1 /*
2 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
4 *
5 * Licensed under the Apache License 2.0 (the "License"). You may not use
6 * this file except in compliance with the License. You can obtain a copy
7 * in the file LICENSE in the source distribution or at
8 * https://www.openssl.org/source/license.html
9 */
10
11 #include <string.h>
12 #include <stdio.h>
13 #include <stdarg.h>
14 #include <openssl/crypto.h>
15 #include "internal/core.h"
16 #include "internal/property.h"
17 #include "internal/provider.h"
18 #include "internal/tsan_assist.h"
19 #include "crypto/ctype.h"
20 #include <openssl/lhash.h>
21 #include <openssl/rand.h>
22 #include <openssl/trace.h>
23 #include "internal/thread_once.h"
24 #include "crypto/lhash.h"
25 #include "crypto/sparse_array.h"
26 #include "property_local.h"
27 #include "crypto/context.h"
28
29 /*
30 * The number of elements in the query cache before we initiate a flush.
31 * If reducing this, also ensure the stochastic test in test/property_test.c
32 * isn't likely to fail.
33 */
34 #define IMPL_CACHE_FLUSH_THRESHOLD 500
35
36 typedef struct {
37 void *method;
38 int (*up_ref)(void *);
39 void (*free)(void *);
40 } METHOD;
41
42 typedef struct {
43 const OSSL_PROVIDER *provider;
44 OSSL_PROPERTY_LIST *properties;
45 METHOD method;
46 } IMPLEMENTATION;
47
48 DEFINE_STACK_OF(IMPLEMENTATION)
49
50 typedef struct {
51 const OSSL_PROVIDER *provider;
52 const char *query;
53 METHOD method;
54 char body[1];
55 } QUERY;
56
57 DEFINE_LHASH_OF_EX(QUERY);
58
59 typedef struct {
60 int nid;
61 STACK_OF(IMPLEMENTATION) *impls;
62 LHASH_OF(QUERY) *cache;
63 } ALGORITHM;
64
65 struct ossl_method_store_st {
66 OSSL_LIB_CTX *ctx;
67 SPARSE_ARRAY_OF(ALGORITHM) * algs;
68 /*
69 * Lock to protect the |algs| array from concurrent writing, when
70 * individual implementations or queries are inserted. This is used
71 * by the appropriate functions here.
72 */
73 CRYPTO_RWLOCK *lock;
74 /*
75 * Lock to reserve the whole store. This is used when fetching a set
76 * of algorithms, via these functions, found in crypto/core_fetch.c:
77 * ossl_method_construct_reserve_store()
78 * ossl_method_construct_unreserve_store()
79 */
80 CRYPTO_RWLOCK *biglock;
81
82 /* query cache specific values */
83
84 /* Count of the query cache entries for all algs */
85 size_t cache_nelem;
86
87 /* Flag: 1 if query cache entries for all algs need flushing */
88 int cache_need_flush;
89 };
90
91 typedef struct {
92 LHASH_OF(QUERY) *cache;
93 size_t nelem;
94 uint32_t seed;
95 unsigned char using_global_seed;
96 } IMPL_CACHE_FLUSH;
97
98 DEFINE_SPARSE_ARRAY_OF(ALGORITHM);
99
100 DEFINE_STACK_OF(ALGORITHM)
101
102 typedef struct ossl_global_properties_st {
103 OSSL_PROPERTY_LIST *list;
104 #ifndef FIPS_MODULE
105 unsigned int no_mirrored : 1;
106 #endif
107 } OSSL_GLOBAL_PROPERTIES;
108
109 static void ossl_method_cache_flush_alg(OSSL_METHOD_STORE *store,
110 ALGORITHM *alg);
111 static void ossl_method_cache_flush(OSSL_METHOD_STORE *store, int nid);
112
113 /* Global properties are stored per library context */
ossl_ctx_global_properties_free(void * vglobp)114 void ossl_ctx_global_properties_free(void *vglobp)
115 {
116 OSSL_GLOBAL_PROPERTIES *globp = vglobp;
117
118 if (globp != NULL) {
119 ossl_property_free(globp->list);
120 OPENSSL_free(globp);
121 }
122 }
123
ossl_ctx_global_properties_new(OSSL_LIB_CTX * ctx)124 void *ossl_ctx_global_properties_new(OSSL_LIB_CTX *ctx)
125 {
126 return OPENSSL_zalloc(sizeof(OSSL_GLOBAL_PROPERTIES));
127 }
128
ossl_ctx_global_properties(OSSL_LIB_CTX * libctx,ossl_unused int loadconfig)129 OSSL_PROPERTY_LIST **ossl_ctx_global_properties(OSSL_LIB_CTX *libctx,
130 ossl_unused int loadconfig)
131 {
132 OSSL_GLOBAL_PROPERTIES *globp;
133
