *merge = DSO_merge(ctx->dynamic_dso, ctx->DYNAMIC_LIBNAME, s);
391 if (DSO_load(ctx->dynamic_dso, merge, NULL, 0)) {
392 /* Found what we're looking for */
401 static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx)
406 if (ctx->dynamic_dso == NULL)
407 ctx->dynamic_dso = DSO_new();
408 if (ctx->dynamic_dso == NULL)
410 if (!ctx->DYNAMIC_LIBNAME) {
413 DSO_ctrl(ctx->dynamic_dso, DSO_CTRL_SET_FLAGS,
414 DSO_FLAG_NAME_TRANSLATION_EXT_ONLY, NULL);
415 ctx->DYNAMIC_LIBNAME =
416 DSO_convert_filename(ctx->dynamic_dso, ctx->engine_id);
418 if (!int_load(ctx)) {
419 ENGINEerr(ENGINE_F_DYNAMIC_LOAD, ENGINE_R_DSO_NOT_FOUND);
420 DSO_free(ctx->dynamic_dso);
421 ctx->dynamic_dso = NULL;
424 /* We have to find a bind function otherwise it'll always end badly */
427 (dynamic_bind_engine) DSO_bind_func(ctx->dynamic_dso,
429 ctx->bind_engine = NULL;
430 DSO_free(ctx->dynamic_dso);
431 ctx->dynamic_dso = NULL;
432 ENGINEerr(ENGINE_F_DYNAMIC_LOAD, ENGINE_R_DSO_FAILURE);
435 /* Do we perform version checking? */
436 if (!ctx->no_vcheck) {
437 unsigned long vcheck_res = 0;
439 * Now we try to find a version checking function and decide how to
440 * cope with failure if/when it fails.
443 (dynamic_v_check_fn) DSO_bind_func(ctx->dynamic_dso,
446 vcheck_res = ctx->v_check(OSSL_DYNAMIC_VERSION);
448 * We fail if the version checker veto'd the load *or* if it is
449 * deferring to us (by returning its version) and we think it is too
452 if (vcheck_res < OSSL_DYNAMIC_OLDEST) {
454 ctx->bind_engine = NULL;
456 DSO_free(ctx->dynamic_dso);
457 ctx->dynamic_dso = NULL;
458 ENGINEerr(ENGINE_F_DYNAMIC_LOAD,
459 ENGINE_R_VERSION_INCOMPATIBILITY);
464 * First binary copy the ENGINE structure so that we can roll back if the
467 memcpy(&cpy, e, sizeof(ENGINE));
469 * Provide the ERR, "ex_data", memory, and locking callbacks so the
470 * loaded library uses our state rather than its own. FIXME: As noted in
471 * engine.h, much of this would be simplified if each area of code
472 * provided its own "summary" structure of all related callbacks. It
473 * would also increase opaqueness.
475 fns.static_state = ENGINE_get_static_state();
476 CRYPTO_get_mem_functions(&fns.mem_fns.malloc_fn, &fns.mem_fns.realloc_fn,
477 &fns.mem_fns.free_fn);
479 * Now that we've loaded the dynamic engine, make sure no "dynamic"
480 * ENGINE elements will show through.
482 engine_set_all_null(e);
484 /* Try to bind the ENGINE onto our own ENGINE structure */
485 if (!ctx->bind_engine(e, ctx->engine_id, &fns)) {
486 ctx->bind_engine = NULL;
488 DSO_free(ctx->dynamic_dso);
489 ctx->dynamic_dso = NULL;
490 ENGINEerr(ENGINE_F_DYNAMIC_LOAD, ENGINE_R_INIT_FAILED);
491 /* Copy the original ENGINE structure back */
492 memcpy(e, &cpy, sizeof(ENGINE));
495 /* Do we try to add this ENGINE to the internal list too? */
496 if (ctx->list_add_value > 0) {
497 if (!ENGINE_add(e)) {
498 /* Do we tolerate this or fail? */
499 if (ctx->list_add_value > 1) {
501 * Fail - NB: By this time, it's too late to rollback, and
502 * trying to do so allows the bind_engine() code to have
503 * created leaks. We just have to fail where we are, after
504 * the ENGINE has changed.
506 ENGINEerr(ENGINE_F_DYNAMIC_LOAD,
507 ENGINE_R_CONFLICTING_ENGINE_ID);