diff options
Diffstat (limited to 'src/lib')
34 files changed, 22 insertions, 1060 deletions
diff --git a/src/lib/libcrypto/arch/alpha/opensslconf.h b/src/lib/libcrypto/arch/alpha/opensslconf.h index 6e1e9b6f53..a74c6df644 100644 --- a/src/lib/libcrypto/arch/alpha/opensslconf.h +++ b/src/lib/libcrypto/arch/alpha/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/amd64/opensslconf.h b/src/lib/libcrypto/arch/amd64/opensslconf.h index c64d4d336c..cbd5d53ca4 100644 --- a/src/lib/libcrypto/arch/amd64/opensslconf.h +++ b/src/lib/libcrypto/arch/amd64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/arm/opensslconf.h b/src/lib/libcrypto/arch/arm/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/arm/opensslconf.h +++ b/src/lib/libcrypto/arch/arm/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/hppa/opensslconf.h b/src/lib/libcrypto/arch/hppa/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/hppa/opensslconf.h +++ b/src/lib/libcrypto/arch/hppa/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/hppa64/opensslconf.h b/src/lib/libcrypto/arch/hppa64/opensslconf.h index 73df98a2b5..54b8f59b76 100644 --- a/src/lib/libcrypto/arch/hppa64/opensslconf.h +++ b/src/lib/libcrypto/arch/hppa64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/i386/opensslconf.h b/src/lib/libcrypto/arch/i386/opensslconf.h index e47000cf63..37137ff102 100644 --- a/src/lib/libcrypto/arch/i386/opensslconf.h +++ b/src/lib/libcrypto/arch/i386/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/m88k/opensslconf.h b/src/lib/libcrypto/arch/m88k/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/m88k/opensslconf.h +++ b/src/lib/libcrypto/arch/m88k/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/mips64/opensslconf.h b/src/lib/libcrypto/arch/mips64/opensslconf.h index 52159f3013..ef7a679d94 100644 --- a/src/lib/libcrypto/arch/mips64/opensslconf.h +++ b/src/lib/libcrypto/arch/mips64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/powerpc/opensslconf.h b/src/lib/libcrypto/arch/powerpc/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/powerpc/opensslconf.h +++ b/src/lib/libcrypto/arch/powerpc/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/sh/opensslconf.h b/src/lib/libcrypto/arch/sh/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/sh/opensslconf.h +++ b/src/lib/libcrypto/arch/sh/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/sparc/opensslconf.h b/src/lib/libcrypto/arch/sparc/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/sparc/opensslconf.h +++ b/src/lib/libcrypto/arch/sparc/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/sparc64/opensslconf.h b/src/lib/libcrypto/arch/sparc64/opensslconf.h index 52159f3013..ef7a679d94 100644 --- a/src/lib/libcrypto/arch/sparc64/opensslconf.h +++ b/src/lib/libcrypto/arch/sparc64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/arch/vax/opensslconf.h b/src/lib/libcrypto/arch/vax/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/arch/vax/opensslconf.h +++ b/src/lib/libcrypto/arch/vax/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/alpha/opensslconf.h b/src/lib/libcrypto/crypto/arch/alpha/opensslconf.h index 6e1e9b6f53..a74c6df644 100644 --- a/src/lib/libcrypto/crypto/arch/alpha/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/alpha/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/amd64/opensslconf.h b/src/lib/libcrypto/crypto/arch/amd64/opensslconf.h index c64d4d336c..cbd5d53ca4 100644 --- a/src/lib/libcrypto/crypto/arch/amd64/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/amd64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/arm/opensslconf.h b/src/lib/libcrypto/crypto/arch/arm/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/arm/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/arm/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/hppa/opensslconf.h b/src/lib/libcrypto/crypto/arch/hppa/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/hppa/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/hppa/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/hppa64/opensslconf.h b/src/lib/libcrypto/crypto/arch/hppa64/opensslconf.h index 73df98a2b5..54b8f59b76 100644 --- a/src/lib/libcrypto/crypto/arch/hppa64/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/hppa64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/i386/opensslconf.h b/src/lib/libcrypto/crypto/arch/i386/opensslconf.h index e47000cf63..37137ff102 100644 --- a/src/lib/libcrypto/crypto/arch/i386/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/i386/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/m88k/opensslconf.h b/src/lib/libcrypto/crypto/arch/m88k/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/m88k/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/m88k/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/mips64/opensslconf.h b/src/lib/libcrypto/crypto/arch/mips64/opensslconf.h index 52159f3013..ef7a679d94 100644 --- a/src/lib/libcrypto/crypto/arch/mips64/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/mips64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/powerpc/opensslconf.h b/src/lib/libcrypto/crypto/arch/powerpc/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/powerpc/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/powerpc/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/sh/opensslconf.h b/src/lib/libcrypto/crypto/arch/sh/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/sh/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/sh/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/sparc/opensslconf.h b/src/lib/libcrypto/crypto/arch/sparc/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/sparc/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/sparc/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/sparc64/opensslconf.h b/src/lib/libcrypto/crypto/arch/sparc64/opensslconf.h index 52159f3013..ef7a679d94 100644 --- a/src/lib/libcrypto/crypto/arch/sparc64/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/sparc64/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/crypto/arch/vax/opensslconf.h b/src/lib/libcrypto/crypto/arch/vax/opensslconf.h index afbd54ed3d..e3795ce73a 100644 --- a/src/lib/libcrypto/crypto/arch/vax/opensslconf.h +++ b/src/lib/libcrypto/crypto/arch/vax/opensslconf.h | |||
@@ -5,7 +5,6 @@ | |||
5 | #undef I386_ONLY | 5 | #undef I386_ONLY |
6 | 6 | ||
7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) | 7 | #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) |
8 | #define ENGINESDIR "/usr/lib/engines" | ||
9 | #define OPENSSLDIR "/etc/ssl" | 8 | #define OPENSSLDIR "/etc/ssl" |
10 | #endif | 9 | #endif |
11 | 10 | ||
diff --git a/src/lib/libcrypto/doc/engine.pod b/src/lib/libcrypto/doc/engine.pod index 4a6ee59138..578a702371 100644 --- a/src/lib/libcrypto/doc/engine.pod +++ b/src/lib/libcrypto/doc/engine.pod | |||
@@ -309,11 +309,11 @@ consideration is whether any/all available ENGINE implementations should be | |||
309 | made visible to OpenSSL - this is controlled by calling the various "load" | 309 | made visible to OpenSSL - this is controlled by calling the various "load" |
