/** * @file BSecurity.c * @author Ambroz Bizjak * * @section LICENSE * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the author nor the * names of its contributors may be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #ifdef BADVPN_THREADWORK_USE_PTHREAD #include #endif #include #include #include #include int bsecurity_initialized = 0; #ifdef BADVPN_THREADWORK_USE_PTHREAD pthread_mutex_t *bsecurity_locks; int bsecurity_num_locks; #endif #ifdef BADVPN_THREADWORK_USE_PTHREAD static unsigned long id_callback (void) { ASSERT(bsecurity_initialized) return (unsigned long)pthread_self(); } static void locking_callback (int mode, int type, const char *file, int line) { ASSERT(bsecurity_initialized) ASSERT(type >= 0) ASSERT(type < bsecurity_num_locks) if ((mode & CRYPTO_LOCK)) { ASSERT_FORCE(pthread_mutex_lock(&bsecurity_locks[type]) == 0) } else { ASSERT_FORCE(pthread_mutex_unlock(&bsecurity_locks[type]) == 0) } } #endif int BSecurity_GlobalInitThreadSafe (void) { ASSERT(!bsecurity_initialized) #ifdef BADVPN_THREADWORK_USE_PTHREAD // get number of locks int num_locks = CRYPTO_num_locks(); ASSERT_FORCE(num_locks >= 0) // alloc locks array if (!(bsecurity_locks = BAllocArray(num_locks, sizeof(bsecurity_locks[0])))) { goto fail0; } // init locks bsecurity_num_locks = 0; for (int i = 0; i < num_locks; i++) { if (pthread_mutex_init(&bsecurity_locks[i], NULL) != 0) { goto fail1; } bsecurity_num_locks++; } #endif bsecurity_initialized = 1; #ifdef BADVPN_THREADWORK_USE_PTHREAD CRYPTO_set_id_callback(id_callback); CRYPTO_set_locking_callback(locking_callback); #endif return 1; #ifdef BADVPN_THREADWORK_USE_PTHREAD fail1: while (bsecurity_num_locks > 0) { ASSERT_FORCE(pthread_mutex_destroy(&bsecurity_locks[bsecurity_num_locks - 1]) == 0) bsecurity_num_locks--; } BFree(bsecurity_locks); fail0: return 0; #endif } void BSecurity_GlobalFreeThreadSafe (void) { ASSERT(bsecurity_initialized) #ifdef BADVPN_THREADWORK_USE_PTHREAD // remove callbacks CRYPTO_set_locking_callback(NULL); CRYPTO_set_id_callback(NULL); // free locks while (bsecurity_num_locks > 0) { ASSERT_FORCE(pthread_mutex_destroy(&bsecurity_locks[bsecurity_num_locks - 1]) == 0) bsecurity_num_locks--; } // free locks array BFree(bsecurity_locks); #endif bsecurity_initialized = 0; } void BSecurity_GlobalAssertThreadSafe (int thread_safe) { ASSERT(thread_safe == 0 || thread_safe == 1) ASSERT(!(thread_safe) || bsecurity_initialized) }