mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			350 lines
		
	
	
	
		
			9.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			350 lines
		
	
	
	
		
			9.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include "dso_local.h"
 | |
| #include "internal/refcount.h"
 | |
| 
 | |
| static DSO_METHOD *default_DSO_meth = NULL;
 | |
| 
 | |
| static DSO *DSO_new_method(DSO_METHOD *meth)
 | |
| {
 | |
|     DSO *ret;
 | |
| 
 | |
|     if (default_DSO_meth == NULL) {
 | |
|         /*
 | |
|          * We default to DSO_METH_openssl() which in turn defaults to
 | |
|          * stealing the "best available" method. Will fallback to
 | |
|          * DSO_METH_null() in the worst case.
 | |
|          */
 | |
|         default_DSO_meth = DSO_METHOD_openssl();
 | |
|     }
 | |
|     ret = OPENSSL_zalloc(sizeof(*ret));
 | |
|     if (ret == NULL) {
 | |
|         DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | |
|         return NULL;
 | |
|     }
 | |
|     ret->meth_data = sk_void_new_null();
 | |
|     if (ret->meth_data == NULL) {
 | |
|         /* sk_new doesn't generate any errors so we do */
 | |
|         DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | |
|         OPENSSL_free(ret);
 | |
|         return NULL;
 | |
|     }
 | |
|     ret->meth = default_DSO_meth;
 | |
|     ret->references = 1;
 | |
|     ret->lock = CRYPTO_THREAD_lock_new();
 | |
|     if (ret->lock == NULL) {
 | |
|         DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | |
|         sk_void_free(ret->meth_data);
 | |
|         OPENSSL_free(ret);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
 | |
|         DSO_free(ret);
 | |
|         ret = NULL;
 | |
|     }
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| DSO *DSO_new(void)
 | |
| {
 | |
|     return DSO_new_method(NULL);
 | |
| }
 | |
| 
 | |
| int DSO_free(DSO *dso)
 | |
| {
 | |
|     int i;
 | |
| 
 | |
|     if (dso == NULL)
 | |
|         return 1;
 | |
| 
 | |
|     if (CRYPTO_DOWN_REF(&dso->references, &i, dso->lock) <= 0)
 | |
|         return 0;
 | |
| 
 | |
|     REF_PRINT_COUNT("DSO", dso);
 | |
|     if (i > 0)
 | |
|         return 1;
 | |
|     REF_ASSERT_ISNT(i < 0);
 | |
| 
 | |
|     if ((dso->flags & DSO_FLAG_NO_UNLOAD_ON_FREE) == 0) {
 | |
|         if ((dso->meth->dso_unload != NULL) && !dso->meth->dso_unload(dso)) {
 | |
|             DSOerr(DSO_F_DSO_FREE, DSO_R_UNLOAD_FAILED);
 | |
|             return 0;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if ((dso->meth->finish != NULL) && !dso->meth->finish(dso)) {
 | |
|         DSOerr(DSO_F_DSO_FREE, DSO_R_FINISH_FAILED);
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     sk_void_free(dso->meth_data);
 | |
|     OPENSSL_free(dso->filename);
 | |
|     OPENSSL_free(dso->loaded_filename);
 | |
|     CRYPTO_THREAD_lock_free(dso->lock);
 | |
|     OPENSSL_free(dso);
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| int DSO_flags(DSO *dso)
 | |
| {
 | |
|     return ((dso == NULL) ? 0 : dso->flags);
 | |
| }
 | |
| 
 | |
| int DSO_up_ref(DSO *dso)
 | |
| {
 | |
|     int i;
 | |
| 
 | |
|     if (dso == NULL) {
 | |
|         DSOerr(DSO_F_DSO_UP_REF, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     if (CRYPTO_UP_REF(&dso->references, &i, dso->lock) <= 0)
 | |
|         return 0;
 | |
| 
 | |
|     REF_PRINT_COUNT("DSO", r);
 | |
|     REF_ASSERT_ISNT(i < 2);
 | |
|     return ((i > 1) ? 1 : 0);
 | |
| }
 | |
| 
 | |
| DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags)
 | |
| {
 | |
|     DSO *ret;
 | |
|     int allocated = 0;
 | |
| 
 | |
|     if (dso == NULL) {
 | |
|         ret = DSO_new_method(meth);
 | |
|         if (ret == NULL) {
 | |
|             DSOerr(DSO_F_DSO_LOAD, ERR_R_MALLOC_FAILURE);
 | |
|             goto err;
 | |
|         }
 | |
|         allocated = 1;
 | |
|         /* Pass the provided flags to the new DSO object */