310 | functions, eg. | 310 | functions, eg. |
311 | 311 | ||
312 | /* Make the "dynamic" ENGINE available */ | ||
313 | void ENGINE_load_dynamic(void); | ||
314 | ... | ||
315 | /* Make ALL ENGINE implementations bundled with OpenSSL available */ | 312 | /* Make ALL ENGINE implementations bundled with OpenSSL available */ |
316 | void ENGINE_load_builtin_engines(void); | 313 | ENGINE_load_builtin_engines(); |
314 | |||
315 | Note that ENGINE_load_dynamic(void) is a placeholder and does not enable | ||
316 | dynamic engine loading support. | ||
317 | 317 | ||
318 | Having called any of these functions, ENGINE objects would have been | 318 | Having called any of these functions, ENGINE objects would have been |
319 | dynamically allocated and populated with these implementations and linked | 319 | dynamically allocated and populated with these implementations and linked |
diff --git a/src/lib/libcrypto/engine/eng_all.c b/src/lib/libcrypto/engine/eng_all.c index 014bcb132e..b428300e76 100644 --- a/src/lib/libcrypto/engine/eng_all.c +++ b/src/lib/libcrypto/engine/eng_all.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_all.c,v 1.27 2015/02/07 13:19:15 doug Exp $ */ | 1 | /* $OpenBSD: eng_all.c,v 1.28 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL | 2 | /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -70,7 +70,6 @@ ENGINE_load_builtin_engines(void) | |||
70 | #ifndef OPENSSL_NO_RSAX | 70 | #ifndef OPENSSL_NO_RSAX |
71 | ENGINE_load_rsax(); | 71 | ENGINE_load_rsax(); |
72 | #endif | 72 | #endif |
73 | ENGINE_load_dynamic(); | ||
74 | #ifndef OPENSSL_NO_STATIC_ENGINE | 73 | #ifndef OPENSSL_NO_STATIC_ENGINE |
75 | #ifndef OPENSSL_NO_HW | 74 | #ifndef OPENSSL_NO_HW |
76 | #ifndef OPENSSL_NO_HW_PADLOCK | 75 | #ifndef OPENSSL_NO_HW_PADLOCK |
diff --git a/src/lib/libcrypto/engine/eng_dyn.c b/src/lib/libcrypto/engine/eng_dyn.c index c78d9f6856..400ce72681 100644 --- a/src/lib/libcrypto/engine/eng_dyn.c +++ b/src/lib/libcrypto/engine/eng_dyn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_dyn.c,v 1.13 2015/02/11 03:19:37 doug Exp $ */ | 1 | /* $OpenBSD: eng_dyn.c,v 1.14 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | 2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -56,492 +56,9 @@ | |||
56 | * | 56 | * |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #include <string.h> | 59 | #include <openssl/engine.h> |
60 | |||
61 | #include <openssl/err.h> | ||
62 | |||
63 | #include "eng_int.h" | ||
64 | #include <openssl/dso.h> | ||
65 | |||
66 | /* Shared libraries implementing ENGINEs for use by the "dynamic" ENGINE loader | ||
67 | * should implement the hook-up functions with the following prototypes. */ | ||
68 | |||
69 | /* Our ENGINE handlers */ | ||
70 | static int dynamic_init(ENGINE *e); | ||
71 | static int dynamic_finish(ENGINE *e); | ||
72 | static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void)); | ||
73 | /* Predeclare our context type */ | ||
74 | typedef struct st_dynamic_data_ctx dynamic_data_ctx; | ||
75 | /* The implementation for the important control command */ | ||
76 | static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx); | ||
77 | |||
78 | #define DYNAMIC_CMD_SO_PATH ENGINE_CMD_BASE | ||
79 | #define DYNAMIC_CMD_NO_VCHECK (ENGINE_CMD_BASE + 1) | ||
80 | #define DYNAMIC_CMD_ID (ENGINE_CMD_BASE + 2) | ||
81 | #define DYNAMIC_CMD_LIST_ADD (ENGINE_CMD_BASE + 3) | ||
82 | #define DYNAMIC_CMD_DIR_LOAD (ENGINE_CMD_BASE + 4) | ||
83 | #define DYNAMIC_CMD_DIR_ADD (ENGINE_CMD_BASE + 5) | ||
84 | #define DYNAMIC_CMD_LOAD (ENGINE_CMD_BASE + 6) | ||
85 | |||
86 | /* The constants used when creating the ENGINE */ | ||
87 | static const char *engine_dynamic_id = "dynamic"; | ||
88 | static const char *engine_dynamic_name = "Dynamic engine loading support"; | ||
89 | static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = { | ||
90 | { | ||
91 | DYNAMIC_CMD_SO_PATH, | ||
92 | "SO_PATH", | ||
93 | "Specifies the path to the new ENGINE shared library", | ||
94 | ENGINE_CMD_FLAG_STRING}, | ||
95 | { | ||
96 | DYNAMIC_CMD_NO_VCHECK, | ||
97 | "NO_VCHECK", | ||
98 | "Specifies to continue even if version checking fails (boolean)", | ||
99 | ENGINE_CMD_FLAG_NUMERIC}, | ||
100 | { | ||
101 | DYNAMIC_CMD_ID, | ||
102 | "ID", | ||
103 | "Specifies an ENGINE id name for loading", | ||
104 | ENGINE_CMD_FLAG_STRING}, | ||
105 | { | ||
106 | DYNAMIC_CMD_LIST_ADD, | ||
107 | "LIST_ADD", | ||
108 | "Whether to add a loaded ENGINE to the internal list (0=no,1=yes,2=mandatory)", | ||
109 | ENGINE_CMD_FLAG_NUMERIC}, | ||
110 | { | ||
111 | DYNAMIC_CMD_DIR_LOAD, | ||
112 | "DIR_LOAD", | ||
113 | "Specifies whether to load from 'DIR_ADD' directories (0=no,1=yes,2=mandatory)", | ||
114 | ENGINE_CMD_FLAG_NUMERIC}, | ||
115 | { | ||
116 | DYNAMIC_CMD_DIR_ADD, | ||
117 | "DIR_ADD", | ||
118 | "Adds a directory from which ENGINEs can be loaded", | ||
119 | ENGINE_CMD_FLAG_STRING}, | ||
120 | { | ||
121 | DYNAMIC_CMD_LOAD, | ||
122 | "LOAD", | ||
123 | "Load up the ENGINE specified by other settings", | ||
124 | ENGINE_CMD_FLAG_NO_INPUT}, | ||
125 | |||
126 | {0, NULL, NULL, 0} | ||
127 | }; | ||
128 | |||
129 | /* Loading code stores state inside the ENGINE structure via the "ex_data" | ||
130 | * element. We load all our state into a single structure and use that as a | ||
131 | * single context in the "ex_data" stack. */ | ||
132 | struct st_dynamic_data_ctx { | ||
133 | /* The DSO object we load that supplies the ENGINE code */ | ||
134 | DSO *dynamic_dso; | ||
135 | /* The function pointer to the version checking shared library function */ | ||
136 | dynamic_v_check_fn v_check; | ||
137 | /* The function pointer to the engine-binding shared library function */ | ||
138 | dynamic_bind_engine bind_engine; | ||
139 | /* The default name/path for loading the shared library */ | ||
140 | const char *DYNAMIC_LIBNAME; | ||
141 | /* Whether to continue loading on a version check failure */ | ||
142 | int no_vcheck; | ||
143 | /* If non-NULL, stipulates the 'id' of the ENGINE to be loaded */ | ||
144 | const char *engine_id; | ||
145 | /* If non-zero, a successfully loaded ENGINE should be added to the internal | ||
146 | * ENGINE list. If 2, the add must succeed or the entire load should fail. */ | ||
147 | int list_add_value; | ||
148 | /* The symbol name for the version checking function */ | ||
149 | const char *DYNAMIC_F1; | ||
150 | /* The symbol name for the "initialise ENGINE structure" function */ | ||
151 | const char *DYNAMIC_F2; | ||
152 | /* Whether to never use 'dirs', use 'dirs' as a fallback, or only use | ||
153 | * 'dirs' for loading. Default is to use 'dirs' as a fallback. */ | ||
154 | int dir_load; | ||
155 | /* A stack of directories from which ENGINEs could be loaded */ | ||
156 | STACK_OF(OPENSSL_STRING) *dirs; | ||
157 | }; | ||
158 | |||
159 | /* This is the "ex_data" index we obtain and reserve for use with our context | ||
160 | * structure. */ | ||
161 | static int dynamic_ex_data_idx = -1; | ||
162 | |||
163 | static void | ||
164 | int_free_str(char *s) | ||
165 | { | ||