134 #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_AUTOLOAD_CONFIG)
135 if (loadconfig && !OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL))
136 return NULL;
137 #endif
138 globp = ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_GLOBAL_PROPERTIES);
139
140 return globp != NULL ? &globp->list : NULL;
141 }
142
143 #ifndef FIPS_MODULE
ossl_global_properties_no_mirrored(OSSL_LIB_CTX * libctx)144 int ossl_global_properties_no_mirrored(OSSL_LIB_CTX *libctx)
145 {
146 OSSL_GLOBAL_PROPERTIES *globp
147 = ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_GLOBAL_PROPERTIES);
148
149 return globp != NULL && globp->no_mirrored ? 1 : 0;
150 }
151
ossl_global_properties_stop_mirroring(OSSL_LIB_CTX * libctx)152 void ossl_global_properties_stop_mirroring(OSSL_LIB_CTX *libctx)
153 {
154 OSSL_GLOBAL_PROPERTIES *globp
155 = ossl_lib_ctx_get_data(libctx, OSSL_LIB_CTX_GLOBAL_PROPERTIES);
156
157 if (globp != NULL)
158 globp->no_mirrored = 1;
159 }
160 #endif
161
ossl_method_up_ref(METHOD * method)162 static int ossl_method_up_ref(METHOD *method)
163 {
164 return (*method->up_ref)(method->method);
165 }
166
ossl_method_free(METHOD * method)167 static void ossl_method_free(METHOD *method)
168 {
169 (*method->free)(method->method);
170 }
171
ossl_property_read_lock(OSSL_METHOD_STORE * p)172 static __owur int ossl_property_read_lock(OSSL_METHOD_STORE *p)
173 {
174 return p != NULL ? CRYPTO_THREAD_read_lock(p->lock) : 0;
175 }
176
ossl_property_write_lock(OSSL_METHOD_STORE * p)177 static __owur int ossl_property_write_lock(OSSL_METHOD_STORE *p)
178 {
179 return p != NULL ? CRYPTO_THREAD_write_lock(p->lock) : 0;
180 }
181
ossl_property_unlock(OSSL_METHOD_STORE * p)182 static int ossl_property_unlock(OSSL_METHOD_STORE *p)
183 {
184 return p != 0 ? CRYPTO_THREAD_unlock(p->lock) : 0;
185 }
186
query_hash(const QUERY * a)187 static unsigned long query_hash(const QUERY *a)
188 {
189 return OPENSSL_LH_strhash(a->query);
190 }
191
query_cmp(const QUERY * a,const QUERY * b)192 static int query_cmp(const QUERY *a, const QUERY *b)
193 {
194 int res = strcmp(a->query, b->query);
195
196 if (res == 0 && a->provider != NULL && b->provider != NULL)
197 res = b->provider > a->provider ? 1
198 : b->provider < a->provider ? -1
199 : 0;
200 return res;
201 }
202
impl_free(IMPLEMENTATION * impl)203 static void impl_free(IMPLEMENTATION *impl)
204 {
205 if (impl != NULL) {
206 ossl_method_free(&impl->method);
207 OPENSSL_free(impl);
208 }
209 }
210
impl_cache_free(QUERY * elem)211 static void impl_cache_free(QUERY *elem)
212 {
213 if (elem != NULL) {
214 ossl_method_free(&elem->method);
215 OPENSSL_free(elem);
216 }
217 }
218
impl_cache_flush_alg(ossl_uintmax_t idx,ALGORITHM * alg)219 static void impl_cache_flush_alg(ossl_uintmax_t idx, ALGORITHM *alg)
220 {
221 lh_QUERY_doall(alg->cache, &impl_cache_free);
222 lh_QUERY_flush(alg->cache);
223 }
224
alg_cleanup(ossl_uintmax_t idx,ALGORITHM * a,void * arg)225 static void alg_cleanup(ossl_uintmax_t idx, ALGORITHM *a, void *arg)
226 {
227 OSSL_METHOD_STORE *store = arg;
228
229 if (a != NULL) {
230 sk_IMPLEMENTATION_pop_free(a->impls, &impl_free);
231 lh_QUERY_doall(a->cache, &impl_cache_free);
232 lh_QUERY_free(a->cache);
233 OPENSSL_free(a);
234 }
235 if (store != NULL)
236 ossl_sa_ALGORITHM_set(store->algs, idx, NULL);
237 }
238
239 /*
240 * The OSSL_LIB_CTX param here allows access to underlying property data needed
241 * for computation
242 */
ossl_method_store_new(OSSL_LIB_CTX * ctx)243 OSSL_METHOD_STORE *ossl_method_store_new(OSSL_LIB_CTX *ctx)
244 {
245 OSSL_METHOD_STORE *res;
246
247 res = OPENSSL_zalloc(sizeof(*res));
248 if (res != NULL) {
249 res->ctx = ctx;
250 if ((res->algs = ossl_sa_ALGORITHM_new()) == NULL
251 || (res->lock = CRYPTO_THREAD_lock_new()) == NULL
252 || (res->biglock = CRYPTO_THREAD_lock_new()) == NULL) {