 | |
|         if (DSO_ctrl(ret, DSO_CTRL_SET_FLAGS, flags, NULL) < 0) {
 | |
|             DSOerr(DSO_F_DSO_LOAD, DSO_R_CTRL_FAILED);
 | |
|             goto err;
 | |
|         }
 | |
|     } else
 | |
|         ret = dso;
 | |
|     /* Don't load if we're currently already loaded */
 | |
|     if (ret->filename != NULL) {
 | |
|         DSOerr(DSO_F_DSO_LOAD, DSO_R_DSO_ALREADY_LOADED);
 | |
|         goto err;
 | |
|     }
 | |
|     /*
 | |
|      * filename can only be NULL if we were passed a dso that already has one
 | |
|      * set.
 | |
|      */
 | |
|     if (filename != NULL)
 | |
|         if (!DSO_set_filename(ret, filename)) {
 | |
|             DSOerr(DSO_F_DSO_LOAD, DSO_R_SET_FILENAME_FAILED);
 | |
|             goto err;
 | |
|         }
 | |
|     filename = ret->filename;
 | |
|     if (filename == NULL) {
 | |
|         DSOerr(DSO_F_DSO_LOAD, DSO_R_NO_FILENAME);
 | |
|         goto err;
 | |
|     }
 | |
|     if (ret->meth->dso_load == NULL) {
 | |
|         DSOerr(DSO_F_DSO_LOAD, DSO_R_UNSUPPORTED);
 | |
|         goto err;
 | |
|     }
 | |
|     if (!ret->meth->dso_load(ret)) {
 | |
|         DSOerr(DSO_F_DSO_LOAD, DSO_R_LOAD_FAILED);
 | |
|         goto err;
 | |
|     }
 | |
|     /* Load succeeded */
 | |
|     return ret;
 | |
|  err:
 | |
|     if (allocated)
 | |
|         DSO_free(ret);
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname)
 | |
| {
 | |
|     DSO_FUNC_TYPE ret = NULL;
 | |
| 
 | |
|     if ((dso == NULL) || (symname == NULL)) {
 | |
|         DSOerr(DSO_F_DSO_BIND_FUNC, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return NULL;
 | |
|     }
 | |
|     if (dso->meth->dso_bind_func == NULL) {
 | |
|         DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_UNSUPPORTED);
 | |
|         return NULL;
 | |
|     }
 | |
|     if ((ret = dso->meth->dso_bind_func(dso, symname)) == NULL) {
 | |
|         DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_SYM_FAILURE);
 | |
|         return NULL;
 | |
|     }
 | |
|     /* Success */
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * I don't really like these *_ctrl functions very much to be perfectly
 | |
|  * honest. For one thing, I think I have to return a negative value for any
 | |
|  * error because possible DSO_ctrl() commands may return values such as
 | |
|  * "size"s that can legitimately be zero (making the standard
 | |
|  * "if (DSO_cmd(...))" form that works almost everywhere else fail at odd
 | |
|  * times. I'd prefer "output" values to be passed by reference and the return
 | |
|  * value as success/failure like usual ... but we conform when we must... :-)
 | |
|  */
 | |
| long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg)
 | |
| {
 | |
|     if (dso == NULL) {
 | |
|         DSOerr(DSO_F_DSO_CTRL, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return -1;
 | |
|     }
 | |
|     /*
 | |
|      * We should intercept certain generic commands and only pass control to
 | |
|      * the method-specific ctrl() function if it's something we don't handle.
 | |
|      */
 | |
|     switch (cmd) {
 | |
|     case DSO_CTRL_GET_FLAGS:
 | |
|         return dso->flags;
 | |
|     case DSO_CTRL_SET_FLAGS:
 | |
|         dso->flags = (int)larg;
 | |
|         return 0;
 | |
|     case DSO_CTRL_OR_FLAGS:
 | |
|         dso->flags |= (int)larg;
 | |
|         return 0;
 | |
|     default:
 | |
|         break;
 | |
|     }
 | |
|     if ((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) {
 | |
|         DSOerr(DSO_F_DSO_CTRL, DSO_R_UNSUPPORTED);
 | |
|         return -1;
 | |
|     }
 | |
|     return dso->meth->dso_ctrl(dso, cmd, larg, parg);
 | |
| }
 | |
| 
 | |
| const char *DSO_get_filename(DSO *dso)
 | |
| {
 | |
|     if (dso == NULL) {
 | |
|         DSOerr(DSO_F_DSO_GET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return NULL;
