Spaces:
Running
Running
/* | |
* Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved. | |
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved | |
* | |
* Licensed under the OpenSSL license (the "License"). You may not use | |
* this file except in compliance with the License. You can obtain a copy | |
* in the file LICENSE in the source distribution or at | |
* https://www.openssl.org/source/license.html | |
*/ | |
/* | |
* Resolve problems on some operating systems with symbol names that clash | |
* one way or another | |
*/ | |
extern "C" { | |
/* | |
* Old type for allocating dynamic locks. No longer used. Use the new thread | |
* API instead. | |
*/ | |
typedef struct { | |
int dummy; | |
} CRYPTO_dynlock; | |
typedef void CRYPTO_RWLOCK; | |
CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void); | |
int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock); | |
int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock); | |
int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock); | |
void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock); | |
int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock); | |
/* | |
* The following can be used to detect memory leaks in the library. If | |
* used, it turns on malloc checking | |
*/ | |
struct crypto_ex_data_st { | |
STACK_OF(void) *sk; | |
}; | |
DEFINE_STACK_OF(void) | |
/* | |
* Per class, we have a STACK of function pointers. | |
*/ | |
/* No longer needed, so this is a no-op */ | |
int CRYPTO_mem_ctrl(int mode); | |
size_t OPENSSL_strlcpy(char *dst, const char *src, size_t siz); | |
size_t OPENSSL_strlcat(char *dst, const char *src, size_t siz); | |
size_t OPENSSL_strnlen(const char *str, size_t maxlen); | |
char *OPENSSL_buf2hexstr(const unsigned char *buffer, long len); | |
unsigned char *OPENSSL_hexstr2buf(const char *str, long *len); | |
int OPENSSL_hexchar2int(unsigned char c); | |
unsigned long OpenSSL_version_num(void); | |
const char *OpenSSL_version(int type); | |
int OPENSSL_issetugid(void); | |
typedef void CRYPTO_EX_new (void *parent, void *ptr, CRYPTO_EX_DATA *ad, | |
int idx, long argl, void *argp); | |
typedef void CRYPTO_EX_free (void *parent, void *ptr, CRYPTO_EX_DATA *ad, | |
int idx, long argl, void *argp); | |
typedef int CRYPTO_EX_dup (CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from, | |
void *from_d, int idx, long argl, void *argp); | |
__owur int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp, | |
CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func, | |
CRYPTO_EX_free *free_func); | |
/* No longer use an index. */ | |
int CRYPTO_free_ex_index(int class_index, int idx); | |
/* | |
* Initialise/duplicate/free CRYPTO_EX_DATA variables corresponding to a | |
* given class (invokes whatever per-class callbacks are applicable) | |
*/ | |
int CRYPTO_new_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad); | |
int CRYPTO_dup_ex_data(int class_index, CRYPTO_EX_DATA *to, | |
const CRYPTO_EX_DATA *from); | |
void CRYPTO_free_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad); | |
/* | |
* Get/set data in a CRYPTO_EX_DATA variable corresponding to a particular | |
* index (relative to the class type involved) | |
*/ | |
int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int idx, void *val); | |
void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad, int idx); | |
/* | |
* This function cleans up all "ex_data" state. It mustn't be called under | |
* potential race-conditions. | |
*/ | |
/* | |
* The old locking functions have been removed completely without compatibility | |
* macros. This is because the old functions either could not properly report | |
* errors, or the returned error values were not clearly documented. | |
* Replacing the locking functions with no-ops would cause race condition | |
* issues in the affected applications. It is far better for them to fail at | |
* compile time. | |
* On the other hand, the locking callbacks are no longer used. Consequently, | |
* the callback management functions can be safely replaced with no-op macros. | |
*/ | |
/* | |
* These defines where used in combination with the old locking callbacks, | |
* they are not called anymore, but old code that's not called might still | |
* use them. | |
*/ | |
/* This structure is no longer used */ | |
typedef struct crypto_threadid_st { | |
int dummy; | |
} CRYPTO_THREADID; | |
/* Only use CRYPTO_THREADID_set_[numeric|pointer]() within callbacks */ | |
int CRYPTO_set_mem_functions( | |
void *(*m) (size_t, const char *, int), | |
void *(*r) (void *, size_t, const char *, int), | |
void (*f) (void *, const char *, int)); | |
int CRYPTO_set_mem_debug(int flag); | |
void CRYPTO_get_mem_functions( | |
void *(**m) (size_t, const char *, int), | |
void *(**r) (void *, size_t, const char *, int), | |
void (**f) (void *, const char *, int)); | |
void *CRYPTO_malloc(size_t num, const char *file, int line); | |
void *CRYPTO_zalloc(size_t num, const char *file, int line); | |
