mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			350 lines
		
	
	
	
		
			9.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			350 lines
		
	
	
	
		
			9.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
 *
 | 
						|
 * Licensed under the OpenSSL license (the "License").  You may not use
 | 
						|
 * this file except in compliance with the License.  You can obtain a copy
 | 
						|
 * in the file LICENSE in the source distribution or at
 | 
						|
 * https://www.openssl.org/source/license.html
 | 
						|
 */
 | 
						|
 | 
						|
#include "dso_local.h"
 | 
						|
#include "internal/refcount.h"
 | 
						|
 | 
						|
static DSO_METHOD *default_DSO_meth = NULL;
 | 
						|
 | 
						|
static DSO *DSO_new_method(DSO_METHOD *meth)
 | 
						|
{
 | 
						|
    DSO *ret;
 | 
						|
 | 
						|
    if (default_DSO_meth == NULL) {
 | 
						|
        /*
 | 
						|
         * We default to DSO_METH_openssl() which in turn defaults to
 | 
						|
         * stealing the "best available" method. Will fallback to
 | 
						|
         * DSO_METH_null() in the worst case.
 | 
						|
         */
 | 
						|
        default_DSO_meth = DSO_METHOD_openssl();
 | 
						|
    }
 | 
						|
    ret = OPENSSL_zalloc(sizeof(*ret));
 | 
						|
    if (ret == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    ret->meth_data = sk_void_new_null();
 | 
						|
    if (ret->meth_data == NULL) {
 | 
						|
        /* sk_new doesn't generate any errors so we do */
 | 
						|
        DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | 
						|
        OPENSSL_free(ret);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    ret->meth = default_DSO_meth;
 | 
						|
    ret->references = 1;
 | 
						|
    ret->lock = CRYPTO_THREAD_lock_new();
 | 
						|
    if (ret->lock == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_NEW_METHOD, ERR_R_MALLOC_FAILURE);
 | 
						|
        sk_void_free(ret->meth_data);
 | 
						|
        OPENSSL_free(ret);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
 | 
						|
    if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
 | 
						|
        DSO_free(ret);
 | 
						|
        ret = NULL;
 | 
						|
    }
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
DSO *DSO_new(void)
 | 
						|
{
 | 
						|
    return DSO_new_method(NULL);
 | 
						|
}
 | 
						|
 | 
						|
int DSO_free(DSO *dso)
 | 
						|
{
 | 
						|
    int i;
 | 
						|
 | 
						|
    if (dso == NULL)
 | 
						|
        return 1;
 | 
						|
 | 
						|
    if (CRYPTO_DOWN_REF(&dso->references, &i, dso->lock) <= 0)
 | 
						|
        return 0;
 | 
						|
 | 
						|
    REF_PRINT_COUNT("DSO", dso);
 | 
						|
    if (i > 0)
 | 
						|
        return 1;
 | 
						|
    REF_ASSERT_ISNT(i < 0);
 | 
						|
 | 
						|
    if ((dso->flags & DSO_FLAG_NO_UNLOAD_ON_FREE) == 0) {
 | 
						|
        if ((dso->meth->dso_unload != NULL) && !dso->meth->dso_unload(dso)) {
 | 
						|
            DSOerr(DSO_F_DSO_FREE, DSO_R_UNLOAD_FAILED);
 | 
						|
            return 0;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    if ((dso->meth->finish != NULL) && !dso->meth->finish(dso)) {
 | 
						|
        DSOerr(DSO_F_DSO_FREE, DSO_R_FINISH_FAILED);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    sk_void_free(dso->meth_data);
 | 
						|
    OPENSSL_free(dso->filename);
 | 
						|
    OPENSSL_free(dso->loaded_filename);
 | 
						|
    CRYPTO_THREAD_lock_free(dso->lock);
 | 
						|
    OPENSSL_free(dso);
 | 
						|
    return 1;
 | 
						|
}
 | 
						|
 | 
						|
int DSO_flags(DSO *dso)
 | 
						|
{
 | 
						|
    return ((dso == NULL) ? 0 : dso->flags);
 | 
						|
}
 | 
						|
 | 
						|
int DSO_up_ref(DSO *dso)
 | 
						|
{
 | 
						|
    int i;
 | 
						|
 | 
						|
    if (dso == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_UP_REF, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    if (CRYPTO_UP_REF(&dso->references, &i, dso->lock) <= 0)
 | 
						|
        return 0;
 | 
						|
 | 
						|
    REF_PRINT_COUNT("DSO", r);
 | 
						|
    REF_ASSERT_ISNT(i < 2);
 | 
						|
    return ((i > 1) ? 1 : 0);
 | 
						|
}
 | 
						|
 | 
						|
DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags)
 | 
						|
{
 | 
						|
    DSO *ret;
 | 
						|
    int allocated = 0;
 | 
						|
 | 
						|
    if (dso == NULL) {
 | 
						|
