2001-09-14 18:31:57 +00:00
|
|
|
/* crypto/engine/eng_list.c */
|
2000-10-26 21:07:28 +00:00
|
|
|
/* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL
|
|
|
|
* project 2000.
|
|
|
|
*/
|
|
|
|
/* ====================================================================
|
2001-09-14 18:31:57 +00:00
|
|
|
* Copyright (c) 1999-2001 The OpenSSL Project. All rights reserved.
|
2000-10-26 21:07:28 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* 3. All advertising materials mentioning features or use of this
|
|
|
|
* software must display the following acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
|
|
*
|
|
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
|
|
* endorse or promote products derived from this software without
|
|
|
|
* prior written permission. For written permission, please contact
|
|
|
|
* licensing@OpenSSL.org.
|
|
|
|
*
|
|
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
|
|
* permission of the OpenSSL Project.
|
|
|
|
*
|
|
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
|
|
* acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
* ====================================================================
|
|
|
|
*
|
|
|
|
* This product includes cryptographic software written by Eric Young
|
|
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
|
|
* Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
*/
|
2002-08-09 08:43:04 +00:00
|
|
|
/* ====================================================================
|
|
|
|
* Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
|
|
|
|
* ECDH support in OpenSSL originally developed by
|
|
|
|
* SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
|
|
|
*/
|
2000-10-26 21:07:28 +00:00
|
|
|
|
2001-09-07 04:14:48 +00:00
|
|
|
#include "eng_int.h"
|
2000-10-26 21:07:28 +00:00
|
|
|
|
|
|
|
/* The linked-list of pointers to engine types. engine_list_head
|
|
|
|
* incorporates an implicit structural reference but engine_list_tail
|
|
|
|
* does not - the latter is a computational niceity and only points
|
|
|
|
* to something that is already pointed to by its predecessor in the
|
|
|
|
* list (or engine_list_head itself). In the same way, the use of the
|
|
|
|
* "prev" pointer in each ENGINE is to save excessive list iteration,
|
|
|
|
* it doesn't correspond to an extra structural reference. Hence,
|
|
|
|
* engine_list_head, and each non-null "next" pointer account for
|
|
|
|
* the list itself assuming exactly 1 structural reference on each
|
|
|
|
* list member. */
|
|
|
|
static ENGINE *engine_list_head = NULL;
|
|
|
|
static ENGINE *engine_list_tail = NULL;
|
2001-09-25 20:00:51 +00:00
|
|
|
|
|
|
|
/* This cleanup function is only needed internally. If it should be called, we
|
|
|
|
* register it with the "ENGINE_cleanup()" stack to be called during cleanup. */
|
|
|
|
|
|
|
|
static void engine_list_cleanup(void)
|
|
|
|
{
|
|
|
|
ENGINE *iterator = engine_list_head;
|
|
|
|
|
|
|
|
while(iterator != NULL)
|
|
|
|
{
|
|
|
|
ENGINE_remove(iterator);
|
|
|
|
iterator = engine_list_head;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
2000-10-26 21:07:28 +00:00
|
|
|
|
|
|
|
/* These static functions starting with a lower case "engine_" always
|
|
|
|
* take place when CRYPTO_LOCK_ENGINE has been locked up. */
|
|
|
|
static int engine_list_add(ENGINE *e)
|
|
|
|
{
|
|
|
|
int conflict = 0;
|
|
|
|
ENGINE *iterator = NULL;
|
|
|
|
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
iterator = engine_list_head;
|
|
|
|
while(iterator && !conflict)
|
|
|
|
{
|
|
|
|
conflict = (strcmp(iterator->id, e->id) == 0);
|
|
|
|
iterator = iterator->next;
|
|
|
|
}
|
|
|
|
if(conflict)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
|
|
|
|
ENGINE_R_CONFLICTING_ENGINE_ID);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if(engine_list_head == NULL)
|
|
|
|
{
|
|
|
|
/* We are adding to an empty list. */
|
|
|
|
if(engine_list_tail)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
|
|
|
|
ENGINE_R_INTERNAL_LIST_ERROR);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
engine_list_head = e;
|
|
|
|
e->prev = NULL;
|
2001-09-25 20:00:51 +00:00
|
|
|
/* The first time the list allocates, we should register the