166 | free(s); | ||
167 | } | ||
168 | |||
169 | /* Because our ex_data element may or may not get allocated depending on whether | ||
170 | * a "first-use" occurs before the ENGINE is freed, we have a memory leak | ||
171 | * problem to solve. We can't declare a "new" handler for the ex_data as we | ||
172 | * don't want a dynamic_data_ctx in *all* ENGINE structures of all types (this | ||
173 | * is a bug in the design of CRYPTO_EX_DATA). As such, we just declare a "free" | ||
174 | * handler and that will get called if an ENGINE is being destroyed and there | ||
175 | * was an ex_data element corresponding to our context type. */ | ||
176 | static void | ||
177 | dynamic_data_ctx_free_func(void *parent, void *ptr, CRYPTO_EX_DATA *ad, | ||
178 | int idx, long argl, void *argp) | ||
179 | { | ||
180 | if (ptr) { | ||
181 | dynamic_data_ctx *ctx = (dynamic_data_ctx *)ptr; | ||
182 | if (ctx->dynamic_dso) | ||
183 | DSO_free(ctx->dynamic_dso); | ||
184 | free((void *)ctx->DYNAMIC_LIBNAME); | ||
185 | free((void *)ctx->engine_id); | ||
186 | if (ctx->dirs) | ||
187 | sk_OPENSSL_STRING_pop_free(ctx->dirs, int_free_str); | ||
188 | free(ctx); | ||
189 | } | ||
190 | } | ||
191 | |||
192 | /* Construct the per-ENGINE context. We create it blindly and then use a lock to | ||
193 | * check for a race - if so, all but one of the threads "racing" will have | ||
194 | * wasted their time. The alternative involves creating everything inside the | ||
195 | * lock which is far worse. */ | ||
196 | static int | ||
197 | dynamic_set_data_ctx(ENGINE *e, dynamic_data_ctx **ctx) | ||
198 | { | ||
199 | dynamic_data_ctx *c; | ||
200 | |||
201 | c = malloc(sizeof(dynamic_data_ctx)); | ||
202 | if (!c) { | ||
203 | ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE); | ||
204 | return 0; | ||
205 | } | ||
206 | memset(c, 0, sizeof(dynamic_data_ctx)); | ||
207 | c->dynamic_dso = NULL; | ||
208 | c->v_check = NULL; | ||
209 | c->bind_engine = NULL; | ||
210 | c->DYNAMIC_LIBNAME = NULL; | ||
211 | c->no_vcheck = 0; | ||
212 | c->engine_id = NULL; | ||
213 | c->list_add_value = 0; | ||
214 | c->DYNAMIC_F1 = "v_check"; | ||
215 | c->DYNAMIC_F2 = "bind_engine"; | ||
216 | c->dir_load = 1; | ||
217 | c->dirs = sk_OPENSSL_STRING_new_null(); | ||
218 | if (!c->dirs) { | ||
219 | ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE); | ||
220 | free(c); | ||
221 | return 0; | ||
222 | } | ||
223 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | ||
224 | if ((*ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, | ||
225 | dynamic_ex_data_idx)) == NULL) { | ||
226 | /* Good, we're the first */ | ||
227 | ENGINE_set_ex_data(e, dynamic_ex_data_idx, c); | ||
228 | *ctx = c; | ||
229 | c = NULL; | ||
230 | } | ||
231 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | ||
232 | /* If we lost the race to set the context, c is non-NULL and *ctx is the | ||
233 | * context of the thread that won. */ | ||
234 | free(c); | ||
235 | return 1; | ||
236 | } | ||
237 | |||
238 | /* This function retrieves the context structure from an ENGINE's "ex_data", or | ||
239 | * if it doesn't exist yet, sets it up. */ | ||
240 | static dynamic_data_ctx * | ||
241 | dynamic_get_data_ctx(ENGINE *e) | ||
242 | { | ||
243 | dynamic_data_ctx *ctx; | ||
244 | if (dynamic_ex_data_idx < 0) { | ||
245 | /* Create and register the ENGINE ex_data, and associate our | ||
246 | * "free" function with it to ensure any allocated contexts get | ||
247 | * freed when an ENGINE goes underground. */ | ||
248 | int new_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL, | ||
249 | dynamic_data_ctx_free_func); | ||
250 | if (new_idx == -1) { | ||
251 | ENGINEerr(ENGINE_F_DYNAMIC_GET_DATA_CTX, | ||
252 | ENGINE_R_NO_INDEX); | ||
253 | return NULL; | ||
254 | } | ||
255 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | ||
256 | /* Avoid a race by checking again inside this lock */ | ||
257 | if (dynamic_ex_data_idx < 0) { | ||
258 | /* Good, someone didn't beat us to it */ | ||
259 | dynamic_ex_data_idx = new_idx; | ||
260 | new_idx = -1; | ||
261 | } | ||
262 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | ||
263 | /* In theory we could "give back" the index here if | ||
264 | * (new_idx>-1), but it's not possible and wouldn't gain us much | ||
265 | * if it were. */ | ||
266 | } | ||
267 | ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, dynamic_ex_data_idx); | ||
268 | /* Check if the context needs to be created */ | ||
269 | if ((ctx == NULL) && !dynamic_set_data_ctx(e, &ctx)) | ||
270 | /* "set_data" will set errors if necessary */ | ||
271 | return NULL; | ||
272 | return ctx; | ||
273 | } | ||
274 | |||
275 | static ENGINE * | ||
276 | engine_dynamic(void) | ||
277 | { | ||
278 | ENGINE *ret = ENGINE_new(); | ||
279 | |||
280 | if (!ret) | ||
281 | return NULL; | ||
282 | |||
283 | if (!ENGINE_set_id(ret, engine_dynamic_id) || | ||
284 | !ENGINE_set_name(ret, engine_dynamic_name) || | ||
285 | !ENGINE_set_init_function(ret, dynamic_init) || | ||
286 | !ENGINE_set_finish_function(ret, dynamic_finish) || | ||
287 | !ENGINE_set_ctrl_function(ret, dynamic_ctrl) || | ||
288 | !ENGINE_set_flags(ret, ENGINE_FLAGS_BY_ID_COPY) || | ||
289 | !ENGINE_set_cmd_defns(ret, dynamic_cmd_defns)) { | ||
290 | ENGINE_free(ret); | ||
291 | return NULL; | ||
292 | } | ||
293 | return ret; | ||
294 | } | ||
295 | 60 | ||
296 | void | 61 | void |
297 | ENGINE_load_dynamic(void) | 62 | ENGINE_load_dynamic(void) |
298 | { | 63 | { |
299 | ENGINE *toadd = engine_dynamic(); | ||
300 | |||
301 | if (!toadd) | ||
302 | return; | ||
303 | |||
304 | ENGINE_add(toadd); | ||
305 | /* If the "add" worked, it gets a structural reference. So either way, | ||
306 | * we release our just-created reference. */ | ||
307 | ENGINE_free(toadd); | ||
308 | /* If the "add" didn't work, it was probably a conflict because it was | ||
309 | * already added (eg. someone calling ENGINE_load_blah then calling | ||
310 | * ENGINE_load_builtin_engines() perhaps). */ | ||
311 | ERR_clear_error(); | ||
312 | } | ||
313 | |||
314 | static int | ||
315 | dynamic_init(ENGINE *e) | ||
316 | { | ||
317 | /* We always return failure - the "dyanamic" engine itself can't be used | ||
318 | * for anything. */ | ||
319 | return 0; | ||
320 | } | ||
321 | |||
322 | static int | ||
323 | dynamic_finish(ENGINE *e) | ||
324 | { | ||
325 | /* This should never be called on account of "dynamic_init" always | ||
326 | * failing. */ | ||
327 | return 0; | ||
328 | } | ||
329 | |||
330 | static int | ||
331 | dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void)) | ||
332 | { | ||
333 | dynamic_data_ctx *ctx = dynamic_get_data_ctx(e); | ||
334 | int initialised; | ||
335 | |||
336 | if (!ctx) { | ||
337 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_NOT_LOADED); | ||
338 | return 0; | ||
339 | } | ||
340 | initialised = ((ctx->dynamic_dso == NULL) ? 0 : 1); | ||
341 | /* All our control commands require the ENGINE to be uninitialised */ | ||
342 | if (initialised) { | ||
343 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_ALREADY_LOADED); | ||