253 ossl_method_store_free(res);
254 return NULL;
255 }
256 }
257 return res;
258 }
259
ossl_method_store_free(OSSL_METHOD_STORE * store)260 void ossl_method_store_free(OSSL_METHOD_STORE *store)
261 {
262 if (store != NULL) {
263 if (store->algs != NULL)
264 ossl_sa_ALGORITHM_doall_arg(store->algs, &alg_cleanup, store);
265 ossl_sa_ALGORITHM_free(store->algs);
266 CRYPTO_THREAD_lock_free(store->lock);
267 CRYPTO_THREAD_lock_free(store->biglock);
268 OPENSSL_free(store);
269 }
270 }
271
ossl_method_lock_store(OSSL_METHOD_STORE * store)272 int ossl_method_lock_store(OSSL_METHOD_STORE *store)
273 {
274 return store != NULL ? CRYPTO_THREAD_write_lock(store->biglock) : 0;
275 }
276
ossl_method_unlock_store(OSSL_METHOD_STORE * store)277 int ossl_method_unlock_store(OSSL_METHOD_STORE *store)
278 {
279 return store != NULL ? CRYPTO_THREAD_unlock(store->biglock) : 0;
280 }
281
ossl_method_store_retrieve(OSSL_METHOD_STORE * store,int nid)282 static ALGORITHM *ossl_method_store_retrieve(OSSL_METHOD_STORE *store, int nid)
283 {
284 return ossl_sa_ALGORITHM_get(store->algs, nid);
285 }
286
ossl_method_store_insert(OSSL_METHOD_STORE * store,ALGORITHM * alg)287 static int ossl_method_store_insert(OSSL_METHOD_STORE *store, ALGORITHM *alg)
288 {
289 return ossl_sa_ALGORITHM_set(store->algs, alg->nid, alg);
290 }
291
292 /**
293 * @brief Adds a method to the specified method store.
294 *
295 * This function adds a new method to the provided method store, associating it
296 * with a specified id, properties, and provider. The method is stored with
297 * reference count and destruction callbacks.
298 *
299 * @param store Pointer to the OSSL_METHOD_STORE where the method will be added.
300 * Must be non-null.
301 * @param prov Pointer to the OSSL_PROVIDER for the provider of the method.
302 * Must be non-null.
303 * @param nid (identifier) associated with the method, must be > 0
304 * @param properties String containing properties of the method.
305 * @param method Pointer to the method to be added.
306 * @param method_up_ref Function pointer for incrementing the method ref count.
307 * @param method_destruct Function pointer for destroying the method.
308 *
309 * @return 1 if the method is successfully added, 0 on failure.
310 *
311 * If tracing is enabled, a message is printed indicating that the method is
312 * being added to the method store.
313 *
314 * NOTE: The nid parameter here is _not_ a nid in the sense of the NID_* macros.
315 * It is an internal unique identifier.
316 */
ossl_method_store_add(OSSL_METHOD_STORE * store,const OSSL_PROVIDER * prov,int nid,const char * properties,void * method,int (* method_up_ref)(void *),void (* method_destruct)(void *))317 int ossl_method_store_add(OSSL_METHOD_STORE *store, const OSSL_PROVIDER *prov,
318 int nid, const char *properties, void *method,
319 int (*method_up_ref)(void *),
320 void (*method_destruct)(void *))
321 {
322 ALGORITHM *alg = NULL;
323 IMPLEMENTATION *impl;
324 int ret = 0;
325 int i;
326
327 if (nid <= 0 || method == NULL || store == NULL)
328 return 0;
329
330 if (properties == NULL)
331 properties = "";
332
333 if (!ossl_assert(prov != NULL))
334 return 0;
335
336 /* Create new entry */
337 impl = OPENSSL_malloc(sizeof(*impl));
338 if (impl == NULL)
339 return 0;
340 impl->method.method = method;
341 impl->method.up_ref = method_up_ref;
342 impl->method.free = method_destruct;
343 if (!ossl_method_up_ref(&impl->method)) {
344 OPENSSL_free(impl);
345 return 0;
346 }
347 impl->provider = prov;
348
349 /* Insert into the hash table if required */
350 if (!ossl_property_write_lock(store)) {
351 impl_free(impl);
352 return 0;
353 }
354
355 /*
356 * Flush the alg cache of any implementation that already exists
357 * for this id.