|
|
|
|
* cleanup. */
|
|
|
|
engine_cleanup_add_last(engine_list_cleanup);
|
2000-10-26 21:07:28 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* We are adding to the tail of an existing list. */
|
|
|
|
if((engine_list_tail == NULL) ||
|
|
|
|
(engine_list_tail->next != NULL))
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_ADD,
|
|
|
|
ENGINE_R_INTERNAL_LIST_ERROR);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
engine_list_tail->next = e;
|
|
|
|
e->prev = engine_list_tail;
|
|
|
|
}
|
|
|
|
/* Having the engine in the list assumes a structural
|
|
|
|
* reference. */
|
|
|
|
e->struct_ref++;
|
2001-04-26 23:04:30 +00:00
|
|
|
engine_ref_debug(e, 0, 1)
|
2000-10-26 21:07:28 +00:00
|
|
|
/* However it came to be, e is the last item in the list. */
|
|
|
|
engine_list_tail = e;
|
|
|
|
e->next = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int engine_list_remove(ENGINE *e)
|
|
|
|
{
|
|
|
|
ENGINE *iterator;
|
|
|
|
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* We need to check that e is in our linked list! */
|
|
|
|
iterator = engine_list_head;
|
|
|
|
while(iterator && (iterator != e))
|
|
|
|
iterator = iterator->next;
|
|
|
|
if(iterator == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_LIST_REMOVE,
|
|
|
|
ENGINE_R_ENGINE_IS_NOT_IN_LIST);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* un-link e from the chain. */
|
|
|
|
if(e->next)
|
|
|
|
e->next->prev = e->prev;
|
|
|
|
if(e->prev)
|
|
|
|
e->prev->next = e->next;
|
|
|
|
/* Correct our head/tail if necessary. */
|
|
|
|
if(engine_list_head == e)
|
|
|
|
engine_list_head = e->next;
|
|
|
|
if(engine_list_tail == e)
|
|
|
|
engine_list_tail = e->prev;
|
2001-09-25 20:00:51 +00:00
|
|
|
engine_free_util(e, 0);
|
2000-10-26 21:07:28 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the first/last "ENGINE" type available. */
|
|
|
|
ENGINE *ENGINE_get_first(void)
|
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
ENGINE *ret;
|
2000-10-26 21:07:28 +00:00
|
|
|
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2001-09-25 20:00:51 +00:00
|
|
|
ret = engine_list_head;
|
|
|
|
if(ret)
|
2000-10-26 21:07:28 +00:00
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
ret->struct_ref++;
|
|
|
|
engine_ref_debug(ret, 0, 1)
|
2000-10-26 21:07:28 +00:00
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
2000-10-26 21:07:28 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2001-09-25 20:00:51 +00:00
|
|
|
|
2000-10-26 21:07:28 +00:00
|
|
|
ENGINE *ENGINE_get_last(void)
|
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
ENGINE *ret;
|
2000-10-26 21:07:28 +00:00
|
|
|
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
|
|
|
ret = engine_list_tail;
|
2001-09-25 20:00:51 +00:00
|
|
|
if(ret)
|
|
|
|
{
|
|
|
|
ret->struct_ref++;
|
|
|
|
engine_ref_debug(ret, 0, 1)
|
2000-10-26 21:07:28 +00:00
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
2000-10-26 21:07:28 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Iterate to the next/previous "ENGINE" type (NULL = end of the list). */
|
|
|
|
ENGINE *ENGINE_get_next(ENGINE *e)
|
|
|
|
{
|
|
|
|
ENGINE *ret = NULL;
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_GET_NEXT,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2000-10-26 21:07:28 +00:00
|
|
|
ret = e->next;
|
|
|
|
if(ret)
|
2001-04-26 23:04:30 +00:00
|
|
|
{
|
2001-04-18 01:07:28 +00:00
|
|
|
/* Return a valid structural refernce to the next ENGINE */
|
2000-10-26 21:07:28 +00:00
|
|
|
ret->struct_ref++;
|
2001-04-26 23:04:30 +00:00
|
|
|
engine_ref_debug(ret, 0, 1)
|
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
2001-04-18 01:07:28 +00:00
|
|
|
/* Release the structural reference to the previous ENGINE */
|
|
|
|
ENGINE_free(e);
|
2000-10-26 21:07:28 +00:00
|
|
|
return ret;
|
|
|
|
}
|
2001-09-25 20:00:51 +00:00
|
|
|
|
2000-10-26 21:07:28 +00:00
|
|
|
ENGINE *ENGINE_get_prev(ENGINE *e)
|
|
|
|
{
|
|
|
|
ENGINE *ret = NULL;
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_GET_PREV,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2000-10-26 21:07:28 +00:00
|
|
|
ret = e->prev;
|
|
|
|
if(ret)
|
2001-04-26 23:04:30 +00:00
|
|
|
{
|