344 | return 0; | ||
345 | } | ||
346 | switch (cmd) { | ||
347 | case DYNAMIC_CMD_SO_PATH: | ||
348 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
349 | if (p && (strlen((const char *)p) < 1)) | ||
350 | p = NULL; | ||
351 | free((void *)ctx->DYNAMIC_LIBNAME); | ||
352 | if (p) | ||
353 | ctx->DYNAMIC_LIBNAME = strdup(p); | ||
354 | else | ||
355 | ctx->DYNAMIC_LIBNAME = NULL; | ||
356 | return (ctx->DYNAMIC_LIBNAME ? 1 : 0); | ||
357 | case DYNAMIC_CMD_NO_VCHECK: | ||
358 | ctx->no_vcheck = ((i == 0) ? 0 : 1); | ||
359 | return 1; | ||
360 | case DYNAMIC_CMD_ID: | ||
361 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
362 | if (p && (strlen((const char *)p) < 1)) | ||
363 | p = NULL; | ||
364 | free((void *)ctx->engine_id); | ||
365 | if (p) | ||
366 | ctx->engine_id = strdup(p); | ||
367 | else | ||
368 | ctx->engine_id = NULL; | ||
369 | return (ctx->engine_id ? 1 : 0); | ||
370 | case DYNAMIC_CMD_LIST_ADD: | ||
371 | if ((i < 0) || (i > 2)) { | ||
372 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
373 | ENGINE_R_INVALID_ARGUMENT); | ||
374 | return 0; | ||
375 | } | ||
376 | ctx->list_add_value = (int)i; | ||
377 | return 1; | ||
378 | case DYNAMIC_CMD_LOAD: | ||
379 | return dynamic_load(e, ctx); | ||
380 | case DYNAMIC_CMD_DIR_LOAD: | ||
381 | if ((i < 0) || (i > 2)) { | ||
382 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
383 | ENGINE_R_INVALID_ARGUMENT); | ||
384 | return 0; | ||
385 | } | ||
386 | ctx->dir_load = (int)i; | ||
387 | return 1; | ||
388 | case DYNAMIC_CMD_DIR_ADD: | ||
389 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
390 | if (!p || (strlen((const char *)p) < 1)) { | ||
391 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
392 | ENGINE_R_INVALID_ARGUMENT); | ||
393 | return 0; | ||
394 | } | ||
395 | { | ||
396 | char *tmp_str = strdup(p); | ||
397 | if (!tmp_str) { | ||
398 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
399 | ERR_R_MALLOC_FAILURE); | ||
400 | return 0; | ||
401 | } | ||
402 | sk_OPENSSL_STRING_insert(ctx->dirs, tmp_str, -1); | ||
403 | } | ||
404 | return 1; | ||
405 | default: | ||
406 | break; | ||
407 | } | ||
408 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED); | ||
409 | return 0; | ||
410 | } | ||
411 | |||
412 | static int | ||
413 | int_load(dynamic_data_ctx *ctx) | ||
414 | { | ||
415 | int num, loop; | ||
416 | |||
417 | /* Unless told not to, try a direct load */ | ||
418 | if ((ctx->dir_load != 2) && (DSO_load(ctx->dynamic_dso, | ||
419 | ctx->DYNAMIC_LIBNAME, NULL, 0)) != NULL) | ||
420 | return 1; | ||
421 | /* If we're not allowed to use 'dirs' or we have none, fail */ | ||
422 | if (!ctx->dir_load || (num = sk_OPENSSL_STRING_num(ctx->dirs)) < 1) | ||
423 | return 0; | ||
424 | for (loop = 0; loop < num; loop++) { | ||
425 | const char *s = sk_OPENSSL_STRING_value(ctx->dirs, loop); | ||
426 | char *merge = DSO_merge(ctx->dynamic_dso, | ||
427 | ctx->DYNAMIC_LIBNAME, s); | ||
428 | if (!merge) | ||
429 | return 0; | ||
430 | if (DSO_load(ctx->dynamic_dso, merge, NULL, 0)) { | ||
431 | /* Found what we're looking for */ | ||
432 | free(merge); | ||
433 | return 1; | ||
434 | } | ||
435 | free(merge); | ||
436 | } | ||
437 | return 0; | ||
438 | } | ||
439 | |||
440 | static int | ||
441 | dynamic_load(ENGINE *e, dynamic_data_ctx *ctx) | ||
442 | { | ||
443 | ENGINE cpy; | ||
444 | dynamic_fns fns; | ||
445 | |||
446 | if (!ctx->dynamic_dso) | ||
447 | ctx->dynamic_dso = DSO_new(); | ||
448 | if (!ctx->DYNAMIC_LIBNAME) { | ||
449 | if (!ctx->engine_id) | ||
450 | return 0; | ||
451 | ctx->DYNAMIC_LIBNAME = DSO_convert_filename(ctx->dynamic_dso, | ||
452 | ctx->engine_id); | ||
453 | } | ||
454 | if (!int_load(ctx)) { | ||
455 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
456 | ENGINE_R_DSO_NOT_FOUND); | ||
457 | DSO_free(ctx->dynamic_dso); | ||
458 | ctx->dynamic_dso = NULL; | ||
459 | return 0; | ||
460 | } | ||
461 | /* We have to find a bind function otherwise it'll always end badly */ | ||
462 | if (!(ctx->bind_engine = (dynamic_bind_engine)DSO_bind_func( | ||
463 | ctx->dynamic_dso, ctx->DYNAMIC_F2))) { | ||
464 | ctx->bind_engine = NULL; | ||
465 | DSO_free(ctx->dynamic_dso); | ||
466 | ctx->dynamic_dso = NULL; | ||
467 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
468 | ENGINE_R_DSO_FAILURE); | ||
469 | return 0; | ||
470 | } | ||
471 | /* Do we perform version checking? */ | ||
472 | if (!ctx->no_vcheck) { | ||
473 | unsigned long vcheck_res = 0; | ||
474 | /* Now we try to find a version checking function and decide how | ||
475 | * to cope with failure if/when it fails. */ | ||
476 | ctx->v_check = (dynamic_v_check_fn)DSO_bind_func( | ||
477 | ctx->dynamic_dso, ctx->DYNAMIC_F1); | ||
478 | if (ctx->v_check) | ||
479 | vcheck_res = ctx->v_check(OSSL_DYNAMIC_VERSION); | ||
480 | /* We fail if the version checker veto'd the load *or* if it is | ||
481 | * deferring to us (by returning its version) and we think it is | ||
482 | * too old. */ | ||
483 | if (vcheck_res < OSSL_DYNAMIC_OLDEST) { | ||
484 | /* Fail */ | ||
485 | ctx->bind_engine = NULL; | ||
486 | ctx->v_check = NULL; | ||
487 | DSO_free(ctx->dynamic_dso); | ||
488 | ctx->dynamic_dso = NULL; | ||
489 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
490 | ENGINE_R_VERSION_INCOMPATIBILITY); | ||
491 | return 0; | ||
492 | } | ||
493 | } | ||
494 | /* First binary copy the ENGINE structure so that we can roll back if | ||
495 | * the hand-over fails */ | ||
496 | memcpy(&cpy, e, sizeof(ENGINE)); | ||
497 | /* Provide the ERR, "ex_data", memory, and locking callbacks so the | ||
498 | * loaded library uses our state rather than its own. FIXME: As noted in | ||
499 | * engine.h, much of this would be simplified if each area of code | ||
500 | * provided its own "summary" structure of all related callbacks. It | ||
501 | * would also increase opaqueness. */ | ||
502 | fns.static_state = ENGINE_get_static_state(); | ||
503 | fns.err_fns = ERR_get_implementation(); | ||
504 | fns.ex_data_fns = CRYPTO_get_ex_data_implementation(); | ||
505 | CRYPTO_get_mem_functions(&fns.mem_fns.malloc_cb, | ||
506 | &fns.mem_fns.realloc_cb, | ||
507 | &fns.mem_fns.free_cb); | ||
508 | fns.lock_fns.lock_locking_cb = CRYPTO_get_locking_callback(); | ||
509 | fns.lock_fns.lock_add_lock_cb = CRYPTO_get_add_lock_callback(); | ||
510 | fns.lock_fns.dynlock_create_cb = CRYPTO_get_dynlock_create_callback(); | ||
511 | fns.lock_fns.dynlock_lock_cb = CRYPTO_get_dynlock_lock_callback(); | ||
512 | fns.lock_fns.dynlock_destroy_cb = CRYPTO_get_dynlock_destroy_callback(); | ||
513 | /* Now that we've loaded the dynamic engine, make sure no "dynamic" | ||
514 | * ENGINE elements will show through. */ | ||
515 | engine_set_all_null(e); | ||
516 | |||
517 | /* Try to bind the ENGINE onto our own ENGINE structure */ | ||
518 | if (!ctx->bind_engine(e, ctx->engine_id, &fns)) { | ||
519 | ctx->bind_engine = NULL; | ||
520 | ctx->v_check = NULL; | ||
521 | DSO_free(ctx->dynamic_dso); | ||
522 | ctx->dynamic_dso = NULL; | ||