358 * This is done to ensure that on the next lookup we go through the
359 * provider comparison in ossl_method_store_fetch. If we don't do this
360 * then this new method won't be given a chance to get selected.
361 * NOTE: This doesn't actually remove the method from the backing store
362 * It just ensures that we query the backing store when (re)-adding a
363 * method to the algorithm cache, in case the one selected by the next
364 * query selects a different implementation
365 */
366 ossl_method_cache_flush(store, nid);
367
368 /*
369 * Parse the properties associated with this method, and convert it to a
370 * property list stored against the implementation for later comparison
371 * during fetch operations
372 */
373 if ((impl->properties = ossl_prop_defn_get(store->ctx, properties)) == NULL) {
374 impl->properties = ossl_parse_property(store->ctx, properties);
375 if (impl->properties == NULL)
376 goto err;
377 if (!ossl_prop_defn_set(store->ctx, properties, &impl->properties)) {
378 ossl_property_free(impl->properties);
379 impl->properties = NULL;
380 goto err;
381 }
382 }
383
384 /*
385 * Check if we have an algorithm cache already for this nid. If so use
386 * it, otherwise, create it, and insert it into the store
387 */
388 alg = ossl_method_store_retrieve(store, nid);
389 if (alg == NULL) {
390 if ((alg = OPENSSL_zalloc(sizeof(*alg))) == NULL
391 || (alg->impls = sk_IMPLEMENTATION_new_null()) == NULL
392 || (alg->cache = lh_QUERY_new(&query_hash, &query_cmp)) == NULL)
393 goto err;
394 alg->nid = nid;
395 if (!ossl_method_store_insert(store, alg))
396 goto err;
397 OSSL_TRACE2(QUERY, "Inserted an alg with nid %d into the store %p\n", nid, (void *)store);
398 }
399
400 /* Push onto stack if there isn't one there already */
401 for (i = 0; i < sk_IMPLEMENTATION_num(alg->impls); i++) {
402 const IMPLEMENTATION *tmpimpl = sk_IMPLEMENTATION_value(alg->impls, i);
403
404 if (tmpimpl->provider == impl->provider
405 && tmpimpl->properties == impl->properties)
406 break;
407 }
408
409 if (i == sk_IMPLEMENTATION_num(alg->impls)
410 && sk_IMPLEMENTATION_push(alg->impls, impl)) {
411 ret = 1;
412 #ifndef FIPS_MODULE
413 OSSL_TRACE_BEGIN(QUERY)
414 {
415 BIO_printf(trc_out, "Adding to method store "
416 "nid: %d\nproperties: %s\nprovider: %s\n",
417 nid, properties,
418 ossl_provider_name(prov) == NULL ? "none" : ossl_provider_name(prov));
419 }
420 OSSL_TRACE_END(QUERY);
421 #endif
422 }
423 ossl_property_unlock(store);
424 if (ret == 0)
425 impl_free(impl);
426 return ret;
427
428 err:
429 ossl_property_unlock(store);
430 alg_cleanup(0, alg, NULL);
431 impl_free(impl);
432 return 0;
433 }
434
ossl_method_store_remove(OSSL_METHOD_STORE * store,int nid,const void * method)435 int ossl_method_store_remove(OSSL_METHOD_STORE *store, int nid,
436 const void *method)
437 {
438 ALGORITHM *alg = NULL;
439 int i;
440
441 if (nid <= 0 || method == NULL || store == NULL)
442 return 0;
443
444 if (!ossl_property_write_lock(store))
445 return 0;
446 ossl_method_cache_flush(store, nid);
447 alg = ossl_method_store_retrieve(store, nid);
448 if (alg == NULL) {
449 ossl_property_unlock(store);
450 return 0;
451 }
452
453 /*
454 * A sorting find then a delete could be faster but these stacks should be
455 * relatively small, so we avoid the overhead. Sorting could also surprise
456 * users when result orderings change (even though they are not guaranteed).
457 */
458 for (i = 0; i < sk_IMPLEMENTATION_num(alg->impls); i++) {
459 IMPLEMENTATION *impl = sk_IMPLEMENTATION_value(alg->impls, i);
460
461 if (impl->method.method == method) {
462 impl_free(impl);
463 (void)sk_IMPLEMENTATION_delete(alg->impls, i);
464 ossl_property_unlock(store);
465 return 1;
466 }
467 }
468 ossl_property_unlock(store);
469 return 0;
470 }
471
472 struct alg_cleanup_by_provider_data_st {
473 OSSL_METHOD_STORE *store;
474 const OSSL_PROVIDER *prov;
475 };
476
477 /**
478 * @brief Cleans up implementations of an algorithm associated with a provider.
479 *
480 * This function removes all implementations of a specified algorithm that are
481 * associated with a given provider. The function walks through the stack of
482 * implementations backwards to handle deletions without affecting indexing.