2001-04-18 01:07:28 +00:00
|
|
|
/* Return a valid structural reference to the next ENGINE */
|
2000-10-26 21:07:28 +00:00
|
|
|
ret->struct_ref++;
|
2001-04-26 23:04:30 +00:00
|
|
|
engine_ref_debug(ret, 0, 1)
|
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
2001-04-18 01:07:28 +00:00
|
|
|
/* Release the structural reference to the previous ENGINE */
|
|
|
|
ENGINE_free(e);
|
2000-10-26 21:07:28 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add another "ENGINE" type into the list. */
|
|
|
|
int ENGINE_add(ENGINE *e)
|
|
|
|
{
|
|
|
|
int to_return = 1;
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_ADD,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if((e->id == NULL) || (e->name == NULL))
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_ADD,
|
|
|
|
ENGINE_R_ID_OR_NAME_MISSING);
|
|
|
|
}
|
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2001-09-25 20:00:51 +00:00
|
|
|
if(!engine_list_add(e))
|
2000-10-26 21:07:28 +00:00
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_ADD,
|
|
|
|
ENGINE_R_INTERNAL_LIST_ERROR);
|
|
|
|
to_return = 0;
|
|
|
|
}
|
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
|
|
|
return to_return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove an existing "ENGINE" type from the array. */
|
|
|
|
int ENGINE_remove(ENGINE *e)
|
|
|
|
{
|
|
|
|
int to_return = 1;
|
|
|
|
if(e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_REMOVE,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2001-09-25 20:00:51 +00:00
|
|
|
if(!engine_list_remove(e))
|
2000-10-26 21:07:28 +00:00
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_REMOVE,
|
|
|
|
ENGINE_R_INTERNAL_LIST_ERROR);
|
|
|
|
to_return = 0;
|
|
|
|
}
|
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
|
|
|
return to_return;
|
|
|
|
}
|
|
|
|
|
2001-09-25 20:00:51 +00:00
|
|
|
static void engine_cpy(ENGINE *dest, const ENGINE *src)
|
|
|
|
{
|
|
|
|
dest->id = src->id;
|
|
|
|
dest->name = src->name;
|
|
|
|
#ifndef OPENSSL_NO_RSA
|
|
|
|
dest->rsa_meth = src->rsa_meth;
|
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_DSA
|
|
|
|
dest->dsa_meth = src->dsa_meth;
|
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_DH
|
|
|
|
dest->dh_meth = src->dh_meth;
|
2002-02-13 18:21:51 +00:00
|
|
|
#endif
|
2002-08-09 08:43:04 +00:00
|
|
|
#ifndef OPENSSL_NO_ECDH
|
|
|
|
dest->ecdh_meth = src->ecdh_meth;
|
|
|
|
#endif
|
2002-02-13 18:21:51 +00:00
|
|
|
#ifndef OPENSSL_NO_ECDSA
|
|
|
|
dest->ecdsa_meth = src->ecdsa_meth;
|
2001-09-25 20:00:51 +00:00
|
|
|
#endif
|
|
|
|
dest->rand_meth = src->rand_meth;
|
2003-05-01 03:57:46 +00:00
|
|
|
dest->store_meth = src->store_meth;
|
2001-09-25 21:28:40 +00:00
|
|
|
dest->ciphers = src->ciphers;
|
|
|
|
dest->digests = src->digests;
|
2006-06-02 17:09:17 +00:00
|
|
|
dest->pkey_meths = src->pkey_meths;
|
2001-09-25 20:00:51 +00:00
|
|
|
dest->destroy = src->destroy;
|
|
|
|
dest->init = src->init;
|
|
|
|
dest->finish = src->finish;
|
|
|
|
dest->ctrl = src->ctrl;
|
|
|
|
dest->load_privkey = src->load_privkey;
|
|
|
|
dest->load_pubkey = src->load_pubkey;
|
|
|
|
dest->cmd_defns = src->cmd_defns;
|
|
|
|
dest->flags = src->flags;
|
|
|
|
}
|
|
|
|
|
2000-10-26 21:07:28 +00:00
|
|
|
ENGINE *ENGINE_by_id(const char *id)
|
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
ENGINE *iterator;
|
2002-10-11 18:49:55 +00:00
|
|
|
char *load_dir = NULL;
|
2000-10-26 21:07:28 +00:00
|
|
|
if(id == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_BY_ID,
|
|
|
|
ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return NULL;
|
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_ENGINE);
|
2001-09-25 20:00:51 +00:00
|
|
|
iterator = engine_list_head;
|
|
|
|
while(iterator && (strcmp(id, iterator->id) != 0))
|
|
|
|
iterator = iterator->next;
|
|
|
|
if(iterator)
|
2000-10-26 21:07:28 +00:00
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
/* We need to return a structural reference. If this is an
|
|
|
|
* ENGINE type that returns copies, make a duplicate - otherwise
|
|
|
|
* increment the existing ENGINE's reference count. */
|
|
|
|
if(iterator->flags & ENGINE_FLAGS_BY_ID_COPY)
|
This adds 2 things to the ENGINE code.