523 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, ENGINE_R_INIT_FAILED); | ||
524 | /* Copy the original ENGINE structure back */ | ||
525 | memcpy(e, &cpy, sizeof(ENGINE)); | ||
526 | return 0; | ||
527 | } | ||
528 | /* Do we try to add this ENGINE to the internal list too? */ | ||
529 | if (ctx->list_add_value > 0) { | ||
530 | if (!ENGINE_add(e)) { | ||
531 | /* Do we tolerate this or fail? */ | ||
532 | if (ctx->list_add_value > 1) { | ||
533 | /* Fail - NB: By this time, it's too late to | ||
534 | * rollback, and trying to do so allows the | ||
535 | * bind_engine() code to have created leaks. We | ||
536 | * just have to fail where we are, after the | ||
537 | * ENGINE has changed. */ | ||
538 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
539 | ENGINE_R_CONFLICTING_ENGINE_ID); | ||
540 | return 0; | ||
541 | } | ||
542 | /* Tolerate */ | ||
543 | ERR_clear_error(); | ||
544 | } | ||
545 | } | ||
546 | return 1; | ||
547 | } | 64 | } |
diff --git a/src/lib/libcrypto/engine/eng_list.c b/src/lib/libcrypto/engine/eng_list.c index 939cc82b17..7f3cb35515 100644 --- a/src/lib/libcrypto/engine/eng_list.c +++ b/src/lib/libcrypto/engine/eng_list.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_list.c,v 1.18 2015/04/11 16:03:21 deraadt Exp $ */ | 1 | /* $OpenBSD: eng_list.c,v 1.19 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | 2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -351,7 +351,6 @@ ENGINE * | |||
351 | ENGINE_by_id(const char *id) | 351 | ENGINE_by_id(const char *id) |
352 | { | 352 | { |
353 | ENGINE *iterator; | 353 | ENGINE *iterator; |
354 | char *load_dir = NULL; | ||
355 | 354 | ||
356 | if (id == NULL) { | 355 | if (id == NULL) { |
357 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, | 356 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, |
@@ -381,30 +380,9 @@ ENGINE_by_id(const char *id) | |||
381 | } | 380 | } |
382 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | 381 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); |
383 | 382 | ||
384 | /* EEK! Experimental code starts */ | 383 | if (iterator == NULL) |
385 | if (iterator) | 384 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, ENGINE_R_NO_SUCH_ENGINE); |
386 | return iterator; | 385 | return iterator; |
387 | /* Prevent infinite recusrion if we're looking for the dynamic engine. */ | ||
388 | if (strcmp(id, "dynamic")) { | ||
389 | load_dir = ENGINESDIR; | ||
390 | |||
391 | iterator = ENGINE_by_id("dynamic"); | ||
392 | if (!iterator || | ||
393 | !ENGINE_ctrl_cmd_string(iterator, "ID", id, 0) || | ||
394 | !ENGINE_ctrl_cmd_string(iterator, "DIR_LOAD", "2", 0) || | ||
395 | !ENGINE_ctrl_cmd_string(iterator, "DIR_ADD", load_dir, 0) || | ||
396 | !ENGINE_ctrl_cmd_string(iterator, "LIST_ADD", "1", 0) || | ||
397 | !ENGINE_ctrl_cmd_string(iterator, "LOAD", NULL, 0)) | ||
398 | goto notfound; | ||
399 | return iterator; | ||
400 | } | ||
401 | |||
402 | notfound: | ||
403 | ENGINE_free(iterator); | ||
404 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, ENGINE_R_NO_SUCH_ENGINE); | ||
405 | ERR_asprintf_error_data("id=%s", id); | ||
406 | return NULL; | ||
407 | /* EEK! Experimental code ends */ | ||
408 | } | 386 | } |
409 | 387 | ||
410 | int | 388 | int |
diff --git a/src/lib/libssl/src/crypto/engine/eng_all.c b/src/lib/libssl/src/crypto/engine/eng_all.c index 014bcb132e..b428300e76 100644 --- a/src/lib/libssl/src/crypto/engine/eng_all.c +++ b/src/lib/libssl/src/crypto/engine/eng_all.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_all.c,v 1.27 2015/02/07 13:19:15 doug Exp $ */ | 1 | /* $OpenBSD: eng_all.c,v 1.28 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL | 2 | /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -70,7 +70,6 @@ ENGINE_load_builtin_engines(void) | |||
70 | #ifndef OPENSSL_NO_RSAX | 70 | #ifndef OPENSSL_NO_RSAX |
71 | ENGINE_load_rsax(); | 71 | ENGINE_load_rsax(); |
72 | #endif | 72 | #endif |
73 | ENGINE_load_dynamic(); | ||
74 | #ifndef OPENSSL_NO_STATIC_ENGINE | 73 | #ifndef OPENSSL_NO_STATIC_ENGINE |
75 | #ifndef OPENSSL_NO_HW | 74 | #ifndef OPENSSL_NO_HW |
76 | #ifndef OPENSSL_NO_HW_PADLOCK | 75 | #ifndef OPENSSL_NO_HW_PADLOCK |
diff --git a/src/lib/libssl/src/crypto/engine/eng_dyn.c b/src/lib/libssl/src/crypto/engine/eng_dyn.c index c78d9f6856..400ce72681 100644 --- a/src/lib/libssl/src/crypto/engine/eng_dyn.c +++ b/src/lib/libssl/src/crypto/engine/eng_dyn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_dyn.c,v 1.13 2015/02/11 03:19:37 doug Exp $ */ | 1 | /* $OpenBSD: eng_dyn.c,v 1.14 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | 2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -56,492 +56,9 @@ | |||
56 | * | 56 | * |
57 | */ | 57 | */ |
58 | 58 | ||
59 | #include <string.h> | 59 | #include <openssl/engine.h> |
60 | |||
61 | #include <openssl/err.h> | ||
62 | |||
63 | #include "eng_int.h" | ||
64 | #include <openssl/dso.h> | ||
65 | |||
66 | /* Shared libraries implementing ENGINEs for use by the "dynamic" ENGINE loader | ||
67 | * should implement the hook-up functions with the following prototypes. */ | ||
68 | |||
69 | /* Our ENGINE handlers */ | ||
70 | static int dynamic_init(ENGINE *e); | ||
71 | static int dynamic_finish(ENGINE *e); | ||
72 | static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void)); | ||
73 | /* Predeclare our context type */ | ||
74 | typedef struct st_dynamic_data_ctx dynamic_data_ctx; | ||
75 | /* The implementation for the important control command */ | ||
76 | static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx); | ||
77 | |||
78 | #define DYNAMIC_CMD_SO_PATH ENGINE_CMD_BASE | ||
79 | #define DYNAMIC_CMD_NO_VCHECK (ENGINE_CMD_BASE + 1) | ||
80 | #define DYNAMIC_CMD_ID (ENGINE_CMD_BASE + 2) | ||
81 | #define DYNAMIC_CMD_LIST_ADD (ENGINE_CMD_BASE + 3) | ||
82 | #define DYNAMIC_CMD_DIR_LOAD (ENGINE_CMD_BASE + 4) | ||
83 | #define DYNAMIC_CMD_DIR_ADD (ENGINE_CMD_BASE + 5) | ||
84 | #define DYNAMIC_CMD_LOAD (ENGINE_CMD_BASE + 6) | ||
85 | |||
86 | /* The constants used when creating the ENGINE */ | ||
87 | static const char *engine_dynamic_id = "dynamic"; | ||
88 | static const char *engine_dynamic_name = "Dynamic engine loading support"; | ||
89 | static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = { | ||
90 | { | ||
91 | DYNAMIC_CMD_SO_PATH, | ||
92 | "SO_PATH", | ||
93 | "Specifies the path to the new ENGINE shared library", | ||
94 | ENGINE_CMD_FLAG_STRING}, | ||
95 | { | ||
96 | DYNAMIC_CMD_NO_VCHECK, | ||
97 | "NO_VCHECK", | ||
98 | "Specifies to continue even if version checking fails (boolean)", | ||
99 | ENGINE_CMD_FLAG_NUMERIC}, | ||
100 | { | ||
101 | DYNAMIC_CMD_ID, | ||
102 | "ID", | ||
103 | "Specifies an ENGINE id name for loading", | ||
104 | ENGINE_CMD_FLAG_STRING}, | ||
105 | { | ||
106 | DYNAMIC_CMD_LIST_ADD, | ||
107 | "LIST_ADD", | ||
108 | "Whether to add a loaded ENGINE to the internal list (0=no,1=yes,2=mandatory)", | ||
109 | ENGINE_CMD_FLAG_NUMERIC}, | ||
110 | { | ||
111 | DYNAMIC_CMD_DIR_LOAD, | ||
112 | "DIR_LOAD", | ||
113 | "Specifies whether to load from 'DIR_ADD' directories (0=no,1=yes,2=mandatory)", | ||