void *CRYPTO_memdup(const void *str, size_t siz, const char *file, int line); | |
char *CRYPTO_strdup(const char *str, const char *file, int line); | |
char *CRYPTO_strndup(const char *str, size_t s, const char *file, int line); | |
void CRYPTO_free(void *ptr, const char *file, int line); | |
void CRYPTO_clear_free(void *ptr, size_t num, const char *file, int line); | |
void *CRYPTO_realloc(void *addr, size_t num, const char *file, int line); | |
void *CRYPTO_clear_realloc(void *addr, size_t old_num, size_t num, | |
const char *file, int line); | |
int CRYPTO_secure_malloc_init(size_t sz, int minsize); | |
int CRYPTO_secure_malloc_done(void); | |
void *CRYPTO_secure_malloc(size_t num, const char *file, int line); | |
void *CRYPTO_secure_zalloc(size_t num, const char *file, int line); | |
void CRYPTO_secure_free(void *ptr, const char *file, int line); | |
void CRYPTO_secure_clear_free(void *ptr, size_t num, | |
const char *file, int line); | |
int CRYPTO_secure_allocated(const void *ptr); | |
int CRYPTO_secure_malloc_initialized(void); | |
size_t CRYPTO_secure_actual_size(void *ptr); | |
size_t CRYPTO_secure_used(void); | |
void OPENSSL_cleanse(void *ptr, size_t len); | |
int CRYPTO_mem_debug_push(const char *info, const char *file, int line); | |
int CRYPTO_mem_debug_pop(void); | |
void CRYPTO_get_alloc_counts(int *mcount, int *rcount, int *fcount); | |
/*- | |
* Debugging functions (enabled by CRYPTO_set_mem_debug(1)) | |
* The flag argument has the following significance: | |
* 0: called before the actual memory allocation has taken place | |
* 1: called after the actual memory allocation has taken place | |
*/ | |
void CRYPTO_mem_debug_malloc(void *addr, size_t num, int flag, | |
const char *file, int line); | |
void CRYPTO_mem_debug_realloc(void *addr1, void *addr2, size_t num, int flag, | |
const char *file, int line); | |
void CRYPTO_mem_debug_free(void *addr, int flag, | |
const char *file, int line); | |
int CRYPTO_mem_leaks_cb(int (*cb) (const char *str, size_t len, void *u), | |
void *u); | |
int CRYPTO_mem_leaks_fp(FILE *); | |
int CRYPTO_mem_leaks(BIO *bio); | |
/* die if we have to */ | |
ossl_noreturn void OPENSSL_die(const char *assertion, const char *file, int line); | |
int OPENSSL_isservice(void); | |
int FIPS_mode(void); | |
int FIPS_mode_set(int r); | |
void OPENSSL_init(void); | |
void OPENSSL_fork_prepare(void); | |
void OPENSSL_fork_parent(void); | |
void OPENSSL_fork_child(void); | |
struct tm *OPENSSL_gmtime(const time_t *timer, struct tm *result); | |
int OPENSSL_gmtime_adj(struct tm *tm, int offset_day, long offset_sec); | |
int OPENSSL_gmtime_diff(int *pday, int *psec, | |
const struct tm *from, const struct tm *to); | |
/* | |
* CRYPTO_memcmp returns zero iff the |len| bytes at |a| and |b| are equal. | |
* It takes an amount of time dependent on |len|, but independent of the | |
* contents of |a| and |b|. Unlike memcmp, it cannot be used to put elements | |
* into a defined order as the return value when a != b is undefined, other | |
* than to be non-zero. | |
*/ | |
int CRYPTO_memcmp(const void * in_a, const void * in_b, size_t len); | |
/* Standard initialisation options */ | |
/* OPENSSL_INIT_ZLIB 0x00010000L */ | |
/* OPENSSL_INIT_BASE_ONLY 0x00040000L */ | |
/* OPENSSL_INIT flag range 0xfff00000 reserved for OPENSSL_init_ssl() */ | |
/* Max OPENSSL_INIT flag value is 0x80000000 */ | |
/* openssl and dasync not counted as builtin */ | |
/* Library initialisation functions */ | |
void OPENSSL_cleanup(void); | |
int OPENSSL_init_crypto(uint64_t opts, const OPENSSL_INIT_SETTINGS *settings); | |
int OPENSSL_atexit(void (*handler)(void)); | |
void OPENSSL_thread_stop(void); | |
/* Low-level control of initialization */ | |
OPENSSL_INIT_SETTINGS *OPENSSL_INIT_new(void); | |
int OPENSSL_INIT_set_config_filename(OPENSSL_INIT_SETTINGS *settings, | |
const char *config_filename); | |
void OPENSSL_INIT_set_config_file_flags(OPENSSL_INIT_SETTINGS *settings, | |
unsigned long flags); | |
int OPENSSL_INIT_set_config_appname(OPENSSL_INIT_SETTINGS *settings, | |
const char *config_appname); | |
void OPENSSL_INIT_free(OPENSSL_INIT_SETTINGS *settings); | |
/* application has to include <windows.h> in order to use this */ | |
typedef DWORD CRYPTO_THREAD_LOCAL; | |
typedef DWORD CRYPTO_THREAD_ID; | |
typedef LONG CRYPTO_ONCE; | |
typedef pthread_once_t CRYPTO_ONCE; | |
typedef pthread_key_t CRYPTO_THREAD_LOCAL; | |
typedef pthread_t CRYPTO_THREAD_ID; | |
typedef unsigned int CRYPTO_ONCE; | |
typedef unsigned int CRYPTO_THREAD_LOCAL; | |
typedef unsigned int CRYPTO_THREAD_ID; | |
int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void)); | |
int CRYPTO_THREAD_init_local(CRYPTO_THREAD_LOCAL *key, void (*cleanup)(void *)); | |
void *CRYPTO_THREAD_get_local(CRYPTO_THREAD_LOCAL *key); | |
int CRYPTO_THREAD_set_local(CRYPTO_THREAD_LOCAL *key, void *val); | |
int CRYPTO_THREAD_cleanup_local(CRYPTO_THREAD_LOCAL *key); | |
CRYPTO_THREAD_ID CRYPTO_THREAD_get_current_id(void); | |
int CRYPTO_THREAD_compare_id(CRYPTO_THREAD_ID a, CRYPTO_THREAD_ID b); | |
} | |