483 *
484 * @param idx Index of the algorithm (unused in this function).
485 * @param alg Pointer to the ALGORITHM structure containing the implementations.
486 * @param arg Pointer to the data containing the provider information.
487 *
488 * If tracing is enabled, messages are printed indicating the removal of each
489 * implementation and its properties. If any implementation is removed, the
490 * associated cache is flushed.
491 */
492 static void
alg_cleanup_by_provider(ossl_uintmax_t idx,ALGORITHM * alg,void * arg)493 alg_cleanup_by_provider(ossl_uintmax_t idx, ALGORITHM *alg, void *arg)
494 {
495 struct alg_cleanup_by_provider_data_st *data = arg;
496 int i, count;
497
498 /*
499 * We walk the stack backwards, to avoid having to deal with stack shifts
500 * caused by deletion
501 */
502 for (count = 0, i = sk_IMPLEMENTATION_num(alg->impls); i-- > 0;) {
503 IMPLEMENTATION *impl = sk_IMPLEMENTATION_value(alg->impls, i);
504
505 if (impl->provider == data->prov) {
506 #ifndef FIPS_MODULE
507 OSSL_TRACE_BEGIN(QUERY)
508 {
509 char buf[512];
510 size_t size;
511
512 size = ossl_property_list_to_string(NULL, impl->properties, buf,
513 sizeof(buf));
514 BIO_printf(trc_out, "Removing implementation from "
515 "query cache\nproperties %s\nprovider %s\n",
516 size == 0 ? "none" : buf,
517 ossl_provider_name(impl->provider) == NULL ? "none" : ossl_provider_name(impl->provider));
518 }
519 OSSL_TRACE_END(QUERY);
520 #endif
521
522 (void)sk_IMPLEMENTATION_delete(alg->impls, i);
523 count++;
524 impl_free(impl);
525 }
526 }
527
528 /*
529 * If we removed any implementation, we also clear the whole associated
530 * cache, 'cause that's the sensible thing to do.
531 * There's no point flushing the cache entries where we didn't remove
532 * any implementation, though.
533 */
534 if (count > 0)
535 ossl_method_cache_flush_alg(data->store, alg);
536 }
537
ossl_method_store_remove_all_provided(OSSL_METHOD_STORE * store,const OSSL_PROVIDER * prov)538 int ossl_method_store_remove_all_provided(OSSL_METHOD_STORE *store,
539 const OSSL_PROVIDER *prov)
540 {
541 struct alg_cleanup_by_provider_data_st data;
542
543 if (!ossl_property_write_lock(store))
544 return 0;
545 data.prov = prov;
546 data.store = store;
547 ossl_sa_ALGORITHM_doall_arg(store->algs, &alg_cleanup_by_provider, &data);
548 ossl_property_unlock(store);
549 return 1;
550 }
551
alg_do_one(ALGORITHM * alg,IMPLEMENTATION * impl,void (* fn)(int id,void * method,void * fnarg),void * fnarg)552 static void alg_do_one(ALGORITHM *alg, IMPLEMENTATION *impl,
553 void (*fn)(int id, void *method, void *fnarg),
554 void *fnarg)
555 {
556 fn(alg->nid, impl->method.method, fnarg);
557 }
558
alg_copy(ossl_uintmax_t idx,ALGORITHM * alg,void * arg)559 static void alg_copy(ossl_uintmax_t idx, ALGORITHM *alg, void *arg)
560 {
561 STACK_OF(ALGORITHM) *newalg = arg;
562
563 alg = OPENSSL_memdup(alg, sizeof(ALGORITHM));
564 if (alg == NULL)
565 return;
566
567 alg->impls = sk_IMPLEMENTATION_dup(alg->impls);
568
569 (void)sk_ALGORITHM_push(newalg, alg);
570 }
571
del_tmpalg(ALGORITHM * alg)572 static void del_tmpalg(ALGORITHM *alg)
573 {
574 sk_IMPLEMENTATION_free(alg->impls);
575 OPENSSL_free(alg);
576 }
577
ossl_method_store_do_all(OSSL_METHOD_STORE * store,void (* fn)(int id,void * method,void * fnarg),void * fnarg)578 void ossl_method_store_do_all(OSSL_METHOD_STORE *store,
579 void (*fn)(int id, void *method, void *fnarg),
580 void *fnarg)
581 {
582 int i, j;
583 int numalgs, numimps;
584 STACK_OF(ALGORITHM) *tmpalgs;
585 ALGORITHM *alg;
586
587 if (store != NULL) {
588
589 if (!ossl_property_read_lock(store))
590 return;
591
592 tmpalgs = sk_ALGORITHM_new_reserve(NULL,
593 ossl_sa_ALGORITHM_num(store->algs));
594 if (tmpalgs == NULL) {
595 ossl_property_unlock(store);
596 return;
597 }
598
599 ossl_sa_ALGORITHM_doall_arg(store->algs, alg_copy, tmpalgs);
600 ossl_property_unlock(store);
601 numalgs = sk_ALGORITHM_num(tmpalgs);
602 for (i = 0; i < numalgs; i++) {
603 alg = sk_ALGORITHM_value(tmpalgs, i);
604 numimps = sk_IMPLEMENTATION_num(alg->impls);
605 for (j = 0; j < numimps; j++)
606 alg_do_one(alg, sk_IMPLEMENTATION_value(alg->impls, j), fn, fnarg);
607 }
608 sk_ALGORITHM_pop_free(tmpalgs, del_tmpalg);
609 }
610 }
611
612 /**
613 * @brief Fetches a method from the method store matching the given properties.