 | |
|     }
 | |
|     return dso->filename;
 | |
| }
 | |
| 
 | |
| int DSO_set_filename(DSO *dso, const char *filename)
 | |
| {
 | |
|     char *copied;
 | |
| 
 | |
|     if ((dso == NULL) || (filename == NULL)) {
 | |
|         DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return 0;
 | |
|     }
 | |
|     if (dso->loaded_filename) {
 | |
|         DSOerr(DSO_F_DSO_SET_FILENAME, DSO_R_DSO_ALREADY_LOADED);
 | |
|         return 0;
 | |
|     }
 | |
|     /* We'll duplicate filename */
 | |
|     copied = OPENSSL_strdup(filename);
 | |
|     if (copied == NULL) {
 | |
|         DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_MALLOC_FAILURE);
 | |
|         return 0;
 | |
|     }
 | |
|     OPENSSL_free(dso->filename);
 | |
|     dso->filename = copied;
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2)
 | |
| {
 | |
|     char *result = NULL;
 | |
| 
 | |
|     if (dso == NULL || filespec1 == NULL) {
 | |
|         DSOerr(DSO_F_DSO_MERGE, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return NULL;
 | |
|     }
 | |
|     if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
 | |
|         if (dso->merger != NULL)
 | |
|             result = dso->merger(dso, filespec1, filespec2);
 | |
|         else if (dso->meth->dso_merger != NULL)
 | |
|             result = dso->meth->dso_merger(dso, filespec1, filespec2);
 | |
|     }
 | |
|     return result;
 | |
| }
 | |
| 
 | |
| char *DSO_convert_filename(DSO *dso, const char *filename)
 | |
| {
 | |
|     char *result = NULL;
 | |
| 
 | |
|     if (dso == NULL) {
 | |
|         DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         return NULL;
 | |
|     }
 | |
|     if (filename == NULL)
 | |
|         filename = dso->filename;
 | |
|     if (filename == NULL) {
 | |
|         DSOerr(DSO_F_DSO_CONVERT_FILENAME, DSO_R_NO_FILENAME);
 | |
|         return NULL;
 | |
|     }
 | |
|     if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
 | |
|         if (dso->name_converter != NULL)
 | |
|             result = dso->name_converter(dso, filename);
 | |
|         else if (dso->meth->dso_name_converter != NULL)
 | |
|             result = dso->meth->dso_name_converter(dso, filename);
 | |
|     }
 | |
|     if (result == NULL) {
 | |
|         result = OPENSSL_strdup(filename);
 | |
|         if (result == NULL) {
 | |
|             DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_MALLOC_FAILURE);
 | |
|             return NULL;
 | |
|         }
 | |
|     }
 | |
|     return result;
 | |
| }
 | |
| 
 | |
| int DSO_pathbyaddr(void *addr, char *path, int sz)
 | |
| {
 | |
|     DSO_METHOD *meth = default_DSO_meth;
 | |
|     if (meth == NULL)
 | |
|         meth = DSO_METHOD_openssl();
 | |
|     if (meth->pathbyaddr == NULL) {
 | |
|         DSOerr(DSO_F_DSO_PATHBYADDR, DSO_R_UNSUPPORTED);
 | |
|         return -1;
 | |
|     }
 | |
|     return (*meth->pathbyaddr) (addr, path, sz);
 | |
| }
 | |
| 
 | |
| DSO *DSO_dsobyaddr(void *addr, int flags)
 | |
| {
 | |
|     DSO *ret = NULL;
 | |
|     char *filename = NULL;
 | |
|     int len = DSO_pathbyaddr(addr, NULL, 0);
 | |
| 
 | |
|     if (len < 0)
 | |
|         return NULL;
 | |
| 
 | |
|     filename = OPENSSL_malloc(len);
 | |
|     if (filename != NULL
 | |
|             && DSO_pathbyaddr(addr, filename, len) == len)
 | |
|         ret = DSO_load(NULL, filename, NULL, flags);
 | |
| 
 | |
|     OPENSSL_free(filename);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| void *DSO_global_lookup(const char *name)
 | |
| {
 | |
|     DSO_METHOD *meth = default_DSO_meth;
 | |
|     if (meth == NULL)
 | |
|         meth = DSO_METHOD_openssl();
 | |
|     if (meth->globallookup == NULL) {
 | |
|         DSOerr(DSO_F_DSO_GLOBAL_LOOKUP, DSO_R_UNSUPPORTED);
 | |
|         return NULL;
 | |
|     }
 | |
|     return (*meth->globallookup) (name);
 | |
| }
 |