        ret = DSO_new_method(meth);
 | 
						|
        if (ret == NULL) {
 | 
						|
            DSOerr(DSO_F_DSO_LOAD, ERR_R_MALLOC_FAILURE);
 | 
						|
            goto err;
 | 
						|
        }
 | 
						|
        allocated = 1;
 | 
						|
        /* Pass the provided flags to the new DSO object */
 | 
						|
        if (DSO_ctrl(ret, DSO_CTRL_SET_FLAGS, flags, NULL) < 0) {
 | 
						|
            DSOerr(DSO_F_DSO_LOAD, DSO_R_CTRL_FAILED);
 | 
						|
            goto err;
 | 
						|
        }
 | 
						|
    } else
 | 
						|
        ret = dso;
 | 
						|
    /* Don't load if we're currently already loaded */
 | 
						|
    if (ret->filename != NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_LOAD, DSO_R_DSO_ALREADY_LOADED);
 | 
						|
        goto err;
 | 
						|
    }
 | 
						|
    /*
 | 
						|
     * filename can only be NULL if we were passed a dso that already has one
 | 
						|
     * set.
 | 
						|
     */
 | 
						|
    if (filename != NULL)
 | 
						|
        if (!DSO_set_filename(ret, filename)) {
 | 
						|
            DSOerr(DSO_F_DSO_LOAD, DSO_R_SET_FILENAME_FAILED);
 | 
						|
            goto err;
 | 
						|
        }
 | 
						|
    filename = ret->filename;
 | 
						|
    if (filename == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_LOAD, DSO_R_NO_FILENAME);
 | 
						|
        goto err;
 | 
						|
    }
 | 
						|
    if (ret->meth->dso_load == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_LOAD, DSO_R_UNSUPPORTED);
 | 
						|
        goto err;
 | 
						|
    }
 | 
						|
    if (!ret->meth->dso_load(ret)) {
 | 
						|
        DSOerr(DSO_F_DSO_LOAD, DSO_R_LOAD_FAILED);
 | 
						|
        goto err;
 | 
						|
    }
 | 
						|
    /* Load succeeded */
 | 
						|
    return ret;
 | 
						|
 err:
 | 
						|
    if (allocated)
 | 
						|
        DSO_free(ret);
 | 
						|
    return NULL;
 | 
						|
}
 | 
						|
 | 
						|
DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname)
 | 
						|
{
 | 
						|
    DSO_FUNC_TYPE ret = NULL;
 | 
						|
 | 
						|
    if ((dso == NULL) || (symname == NULL)) {
 | 
						|
        DSOerr(DSO_F_DSO_BIND_FUNC, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    if (dso->meth->dso_bind_func == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_UNSUPPORTED);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    if ((ret = dso->meth->dso_bind_func(dso, symname)) == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_BIND_FUNC, DSO_R_SYM_FAILURE);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    /* Success */
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * I don't really like these *_ctrl functions very much to be perfectly
 | 
						|
 * honest. For one thing, I think I have to return a negative value for any
 | 
						|
 * error because possible DSO_ctrl() commands may return values such as
 | 
						|
 * "size"s that can legitimately be zero (making the standard
 | 
						|
 * "if (DSO_cmd(...))" form that works almost everywhere else fail at odd
 | 
						|
 * times. I'd prefer "output" values to be passed by reference and the return
 | 
						|
 * value as success/failure like usual ... but we conform when we must... :-)
 | 
						|
 */
 | 
						|
long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg)
 | 
						|
{
 | 
						|
    if (dso == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_CTRL, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    /*
 | 
						|
     * We should intercept certain generic commands and only pass control to
 | 
						|
     * the method-specific ctrl() function if it's something we don't handle.
 | 
						|
     */
 | 
						|
    switch (cmd) {
 | 
						|
    case DSO_CTRL_GET_FLAGS:
 | 
						|
        return dso->flags;
 | 
						|
    case DSO_CTRL_SET_FLAGS:
 | 
						|
        dso->flags = (int)larg;
 | 
						|
        return 0;
 | 
						|
    case DSO_CTRL_OR_FLAGS:
 | 
						|
        dso->flags |= (int)larg;
 | 
						|
        return 0;
 | 
						|
    default:
 | 
						|
        break;
 | 
						|
    }
 | 
						|
    if ((dso->meth == NULL) || (dso->meth->dso_ctrl == NULL)) {
 | 
						|
        DSOerr(DSO_F_DSO_CTRL, DSO_R_UNSUPPORTED);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    return dso->meth->dso_ctrl(dso, cmd, larg, parg);
 | 
						|
}
 | 
						|
 | 
						|
const char *DSO_get_filename(DSO *dso)