614 *
615 * This function searches the method store for an implementation of a specified
616 * method, identified by its id (nid), and matching the given property query. If
617 * successful, it returns the method and its associated provider.
618 *
619 * @param store Pointer to the OSSL_METHOD_STORE from which to fetch the method.
620 * Must be non-null.
621 * @param nid (identifier) of the method to be fetched. Must be > 0
622 * @param prop_query String containing the property query to match against.
623 * @param prov_rw Pointer to the OSSL_PROVIDER to restrict the search to, or
624 * to receive the matched provider.
625 * @param method Pointer to receive the fetched method. Must be non-null.
626 *
627 * @return 1 if the method is successfully fetched, 0 on failure.
628 *
629 * If tracing is enabled, a message is printed indicating the property query and
630 * the resolved provider.
631 *
632 * NOTE: The nid parameter here is _not_ a NID in the sense of the NID_* macros.
633 * It is a unique internal identifier value.
634 */
ossl_method_store_fetch(OSSL_METHOD_STORE * store,int nid,const char * prop_query,const OSSL_PROVIDER ** prov_rw,void ** method)635 int ossl_method_store_fetch(OSSL_METHOD_STORE *store,
636 int nid, const char *prop_query,
637 const OSSL_PROVIDER **prov_rw, void **method)
638 {
639 OSSL_PROPERTY_LIST **plp;
640 ALGORITHM *alg;
641 IMPLEMENTATION *impl, *best_impl = NULL;
642 OSSL_PROPERTY_LIST *pq = NULL, *p2 = NULL;
643 const OSSL_PROVIDER *prov = prov_rw != NULL ? *prov_rw : NULL;
644 int ret = 0;
645 int j, best = -1, score, optional;
646
647 if (nid <= 0 || method == NULL || store == NULL)
648 return 0;
649
650 #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_AUTOLOAD_CONFIG)
651 if (ossl_lib_ctx_is_default(store->ctx)
652 && !OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL))
653 return 0;
654 #endif
655
656 /* This only needs to be a read lock, because the query won't create anything */
657 if (!ossl_property_read_lock(store))
658 return 0;
659
660 OSSL_TRACE2(QUERY, "Retrieving by nid %d from store %p\n", nid, (void *)store);
661 alg = ossl_method_store_retrieve(store, nid);
662 if (alg == NULL) {
663 ossl_property_unlock(store);
664 OSSL_TRACE2(QUERY, "Failed to retrieve by nid %d from store %p\n", nid, (void *)store);
665 return 0;
666 }
667 OSSL_TRACE2(QUERY, "Retrieved by nid %d from store %p\n", nid, (void *)store);
668
669 /*
670 * If a property query string is provided, convert it to an
671 * OSSL_PROPERTY_LIST structure
672 */
673 if (prop_query != NULL)
674 p2 = pq = ossl_parse_query(store->ctx, prop_query, 0);
675
676 /*
677 * If the library context has default properties specified
678 * then merge those with the properties passed to this function
679 */
680 plp = ossl_ctx_global_properties(store->ctx, 0);
681 if (plp != NULL && *plp != NULL) {
682 if (pq == NULL) {
683 pq = *plp;
684 } else {
685 p2 = ossl_property_merge(pq, *plp);
686 ossl_property_free(pq);
687 if (p2 == NULL)
688 goto fin;
689 pq = p2;
690 }
691 }
692
693 /*
694 * Search for a provider that provides this implementation.