114 | ENGINE_CMD_FLAG_NUMERIC}, | ||
115 | { | ||
116 | DYNAMIC_CMD_DIR_ADD, | ||
117 | "DIR_ADD", | ||
118 | "Adds a directory from which ENGINEs can be loaded", | ||
119 | ENGINE_CMD_FLAG_STRING}, | ||
120 | { | ||
121 | DYNAMIC_CMD_LOAD, | ||
122 | "LOAD", | ||
123 | "Load up the ENGINE specified by other settings", | ||
124 | ENGINE_CMD_FLAG_NO_INPUT}, | ||
125 | |||
126 | {0, NULL, NULL, 0} | ||
127 | }; | ||
128 | |||
129 | /* Loading code stores state inside the ENGINE structure via the "ex_data" | ||
130 | * element. We load all our state into a single structure and use that as a | ||
131 | * single context in the "ex_data" stack. */ | ||
132 | struct st_dynamic_data_ctx { | ||
133 | /* The DSO object we load that supplies the ENGINE code */ | ||
134 | DSO *dynamic_dso; | ||
135 | /* The function pointer to the version checking shared library function */ | ||
136 | dynamic_v_check_fn v_check; | ||
137 | /* The function pointer to the engine-binding shared library function */ | ||
138 | dynamic_bind_engine bind_engine; | ||
139 | /* The default name/path for loading the shared library */ | ||
140 | const char *DYNAMIC_LIBNAME; | ||
141 | /* Whether to continue loading on a version check failure */ | ||
142 | int no_vcheck; | ||
143 | /* If non-NULL, stipulates the 'id' of the ENGINE to be loaded */ | ||
144 | const char *engine_id; | ||
145 | /* If non-zero, a successfully loaded ENGINE should be added to the internal | ||
146 | * ENGINE list. If 2, the add must succeed or the entire load should fail. */ | ||
147 | int list_add_value; | ||
148 | /* The symbol name for the version checking function */ | ||
149 | const char *DYNAMIC_F1; | ||
150 | /* The symbol name for the "initialise ENGINE structure" function */ | ||
151 | const char *DYNAMIC_F2; | ||
152 | /* Whether to never use 'dirs', use 'dirs' as a fallback, or only use | ||
153 | * 'dirs' for loading. Default is to use 'dirs' as a fallback. */ | ||
154 | int dir_load; | ||
155 | /* A stack of directories from which ENGINEs could be loaded */ | ||
156 | STACK_OF(OPENSSL_STRING) *dirs; | ||
157 | }; | ||
158 | |||
159 | /* This is the "ex_data" index we obtain and reserve for use with our context | ||
160 | * structure. */ | ||
161 | static int dynamic_ex_data_idx = -1; | ||
162 | |||
163 | static void | ||
164 | int_free_str(char *s) | ||
165 | { | ||
166 | free(s); | ||
167 | } | ||
168 | |||
169 | /* Because our ex_data element may or may not get allocated depending on whether | ||
170 | * a "first-use" occurs before the ENGINE is freed, we have a memory leak | ||
171 | * problem to solve. We can't declare a "new" handler for the ex_data as we | ||
172 | * don't want a dynamic_data_ctx in *all* ENGINE structures of all types (this | ||
173 | * is a bug in the design of CRYPTO_EX_DATA). As such, we just declare a "free" | ||
174 | * handler and that will get called if an ENGINE is being destroyed and there | ||
175 | * was an ex_data element corresponding to our context type. */ | ||
176 | static void | ||
177 | dynamic_data_ctx_free_func(void *parent, void *ptr, CRYPTO_EX_DATA *ad, | ||
178 | int idx, long argl, void *argp) | ||
179 | { | ||
180 | if (ptr) { | ||
181 | dynamic_data_ctx *ctx = (dynamic_data_ctx *)ptr; | ||
182 | if (ctx->dynamic_dso) | ||
183 | DSO_free(ctx->dynamic_dso); | ||
184 | free((void *)ctx->DYNAMIC_LIBNAME); | ||
185 | free((void *)ctx->engine_id); | ||
186 | if (ctx->dirs) | ||
187 | sk_OPENSSL_STRING_pop_free(ctx->dirs, int_free_str); | ||
188 | free(ctx); | ||
189 | } | ||
190 | } | ||
191 | |||
192 | /* Construct the per-ENGINE context. We create it blindly and then use a lock to | ||
193 | * check for a race - if so, all but one of the threads "racing" will have | ||
194 | * wasted their time. The alternative involves creating everything inside the | ||
195 | * lock which is far worse. */ | ||
196 | static int | ||
197 | dynamic_set_data_ctx(ENGINE *e, dynamic_data_ctx **ctx) | ||
198 | { | ||
199 | dynamic_data_ctx *c; | ||
200 | |||
201 | c = malloc(sizeof(dynamic_data_ctx)); | ||
202 | if (!c) { | ||
203 | ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE); | ||
204 | return 0; | ||
205 | } | ||
206 | memset(c, 0, sizeof(dynamic_data_ctx)); | ||
207 | c->dynamic_dso = NULL; | ||
208 | c->v_check = NULL; | ||
209 | c->bind_engine = NULL; | ||
210 | c->DYNAMIC_LIBNAME = NULL; | ||
211 | c->no_vcheck = 0; | ||
212 | c->engine_id = NULL; | ||
213 | c->list_add_value = 0; | ||
214 | c->DYNAMIC_F1 = "v_check"; | ||
215 | c->DYNAMIC_F2 = "bind_engine"; | ||
216 | c->dir_load = 1; | ||
217 | c->dirs = sk_OPENSSL_STRING_new_null(); | ||
218 | if (!c->dirs) { | ||
219 | ENGINEerr(ENGINE_F_DYNAMIC_SET_DATA_CTX, ERR_R_MALLOC_FAILURE); | ||
220 | free(c); | ||
221 | return 0; | ||
222 | } | ||
223 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | ||
224 | if ((*ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, | ||
225 | dynamic_ex_data_idx)) == NULL) { | ||
226 | /* Good, we're the first */ | ||
227 | ENGINE_set_ex_data(e, dynamic_ex_data_idx, c); | ||
228 | *ctx = c; | ||
229 | c = NULL; | ||
230 | } | ||
231 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | ||
232 | /* If we lost the race to set the context, c is non-NULL and *ctx is the | ||
233 | * context of the thread that won. */ | ||
234 | free(c); | ||
235 | return 1; | ||
236 | } | ||
237 | |||
238 | /* This function retrieves the context structure from an ENGINE's "ex_data", or | ||
239 | * if it doesn't exist yet, sets it up. */ | ||
240 | static dynamic_data_ctx * | ||
241 | dynamic_get_data_ctx(ENGINE *e) | ||
242 | { | ||
243 | dynamic_data_ctx *ctx; | ||
244 | if (dynamic_ex_data_idx < 0) { | ||
245 | /* Create and register the ENGINE ex_data, and associate our | ||
246 | * "free" function with it to ensure any allocated contexts get | ||
247 | * freed when an ENGINE goes underground. */ | ||
248 | int new_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL, | ||
249 | dynamic_data_ctx_free_func); | ||
250 | if (new_idx == -1) { | ||
251 | ENGINEerr(ENGINE_F_DYNAMIC_GET_DATA_CTX, | ||
252 | ENGINE_R_NO_INDEX); | ||
253 | return NULL; | ||
254 | } | ||
255 | CRYPTO_w_lock(CRYPTO_LOCK_ENGINE); | ||
256 | /* Avoid a race by checking again inside this lock */ | ||
257 | if (dynamic_ex_data_idx < 0) { | ||
258 | /* Good, someone didn't beat us to it */ | ||
259 | dynamic_ex_data_idx = new_idx; | ||
260 | new_idx = -1; | ||
261 | } | ||
262 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | ||
263 | /* In theory we could "give back" the index here if | ||
264 | * (new_idx>-1), but it's not possible and wouldn't gain us much | ||
265 | * if it were. */ | ||
266 | } | ||
267 | ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, dynamic_ex_data_idx); | ||
268 | /* Check if the context needs to be created */ | ||
269 | if ((ctx == NULL) && !dynamic_set_data_ctx(e, &ctx)) | ||
270 | /* "set_data" will set errors if necessary */ | ||
271 | return NULL; | ||
272 | return ctx; | ||
273 | } | ||
274 | |||
275 | static ENGINE * | ||
276 | engine_dynamic(void) | ||