 | 
						|
{
 | 
						|
    if (dso == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_GET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    return dso->filename;
 | 
						|
}
 | 
						|
 | 
						|
int DSO_set_filename(DSO *dso, const char *filename)
 | 
						|
{
 | 
						|
    char *copied;
 | 
						|
 | 
						|
    if ((dso == NULL) || (filename == NULL)) {
 | 
						|
        DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
    if (dso->loaded_filename) {
 | 
						|
        DSOerr(DSO_F_DSO_SET_FILENAME, DSO_R_DSO_ALREADY_LOADED);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
    /* We'll duplicate filename */
 | 
						|
    copied = OPENSSL_strdup(filename);
 | 
						|
    if (copied == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_SET_FILENAME, ERR_R_MALLOC_FAILURE);
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
    OPENSSL_free(dso->filename);
 | 
						|
    dso->filename = copied;
 | 
						|
    return 1;
 | 
						|
}
 | 
						|
 | 
						|
char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2)
 | 
						|
{
 | 
						|
    char *result = NULL;
 | 
						|
 | 
						|
    if (dso == NULL || filespec1 == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_MERGE, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
 | 
						|
        if (dso->merger != NULL)
 | 
						|
            result = dso->merger(dso, filespec1, filespec2);
 | 
						|
        else if (dso->meth->dso_merger != NULL)
 | 
						|
            result = dso->meth->dso_merger(dso, filespec1, filespec2);
 | 
						|
    }
 | 
						|
    return result;
 | 
						|
}
 | 
						|
 | 
						|
char *DSO_convert_filename(DSO *dso, const char *filename)
 | 
						|
{
 | 
						|
    char *result = NULL;
 | 
						|
 | 
						|
    if (dso == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_PASSED_NULL_PARAMETER);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    if (filename == NULL)
 | 
						|
        filename = dso->filename;
 | 
						|
    if (filename == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_CONVERT_FILENAME, DSO_R_NO_FILENAME);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    if ((dso->flags & DSO_FLAG_NO_NAME_TRANSLATION) == 0) {
 | 
						|
        if (dso->name_converter != NULL)
 | 
						|
            result = dso->name_converter(dso, filename);
 | 
						|
        else if (dso->meth->dso_name_converter != NULL)
 | 
						|
            result = dso->meth->dso_name_converter(dso, filename);
 | 
						|
    }
 | 
						|
    if (result == NULL) {
 | 
						|
        result = OPENSSL_strdup(filename);
 | 
						|
        if (result == NULL) {
 | 
						|
            DSOerr(DSO_F_DSO_CONVERT_FILENAME, ERR_R_MALLOC_FAILURE);
 | 
						|
            return NULL;
 | 
						|
        }
 | 
						|
    }
 | 
						|
    return result;
 | 
						|
}
 | 
						|
 | 
						|
int DSO_pathbyaddr(void *addr, char *path, int sz)
 | 
						|
{
 | 
						|
    DSO_METHOD *meth = default_DSO_meth;
 | 
						|
    if (meth == NULL)
 | 
						|
        meth = DSO_METHOD_openssl();
 | 
						|
    if (meth->pathbyaddr == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_PATHBYADDR, DSO_R_UNSUPPORTED);
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    return (*meth->pathbyaddr) (addr, path, sz);
 | 
						|
}
 | 
						|
 | 
						|
DSO *DSO_dsobyaddr(void *addr, int flags)
 | 
						|
{
 | 
						|
    DSO *ret = NULL;
 | 
						|
    char *filename = NULL;
 | 
						|
    int len = DSO_pathbyaddr(addr, NULL, 0);
 | 
						|
 | 
						|
    if (len < 0)
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    filename = OPENSSL_malloc(len);
 | 
						|
    if (filename != NULL
 | 
						|
            && DSO_pathbyaddr(addr, filename, len) == len)
 | 
						|
        ret = DSO_load(NULL, filename, NULL, flags);
 | 
						|
 | 
						|
    OPENSSL_free(filename);
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
void *DSO_global_lookup(const char *name)
 | 
						|
{
 | 
						|
    DSO_METHOD *meth = default_DSO_meth;
 | 
						|
    if (meth == NULL)
 | 
						|
        meth = DSO_METHOD_openssl();
 | 
						|
    if (meth->globallookup == NULL) {
 | 
						|
        DSOerr(DSO_F_DSO_GLOBAL_LOOKUP, DSO_R_UNSUPPORTED);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
    return (*meth->globallookup) (name);
 | 
						|
}
 |