695 * If the requested provider is NULL, then any provider will do,
696 * otherwise we should try to find the one that matches the requested
697 * provider. Note that providers are given implicit preference via the
698 * ordering of the implementation stack
699 */
700 if (pq == NULL) {
701 for (j = 0; j < sk_IMPLEMENTATION_num(alg->impls); j++) {
702 if ((impl = sk_IMPLEMENTATION_value(alg->impls, j)) != NULL
703 && (prov == NULL || impl->provider == prov)) {
704 best_impl = impl;
705 ret = 1;
706 break;
707 }
708 }
709 goto fin;
710 }
711
712 /*
713 * If there are optional properties specified
714 * then run the search again, and select the provider that matches the
715 * most options
716 */
717 optional = ossl_property_has_optional(pq);
718 for (j = 0; j < sk_IMPLEMENTATION_num(alg->impls); j++) {
719 if ((impl = sk_IMPLEMENTATION_value(alg->impls, j)) != NULL
720 && (prov == NULL || impl->provider == prov)) {
721 score = ossl_property_match_count(pq, impl->properties);
722 if (score > best) {
723 best_impl = impl;
724 best = score;
725 ret = 1;
726 if (!optional)
727 goto fin;
728 }
729 }
730 }
731 fin:
732 if (ret && ossl_method_up_ref(&best_impl->method)) {
733 *method = best_impl->method.method;
734 if (prov_rw != NULL)
735 *prov_rw = best_impl->provider;
736 } else {
737 ret = 0;
738 }
739
740 #ifndef FIPS_MODULE
741 OSSL_TRACE_BEGIN(QUERY)
742 {
743 char buf[512];
744 int size;
745
746 size = ossl_property_list_to_string(NULL, pq, buf, 512);
747 BIO_printf(trc_out, "method store query with properties %s "
748 "resolves to provider %s\n",
749 size == 0 ? "none" : buf,
750 best_impl == NULL ? "none" : ossl_provider_name(best_impl->provider));
751 }
752 OSSL_TRACE_END(QUERY);
753 #endif
754
755 ossl_property_unlock(store);
756 ossl_property_free(p2);
757 return ret;
758 }
759
ossl_method_cache_flush_alg(OSSL_METHOD_STORE * store,ALGORITHM * alg)760 static void ossl_method_cache_flush_alg(OSSL_METHOD_STORE *store,
761 ALGORITHM *alg)
762 {
763 store->cache_nelem -= lh_QUERY_num_items(alg->cache);
764 impl_cache_flush_alg(0, alg);
765 }
766
ossl_method_cache_flush(OSSL_METHOD_STORE * store,int nid)767 static void ossl_method_cache_flush(OSSL_METHOD_STORE *store, int nid)
768 {
769 ALGORITHM *alg = ossl_method_store_retrieve(store, nid);
770
771 if (alg != NULL)
772 ossl_method_cache_flush_alg(store, alg);
773 }
774
ossl_method_store_cache_flush_all(OSSL_METHOD_STORE * store)775 int ossl_method_store_cache_flush_all(OSSL_METHOD_STORE *store)
776 {
777 if (!ossl_property_write_lock(store))
778 return 0;
779 ossl_sa_ALGORITHM_doall(store->algs, &impl_cache_flush_alg);
780 store->cache_nelem = 0;
781 ossl_property_unlock(store);
782 return 1;
783 }
784
785 IMPLEMENT_LHASH_DOALL_ARG(QUERY, IMPL_CACHE_FLUSH);
786
787 /*
788 * Flush an element from the query cache (perhaps).
789 *
790 * In order to avoid taking a write lock or using atomic operations
791 * to keep accurate least recently used (LRU) or least frequently used
792 * (LFU) information, the procedure used here is to stochastically
793 * flush approximately half the cache.
794 *
795 * This procedure isn't ideal, LRU or LFU would be better. However,
796 * in normal operation, reaching a full cache would be unexpected.
797 * It means that no steady state of algorithm queries has been reached.
798 * That is, it is most likely an attack of some form. A suboptimal clearance
799 * strategy that doesn't degrade performance of the normal case is
800 * preferable to a more refined approach that imposes a performance
801 * impact.
802 */
impl_cache_flush_cache(QUERY * c,IMPL_CACHE_FLUSH * state)803 static void impl_cache_flush_cache(QUERY *c, IMPL_CACHE_FLUSH *state)
804 {
805 uint32_t n;
806
807 /*
808 * Implement the 32 bit xorshift as suggested by George Marsaglia in:
809 * https://doi.org/10.18637/jss.v008.i14
810 *
811 * This is a very fast PRNG so there is no need to extract bits one at a
812 * time and use the entire value each time.