* "ex_data" - a CRYPTO_EX_DATA structure in the ENGINE structure itself
that allows an ENGINE to store its own information there rather than in
global variables. It follows the declarations and implementations used
in RSA code, for better or worse. However there's a problem when storing
state with ENGINEs because, unlike related structure types in OpenSSL,
there is no ENGINE-vs-ENGINE_METHOD separation. Because of what ENGINE
is, it has method pointers as its structure elements ... which leads
to;
* ENGINE_FLAGS_BY_ID_COPY - if an ENGINE should not be used just as a
reference to an "implementation" (eg. to get to a hardware device), but
should also be able to maintain state, then this flag can be set by the
ENGINE implementation. The result is that any call to ENGINE_by_id()
will not result in the existing ENGINE being returned (with its
structural reference count incremented) but instead a new copy of the
ENGINE will be returned that can maintain its own state independantly of
any other copies returned in the past or future. Eg. key-generation
might involve a series of ENGINE-specific control commands to set
algorithms, sizes, module-keys, ids, ACLs, etc. A final command could
generate the key. An ENGINE doing this would *have* to declare
ENGINE_FLAGS_BY_ID_COPY so that the state of that process can be
maintained "per-handle" and unaffected by other code having a reference
to the same ENGINE structure.
2001-04-26 19:35:44 +00:00
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
ENGINE *cp = ENGINE_new();
|
|
|
|
if(!cp)
|
|
|
|
iterator = NULL;
|
This adds 2 things to the ENGINE code.
* "ex_data" - a CRYPTO_EX_DATA structure in the ENGINE structure itself
that allows an ENGINE to store its own information there rather than in
global variables. It follows the declarations and implementations used
in RSA code, for better or worse. However there's a problem when storing
state with ENGINEs because, unlike related structure types in OpenSSL,
there is no ENGINE-vs-ENGINE_METHOD separation. Because of what ENGINE
is, it has method pointers as its structure elements ... which leads
to;
* ENGINE_FLAGS_BY_ID_COPY - if an ENGINE should not be used just as a
reference to an "implementation" (eg. to get to a hardware device), but
should also be able to maintain state, then this flag can be set by the
ENGINE implementation. The result is that any call to ENGINE_by_id()
will not result in the existing ENGINE being returned (with its
structural reference count incremented) but instead a new copy of the
ENGINE will be returned that can maintain its own state independantly of
any other copies returned in the past or future. Eg. key-generation
might involve a series of ENGINE-specific control commands to set
algorithms, sizes, module-keys, ids, ACLs, etc. A final command could
generate the key. An ENGINE doing this would *have* to declare
ENGINE_FLAGS_BY_ID_COPY so that the state of that process can be
maintained "per-handle" and unaffected by other code having a reference
to the same ENGINE structure.
2001-04-26 19:35:44 +00:00
|
|
|
else
|
2001-04-26 23:04:30 +00:00
|
|
|
{
|
2001-09-25 20:00:51 +00:00
|
|
|
engine_cpy(cp, iterator);
|
|
|
|
iterator = cp;
|
2001-04-26 23:04:30 +00:00
|
|
|
}
|
This adds 2 things to the ENGINE code.