277 | { | ||
278 | ENGINE *ret = ENGINE_new(); | ||
279 | |||
280 | if (!ret) | ||
281 | return NULL; | ||
282 | |||
283 | if (!ENGINE_set_id(ret, engine_dynamic_id) || | ||
284 | !ENGINE_set_name(ret, engine_dynamic_name) || | ||
285 | !ENGINE_set_init_function(ret, dynamic_init) || | ||
286 | !ENGINE_set_finish_function(ret, dynamic_finish) || | ||
287 | !ENGINE_set_ctrl_function(ret, dynamic_ctrl) || | ||
288 | !ENGINE_set_flags(ret, ENGINE_FLAGS_BY_ID_COPY) || | ||
289 | !ENGINE_set_cmd_defns(ret, dynamic_cmd_defns)) { | ||
290 | ENGINE_free(ret); | ||
291 | return NULL; | ||
292 | } | ||
293 | return ret; | ||
294 | } | ||
295 | 60 | ||
296 | void | 61 | void |
297 | ENGINE_load_dynamic(void) | 62 | ENGINE_load_dynamic(void) |
298 | { | 63 | { |
299 | ENGINE *toadd = engine_dynamic(); | ||
300 | |||
301 | if (!toadd) | ||
302 | return; | ||
303 | |||
304 | ENGINE_add(toadd); | ||
305 | /* If the "add" worked, it gets a structural reference. So either way, | ||
306 | * we release our just-created reference. */ | ||
307 | ENGINE_free(toadd); | ||
308 | /* If the "add" didn't work, it was probably a conflict because it was | ||
309 | * already added (eg. someone calling ENGINE_load_blah then calling | ||
310 | * ENGINE_load_builtin_engines() perhaps). */ | ||
311 | ERR_clear_error(); | ||
312 | } | ||
313 | |||
314 | static int | ||
315 | dynamic_init(ENGINE *e) | ||
316 | { | ||
317 | /* We always return failure - the "dyanamic" engine itself can't be used | ||
318 | * for anything. */ | ||
319 | return 0; | ||
320 | } | ||
321 | |||
322 | static int | ||
323 | dynamic_finish(ENGINE *e) | ||
324 | { | ||
325 | /* This should never be called on account of "dynamic_init" always | ||
326 | * failing. */ | ||
327 | return 0; | ||
328 | } | ||
329 | |||
330 | static int | ||
331 | dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void)) | ||
332 | { | ||
333 | dynamic_data_ctx *ctx = dynamic_get_data_ctx(e); | ||
334 | int initialised; | ||
335 | |||
336 | if (!ctx) { | ||
337 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_NOT_LOADED); | ||
338 | return 0; | ||
339 | } | ||
340 | initialised = ((ctx->dynamic_dso == NULL) ? 0 : 1); | ||
341 | /* All our control commands require the ENGINE to be uninitialised */ | ||
342 | if (initialised) { | ||
343 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_ALREADY_LOADED); | ||
344 | return 0; | ||
345 | } | ||
346 | switch (cmd) { | ||
347 | case DYNAMIC_CMD_SO_PATH: | ||
348 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
349 | if (p && (strlen((const char *)p) < 1)) | ||
350 | p = NULL; | ||
351 | free((void *)ctx->DYNAMIC_LIBNAME); | ||
352 | if (p) | ||
353 | ctx->DYNAMIC_LIBNAME = strdup(p); | ||
354 | else | ||
355 | ctx->DYNAMIC_LIBNAME = NULL; | ||
356 | return (ctx->DYNAMIC_LIBNAME ? 1 : 0); | ||
357 | case DYNAMIC_CMD_NO_VCHECK: | ||
358 | ctx->no_vcheck = ((i == 0) ? 0 : 1); | ||
359 | return 1; | ||
360 | case DYNAMIC_CMD_ID: | ||
361 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
362 | if (p && (strlen((const char *)p) < 1)) | ||
363 | p = NULL; | ||
364 | free((void *)ctx->engine_id); | ||
365 | if (p) | ||
366 | ctx->engine_id = strdup(p); | ||
367 | else | ||
368 | ctx->engine_id = NULL; | ||
369 | return (ctx->engine_id ? 1 : 0); | ||
370 | case DYNAMIC_CMD_LIST_ADD: | ||
371 | if ((i < 0) || (i > 2)) { | ||
372 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
373 | ENGINE_R_INVALID_ARGUMENT); | ||
374 | return 0; | ||
375 | } | ||
376 | ctx->list_add_value = (int)i; | ||
377 | return 1; | ||
378 | case DYNAMIC_CMD_LOAD: | ||
379 | return dynamic_load(e, ctx); | ||
380 | case DYNAMIC_CMD_DIR_LOAD: | ||
381 | if ((i < 0) || (i > 2)) { | ||
382 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
383 | ENGINE_R_INVALID_ARGUMENT); | ||
384 | return 0; | ||
385 | } | ||
386 | ctx->dir_load = (int)i; | ||
387 | return 1; | ||
388 | case DYNAMIC_CMD_DIR_ADD: | ||
389 | /* a NULL 'p' or a string of zero-length is the same thing */ | ||
390 | if (!p || (strlen((const char *)p) < 1)) { | ||
391 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
392 | ENGINE_R_INVALID_ARGUMENT); | ||
393 | return 0; | ||
394 | } | ||
395 | { | ||
396 | char *tmp_str = strdup(p); | ||
397 | if (!tmp_str) { | ||
398 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, | ||
399 | ERR_R_MALLOC_FAILURE); | ||
400 | return 0; | ||
401 | } | ||
402 | sk_OPENSSL_STRING_insert(ctx->dirs, tmp_str, -1); | ||
403 | } | ||
404 | return 1; | ||
405 | default: | ||
406 | break; | ||
407 | } | ||
408 | ENGINEerr(ENGINE_F_DYNAMIC_CTRL, ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED); | ||
409 | return 0; | ||
410 | } | ||
411 | |||
412 | static int | ||
413 | int_load(dynamic_data_ctx *ctx) | ||
414 | { | ||
415 | int num, loop; | ||
416 | |||
417 | /* Unless told not to, try a direct load */ | ||
418 | if ((ctx->dir_load != 2) && (DSO_load(ctx->dynamic_dso, | ||
419 | ctx->DYNAMIC_LIBNAME, NULL, 0)) != NULL) | ||
420 | return 1; | ||
421 | /* If we're not allowed to use 'dirs' or we have none, fail */ | ||
422 | if (!ctx->dir_load || (num = sk_OPENSSL_STRING_num(ctx->dirs)) < 1) | ||
423 | return 0; | ||
424 | for (loop = 0; loop < num; loop++) { | ||
425 | const char *s = sk_OPENSSL_STRING_value(ctx->dirs, loop); | ||
426 | char *merge = DSO_merge(ctx->dynamic_dso, | ||
427 | ctx->DYNAMIC_LIBNAME, s); | ||
428 | if (!merge) | ||
429 | return 0; | ||
430 | if (DSO_load(ctx->dynamic_dso, merge, NULL, 0)) { | ||
431 | /* Found what we're looking for */ | ||
432 | free(merge); | ||
433 | return 1; | ||
434 | } | ||
435 | free(merge); | ||
436 | } | ||
437 | return 0; | ||
438 | } | ||
439 | |||
440 | static int | ||
441 | dynamic_load(ENGINE *e, dynamic_data_ctx *ctx) | ||
442 | { | ||
443 | ENGINE cpy; | ||
444 | dynamic_fns fns; | ||
445 | |||
446 | if (!ctx->dynamic_dso) | ||
447 | ctx->dynamic_dso = DSO_new(); | ||
448 | if (!ctx->DYNAMIC_LIBNAME) { | ||
449 | if (!ctx->engine_id) | ||
450 | return 0; | ||
451 | ctx->DYNAMIC_LIBNAME = DSO_convert_filename(ctx->dynamic_dso, | ||
452 | ctx->engine_id); | ||
453 | } | ||
454 | if (!int_load(ctx)) { | ||
455 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
456 | ENGINE_R_DSO_NOT_FOUND); | ||
457 | DSO_free(ctx->dynamic_dso); | ||
458 | ctx->dynamic_dso = NULL; | ||
459 | return 0; | ||
460 | } | ||
461 | /* We have to find a bind function otherwise it'll always end badly */ | ||
462 | if (!(ctx->bind_engine = (dynamic_bind_engine)DSO_bind_func( | ||
463 | ctx->dynamic_dso, ctx->DYNAMIC_F2))) { | ||
464 | ctx->bind_engine = NULL; | ||
465 | DSO_free(ctx->dynamic_dso); | ||
466 | ctx->dynamic_dso = NULL; | ||
467 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
468 | ENGINE_R_DSO_FAILURE); | ||
469 | return 0; | ||
470 | } | ||
471 | /* Do we perform version checking? */ | ||
472 | if (!ctx->no_vcheck) { | ||
473 | unsigned long vcheck_res = 0; | ||
474 | /* Now we try to find a version checking function and decide how | ||
475 | * to cope with failure if/when it fails. */ | ||
476 | ctx->v_check = (dynamic_v_check_fn)DSO_bind_func( | ||