813 */
814 n = state->seed;
815 n ^= n << 13;
816 n ^= n >> 17;
817 n ^= n << 5;
818 state->seed = n;
819
820 if ((n & 1) != 0)
821 impl_cache_free(lh_QUERY_delete(state->cache, c));
822 else
823 state->nelem++;
824 }
825
impl_cache_flush_one_alg(ossl_uintmax_t idx,ALGORITHM * alg,void * v)826 static void impl_cache_flush_one_alg(ossl_uintmax_t idx, ALGORITHM *alg,
827 void *v)
828 {
829 IMPL_CACHE_FLUSH *state = (IMPL_CACHE_FLUSH *)v;
830 unsigned long orig_down_load = lh_QUERY_get_down_load(alg->cache);
831
832 state->cache = alg->cache;
833 lh_QUERY_set_down_load(alg->cache, 0);
834 lh_QUERY_doall_IMPL_CACHE_FLUSH(state->cache, &impl_cache_flush_cache,
835 state);
836 lh_QUERY_set_down_load(alg->cache, orig_down_load);
837 }
838
ossl_method_cache_flush_some(OSSL_METHOD_STORE * store)839 static void ossl_method_cache_flush_some(OSSL_METHOD_STORE *store)
840 {
841 IMPL_CACHE_FLUSH state;
842 static TSAN_QUALIFIER uint32_t global_seed = 1;
843
844 state.nelem = 0;
845 state.using_global_seed = 0;
846 if ((state.seed = OPENSSL_rdtsc()) == 0) {
847 /* If there is no timer available, seed another way */
848 state.using_global_seed = 1;
849 state.seed = tsan_load(&global_seed);
850 }
851 store->cache_need_flush = 0;
852 ossl_sa_ALGORITHM_doall_arg(store->algs, &impl_cache_flush_one_alg, &state);
853 store->cache_nelem = state.nelem;
854 /* Without a timer, update the global seed */
855 if (state.using_global_seed)
856 tsan_add(&global_seed, state.seed);
857 }
858
ossl_method_store_cache_get(OSSL_METHOD_STORE * store,OSSL_PROVIDER * prov,int nid,const char * prop_query,void ** method)859 int ossl_method_store_cache_get(OSSL_METHOD_STORE *store, OSSL_PROVIDER *prov,
860 int nid, const char *prop_query, void **method)
861 {
862 ALGORITHM *alg;
863 QUERY elem, *r;
864 int res = 0;
865
866 if (nid <= 0 || store == NULL || prop_query == NULL)
867 return 0;
868
869 if (!ossl_property_read_lock(store))
870 return 0;
871 alg = ossl_method_store_retrieve(store, nid);
872 if (alg == NULL)
873 goto err;
874
875 elem.query = prop_query;
876 elem.provider = prov;
877 r = lh_QUERY_retrieve(alg->cache, &elem);
878 if (r == NULL)
879 goto err;
880 if (ossl_method_up_ref(&r->method)) {
881 *method = r->method.method;
882 res = 1;
883 }
884 err:
885 ossl_property_unlock(store);
886 return res;
887 }
888
ossl_method_store_cache_set(OSSL_METHOD_STORE * store,OSSL_PROVIDER * prov,int nid,const char * prop_query,void * method,int (* method_up_ref)(void *),void (* method_destruct)(void *))889 int ossl_method_store_cache_set(OSSL_METHOD_STORE *store, OSSL_PROVIDER *prov,
890 int nid, const char *prop_query, void *method,
891 int (*method_up_ref)(void *),
892 void (*method_destruct)(void *))
893 {
894 QUERY elem, *old, *p = NULL;
895 ALGORITHM *alg;
896 size_t len;
897 int res = 1;
898
899 if (nid <= 0 || store == NULL || prop_query == NULL)
900 return 0;
901
902 if (!ossl_assert(prov != NULL))
903 return 0;
904
905 if (!ossl_property_write_lock(store))
906 return 0;
907 if (store->cache_need_flush)
908 ossl_method_cache_flush_some(store);
909 alg = ossl_method_store_retrieve(store, nid);
910 if (alg == NULL)
911 goto err;
912
913 if (method == NULL) {
914 elem.query = prop_query;
915 elem.provider = prov;
916 if ((old = lh_QUERY_delete(alg->cache, &elem)) != NULL) {
917 impl_cache_free(old);
918 store->cache_nelem--;
919 }
920 goto end;
921 }
922 p = OPENSSL_malloc(sizeof(*p) + (len = strlen(prop_query)));
923 if (p != NULL) {
924 p->query = p->body;
925 p->provider = prov;
926 p->method.method = method;
927 p->method.up_ref = method_up_ref;
928 p->method.free = method_destruct;
929 if (!ossl_method_up_ref(&p->method))
930 goto err;
931 memcpy((char *)p->query, prop_query, len + 1);
932 if ((old = lh_QUERY_insert(alg->cache, p)) != NULL) {
933 impl_cache_free(old);
934 goto end;
935 }
936 if (!lh_QUERY_error(alg->cache)) {
937 if (++store->cache_nelem >= IMPL_CACHE_FLUSH_THRESHOLD)
938 store->cache_need_flush = 1;
939 goto end;
940 }
941 ossl_method_free(&p->method);
942 }
943 err:
944 res = 0;
945 OPENSSL_free(p);
946 end:
947 ossl_property_unlock(store);
948 return res;
949 }
950