* "ex_data" - a CRYPTO_EX_DATA structure in the ENGINE structure itself
that allows an ENGINE to store its own information there rather than in
global variables. It follows the declarations and implementations used
in RSA code, for better or worse. However there's a problem when storing
state with ENGINEs because, unlike related structure types in OpenSSL,
there is no ENGINE-vs-ENGINE_METHOD separation. Because of what ENGINE
is, it has method pointers as its structure elements ... which leads
to;
* ENGINE_FLAGS_BY_ID_COPY - if an ENGINE should not be used just as a
reference to an "implementation" (eg. to get to a hardware device), but
should also be able to maintain state, then this flag can be set by the
ENGINE implementation. The result is that any call to ENGINE_by_id()
will not result in the existing ENGINE being returned (with its
structural reference count incremented) but instead a new copy of the
ENGINE will be returned that can maintain its own state independantly of
any other copies returned in the past or future. Eg. key-generation
might involve a series of ENGINE-specific control commands to set
algorithms, sizes, module-keys, ids, ACLs, etc. A final command could
generate the key. An ENGINE doing this would *have* to declare
ENGINE_FLAGS_BY_ID_COPY so that the state of that process can be
maintained "per-handle" and unaffected by other code having a reference
to the same ENGINE structure.
2001-04-26 19:35:44 +00:00
|
|
|
}
|
2001-09-25 20:00:51 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
iterator->struct_ref++;
|
|
|
|
engine_ref_debug(iterator, 0, 1)
|
|
|
|
}
|
2000-10-26 21:07:28 +00:00
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_ENGINE);
|
2002-10-11 18:49:55 +00:00
|
|
|
#if 0
|
2000-10-26 21:07:28 +00:00
|
|
|
if(iterator == NULL)
|
2002-01-21 03:02:36 +00:00
|
|
|
{
|
2000-10-26 21:07:28 +00:00
|
|
|
ENGINEerr(ENGINE_F_ENGINE_BY_ID,
|
|
|
|
ENGINE_R_NO_SUCH_ENGINE);
|
2002-01-21 03:02:36 +00:00
|
|
|
ERR_add_error_data(2, "id=", id);
|
|
|
|
}
|
2000-10-26 21:07:28 +00:00
|
|
|
return iterator;
|
2002-10-11 18:49:55 +00:00
|
|
|
#else
|
|
|
|
/* EEK! Experimental code starts */
|
|
|
|
if(iterator) return iterator;
|
2005-08-06 10:46:19 +00:00
|
|
|
/* Prevent infinite recusrion if we're looking for the dynamic engine. */
|
|
|
|
if (strcmp(id, "dynamic"))
|
|
|
|
{
|
2002-10-11 18:49:55 +00:00
|
|
|
#ifdef OPENSSL_SYS_VMS
|
2005-08-06 10:46:19 +00:00
|
|
|
if((load_dir = getenv("OPENSSL_ENGINES")) == 0) load_dir = "SSLROOT:[ENGINES]";
|
2002-10-11 18:49:55 +00:00
|
|
|
#else
|
2005-08-06 10:46:19 +00:00
|
|
|
if((load_dir = getenv("OPENSSL_ENGINES")) == 0) load_dir = ENGINESDIR;
|
2002-10-11 18:49:55 +00:00
|
|
|
#endif
|
2005-08-06 10:46:19 +00:00
|
|
|
iterator = ENGINE_by_id("dynamic");
|
|
|
|
if(!iterator || !ENGINE_ctrl_cmd_string(iterator, "ID", id, 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "DIR_LOAD", "2", 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "DIR_ADD",
|
|
|
|
load_dir, 0) ||
|
2014-01-28 13:51:58 +00:00
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "LIST_ADD", "1", 0) ||
|
2005-08-06 10:46:19 +00:00
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "LOAD", NULL, 0))
|
|
|
|
goto notfound;
|
|
|
|
return iterator;
|
|
|
|
}
|
2002-10-11 18:49:55 +00:00
|
|
|
notfound:
|
2010-03-27 18:28:02 +00:00
|
|
|
ENGINE_free(iterator);
|
2002-10-11 18:49:55 +00:00
|
|
|
ENGINEerr(ENGINE_F_ENGINE_BY_ID,ENGINE_R_NO_SUCH_ENGINE);
|
|
|
|
ERR_add_error_data(2, "id=", id);
|
|
|
|
return NULL;
|
|
|
|
/* EEK! Experimental code ends */
|
|
|
|
#endif
|
2000-10-26 21:07:28 +00:00
|
|
|
}
|
2002-10-16 01:29:37 +00:00
|
|
|
|
|
|
|
int ENGINE_up_ref(ENGINE *e)
|
|
|
|
{
|
|
|
|
if (e == NULL)
|
|
|
|
{
|
|
|
|
ENGINEerr(ENGINE_F_ENGINE_UP_REF,ERR_R_PASSED_NULL_PARAMETER);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
CRYPTO_add(&e->struct_ref,1,CRYPTO_LOCK_ENGINE);
|
|
|
|
return 1;
|
|
|
|
}
|