477 | ctx->dynamic_dso, ctx->DYNAMIC_F1); | ||
478 | if (ctx->v_check) | ||
479 | vcheck_res = ctx->v_check(OSSL_DYNAMIC_VERSION); | ||
480 | /* We fail if the version checker veto'd the load *or* if it is | ||
481 | * deferring to us (by returning its version) and we think it is | ||
482 | * too old. */ | ||
483 | if (vcheck_res < OSSL_DYNAMIC_OLDEST) { | ||
484 | /* Fail */ | ||
485 | ctx->bind_engine = NULL; | ||
486 | ctx->v_check = NULL; | ||
487 | DSO_free(ctx->dynamic_dso); | ||
488 | ctx->dynamic_dso = NULL; | ||
489 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
490 | ENGINE_R_VERSION_INCOMPATIBILITY); | ||
491 | return 0; | ||
492 | } | ||
493 | } | ||
494 | /* First binary copy the ENGINE structure so that we can roll back if | ||
495 | * the hand-over fails */ | ||
496 | memcpy(&cpy, e, sizeof(ENGINE)); | ||
497 | /* Provide the ERR, "ex_data", memory, and locking callbacks so the | ||
498 | * loaded library uses our state rather than its own. FIXME: As noted in | ||
499 | * engine.h, much of this would be simplified if each area of code | ||
500 | * provided its own "summary" structure of all related callbacks. It | ||
501 | * would also increase opaqueness. */ | ||
502 | fns.static_state = ENGINE_get_static_state(); | ||
503 | fns.err_fns = ERR_get_implementation(); | ||
504 | fns.ex_data_fns = CRYPTO_get_ex_data_implementation(); | ||
505 | CRYPTO_get_mem_functions(&fns.mem_fns.malloc_cb, | ||
506 | &fns.mem_fns.realloc_cb, | ||
507 | &fns.mem_fns.free_cb); | ||
508 | fns.lock_fns.lock_locking_cb = CRYPTO_get_locking_callback(); | ||
509 | fns.lock_fns.lock_add_lock_cb = CRYPTO_get_add_lock_callback(); | ||
510 | fns.lock_fns.dynlock_create_cb = CRYPTO_get_dynlock_create_callback(); | ||
511 | fns.lock_fns.dynlock_lock_cb = CRYPTO_get_dynlock_lock_callback(); | ||
512 | fns.lock_fns.dynlock_destroy_cb = CRYPTO_get_dynlock_destroy_callback(); | ||
513 | /* Now that we've loaded the dynamic engine, make sure no "dynamic" | ||
514 | * ENGINE elements will show through. */ | ||
515 | engine_set_all_null(e); | ||
516 | |||
517 | /* Try to bind the ENGINE onto our own ENGINE structure */ | ||
518 | if (!ctx->bind_engine(e, ctx->engine_id, &fns)) { | ||
519 | ctx->bind_engine = NULL; | ||
520 | ctx->v_check = NULL; | ||
521 | DSO_free(ctx->dynamic_dso); | ||
522 | ctx->dynamic_dso = NULL; | ||
523 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, ENGINE_R_INIT_FAILED); | ||
524 | /* Copy the original ENGINE structure back */ | ||
525 | memcpy(e, &cpy, sizeof(ENGINE)); | ||
526 | return 0; | ||
527 | } | ||
528 | /* Do we try to add this ENGINE to the internal list too? */ | ||
529 | if (ctx->list_add_value > 0) { | ||
530 | if (!ENGINE_add(e)) { | ||
531 | /* Do we tolerate this or fail? */ | ||
532 | if (ctx->list_add_value > 1) { | ||
533 | /* Fail - NB: By this time, it's too late to | ||
534 | * rollback, and trying to do so allows the | ||
535 | * bind_engine() code to have created leaks. We | ||
536 | * just have to fail where we are, after the | ||
537 | * ENGINE has changed. */ | ||
538 | ENGINEerr(ENGINE_F_DYNAMIC_LOAD, | ||
539 | ENGINE_R_CONFLICTING_ENGINE_ID); | ||
540 | return 0; | ||
541 | } | ||
542 | /* Tolerate */ | ||
543 | ERR_clear_error(); | ||
544 | } | ||
545 | } | ||
546 | return 1; | ||
547 | } | 64 | } |
diff --git a/src/lib/libssl/src/crypto/engine/eng_list.c b/src/lib/libssl/src/crypto/engine/eng_list.c index 939cc82b17..7f3cb35515 100644 --- a/src/lib/libssl/src/crypto/engine/eng_list.c +++ b/src/lib/libssl/src/crypto/engine/eng_list.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: eng_list.c,v 1.18 2015/04/11 16:03:21 deraadt Exp $ */ | 1 | /* $OpenBSD: eng_list.c,v 1.19 2015/06/19 06:05:11 bcook Exp $ */ |
2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL | 2 | /* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -351,7 +351,6 @@ ENGINE * | |||
351 | ENGINE_by_id(const char *id) | 351 | ENGINE_by_id(const char *id) |
352 | { | 352 | { |
353 | ENGINE *iterator; | 353 | ENGINE *iterator; |
354 | char *load_dir = NULL; | ||
355 | 354 | ||
356 | if (id == NULL) { | 355 | if (id == NULL) { |
357 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, | 356 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, |
@@ -381,30 +380,9 @@ ENGINE_by_id(const char *id) | |||
381 | } | 380 | } |
382 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); | 381 | CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE); |
383 | 382 | ||
384 | /* EEK! Experimental code starts */ | 383 | if (iterator == NULL) |
385 | if (iterator) | 384 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, ENGINE_R_NO_SUCH_ENGINE); |
386 | return iterator; | 385 | return iterator; |
387 | /* Prevent infinite recusrion if we're looking for the dynamic engine. */ | ||
388 | if (strcmp(id, "dynamic")) { | ||
389 | load_dir = ENGINESDIR; | ||
390 | |||
391 | iterator = ENGINE_by_id("dynamic"); | ||
392 | if (!iterator || | ||
393 | !ENGINE_ctrl_cmd_string(iterator, "ID", id, 0) || | ||
394 | !ENGINE_ctrl_cmd_string(iterator, "DIR_LOAD", "2", 0) || | ||
395 | !ENGINE_ctrl_cmd_string(iterator, "DIR_ADD", load_dir, 0) || | ||
396 | !ENGINE_ctrl_cmd_string(iterator, "LIST_ADD", "1", 0) || | ||
397 | !ENGINE_ctrl_cmd_string(iterator, "LOAD", NULL, 0)) | ||
398 | goto notfound; | ||
399 | return iterator; | ||
400 | } | ||
401 | |||
402 | notfound: | ||
403 | ENGINE_free(iterator); | ||
404 | ENGINEerr(ENGINE_F_ENGINE_BY_ID, ENGINE_R_NO_SUCH_ENGINE); | ||
405 | ERR_asprintf_error_data("id=%s", id); | ||
406 | return NULL; | ||
407 | /* EEK! Experimental code ends */ | ||
408 | } | 386 | } |
409 | 387 | ||
410 | int | 388 | int |
diff --git a/src/lib/libssl/src/doc/crypto/engine.pod b/src/lib/libssl/src/doc/crypto/engine.pod index 4a6ee59138..578a702371 100644 --- a/src/lib/libssl/src/doc/crypto/engine.pod +++ b/src/lib/libssl/src/doc/crypto/engine.pod | |||
@@ -309,11 +309,11 @@ consideration is whether any/all available ENGINE implementations should be | |||
309 | made visible to OpenSSL - this is controlled by calling the various "load" | 309 | made visible to OpenSSL - this is controlled by calling the various "load" |
310 | functions, eg. | 310 | functions, eg. |
311 | 311 | ||
312 | /* Make the "dynamic" ENGINE available */ | ||
313 | void ENGINE_load_dynamic(void); | ||
314 | ... | ||
315 | /* Make ALL ENGINE implementations bundled with OpenSSL available */ | 312 | /* Make ALL ENGINE implementations bundled with OpenSSL available */ |
316 | void ENGINE_load_builtin_engines(void); | 313 | ENGINE_load_builtin_engines(); |
314 | |||
315 | Note that ENGINE_load_dynamic(void) is a placeholder and does not enable | ||
316 | dynamic engine loading support. | ||
317 | 317 | ||
318 | Having called any of these functions, ENGINE objects would have been | 318 | Having called any of these functions, ENGINE objects would have been |
319 | dynamically allocated and populated with these implementations and linked | 319 | dynamically allocated and populated with these implementations and linked |