xref: /freebsd/crypto/openssl/crypto/engine/eng_dyn.c (revision f25b8c9fb4f58cf61adb47d7570abe7caa6d385d)
1 /*
2  * Copyright 2001-2022 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 /* We need to use some engine deprecated APIs */
11 #define OPENSSL_SUPPRESS_DEPRECATED
12 
13 #include "eng_local.h"
14 #include "internal/dso.h"
15 #include <openssl/crypto.h>
16 
17 /*
18  * Shared libraries implementing ENGINEs for use by the "dynamic" ENGINE
19  * loader should implement the hook-up functions with the following
20  * prototypes.
21  */
22 
23 /* Our ENGINE handlers */
24 static int dynamic_init(ENGINE *e);
25 static int dynamic_finish(ENGINE *e);
26 static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p,
27     void (*f)(void));
28 /* Predeclare our context type */
29 typedef struct st_dynamic_data_ctx dynamic_data_ctx;
30 /* The implementation for the important control command */
31 static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx);
32 
33 #define DYNAMIC_CMD_SO_PATH ENGINE_CMD_BASE
34 #define DYNAMIC_CMD_NO_VCHECK (ENGINE_CMD_BASE + 1)
35 #define DYNAMIC_CMD_ID (ENGINE_CMD_BASE + 2)
36 #define DYNAMIC_CMD_LIST_ADD (ENGINE_CMD_BASE + 3)
37 #define DYNAMIC_CMD_DIR_LOAD (ENGINE_CMD_BASE + 4)
38 #define DYNAMIC_CMD_DIR_ADD (ENGINE_CMD_BASE + 5)
39 #define DYNAMIC_CMD_LOAD (ENGINE_CMD_BASE + 6)
40 
41 /* The constants used when creating the ENGINE */
42 static const char *engine_dynamic_id = "dynamic";
43 static const char *engine_dynamic_name = "Dynamic engine loading support";
44 static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = {
45     { DYNAMIC_CMD_SO_PATH,
46         "SO_PATH",
47         "Specifies the path to the new ENGINE shared library",
48         ENGINE_CMD_FLAG_STRING },
49     { DYNAMIC_CMD_NO_VCHECK,
50         "NO_VCHECK",
51         "Specifies to continue even if version checking fails (boolean)",
52         ENGINE_CMD_FLAG_NUMERIC },
53     { DYNAMIC_CMD_ID,
54         "ID",
55         "Specifies an ENGINE id name for loading",
56         ENGINE_CMD_FLAG_STRING },
57     { DYNAMIC_CMD_LIST_ADD,
58         "LIST_ADD",
59         "Whether to add a loaded ENGINE to the internal list (0=no,1=yes,2=mandatory)",
60         ENGINE_CMD_FLAG_NUMERIC },
61     { DYNAMIC_CMD_DIR_LOAD,
62         "DIR_LOAD",
63         "Specifies whether to load from 'DIR_ADD' directories (0=no,1=yes,2=mandatory)",
64         ENGINE_CMD_FLAG_NUMERIC },
65     { DYNAMIC_CMD_DIR_ADD,
66         "DIR_ADD",
67         "Adds a directory from which ENGINEs can be loaded",
68         ENGINE_CMD_FLAG_STRING },
69     { DYNAMIC_CMD_LOAD,
70         "LOAD",
71         "Load up the ENGINE specified by other settings",
72         ENGINE_CMD_FLAG_NO_INPUT },
73     { 0, NULL, NULL, 0 }
74 };
75 
76 /*
77  * Loading code stores state inside the ENGINE structure via the "ex_data"
78  * element. We load all our state into a single structure and use that as a
79  * single context in the "ex_data" stack.
80  */
81 struct st_dynamic_data_ctx {
82     /* The DSO object we load that supplies the ENGINE code */
83     DSO *dynamic_dso;
84     /*
85      * The function pointer to the version checking shared library function
86      */
87     dynamic_v_check_fn v_check;
88     /*
89      * The function pointer to the engine-binding shared library function
90      */
91     dynamic_bind_engine bind_engine;
92     /* The default name/path for loading the shared library */
93     char *DYNAMIC_LIBNAME;
94     /* Whether to continue loading on a version check failure */
95     int no_vcheck;
96     /* If non-NULL, stipulates the 'id' of the ENGINE to be loaded */
97     char *engine_id;
98     /*
99      * If non-zero, a successfully loaded ENGINE should be added to the
100      * internal ENGINE list. If 2, the add must succeed or the entire load
101      * should fail.
102      */
103     int list_add_value;
104     /* The symbol name for the version checking function */
105     const char *DYNAMIC_F1;
106     /* The symbol name for the "initialise ENGINE structure" function */
107     const char *DYNAMIC_F2;
108     /*
109      * Whether to never use 'dirs', use 'dirs' as a fallback, or only use
110      * 'dirs' for loading. Default is to use 'dirs' as a fallback.
111      */
112     int dir_load;
113     /* A stack of directories from which ENGINEs could be loaded */
114     STACK_OF(OPENSSL_STRING) *dirs;
115 };
116 
117 /*
118  * This is the "ex_data" index we obtain and reserve for use with our context
119  * structure.
120  */
121 static int dynamic_ex_data_idx = -1;
122 
int_free_str(char * s)123 static void int_free_str(char *s)
124 {
125     OPENSSL_free(s);
126 }
127 
128 /*
129  * Because our ex_data element may or may not get allocated depending on
130  * whether a "first-use" occurs before the ENGINE is freed, we have a memory
131  * leak problem to solve. We can't declare a "new" handler for the ex_data as
132  * we don't want a dynamic_data_ctx in *all* ENGINE structures of all types
133  * (this is a bug in the design of CRYPTO_EX_DATA). As such, we just declare
134  * a "free" handler and that will get called if an ENGINE is being destroyed
135  * and there was an ex_data element corresponding to our context type.
136  */
dynamic_data_ctx_free_func(void * parent,void * ptr,CRYPTO_EX_DATA * ad,int idx,long argl,void * argp)137 static void dynamic_data_ctx_free_func(void *parent, void *ptr,
138     CRYPTO_EX_DATA *ad, int idx, long argl,
139     void *argp)
140 {
141     if (ptr) {
142         dynamic_data_ctx *ctx = (dynamic_data_ctx *)ptr;
143         DSO_free(ctx->dynamic_dso);
144         OPENSSL_free(ctx->DYNAMIC_LIBNAME);
145         OPENSSL_free(ctx->engine_id);
146         sk_OPENSSL_STRING_pop_free(ctx->dirs, int_free_str);
147         OPENSSL_free(ctx);
148     }
149 }
150 
151 /*
152  * Construct the per-ENGINE context. We create it blindly and then use a lock
153  * to check for a race - if so, all but one of the threads "racing" will have
154  * wasted their time. The alternative involves creating everything inside the
155  * lock which is far worse.
156  */
dynamic_set_data_ctx(ENGINE * e,dynamic_data_ctx ** ctx)157 static int dynamic_set_data_ctx(ENGINE *e, dynamic_data_ctx **ctx)
158 {
159     dynamic_data_ctx *c = OPENSSL_zalloc(sizeof(*c));
160     int ret = 0;
161 
162     if (c == NULL)
163         return 0;
164     c->dirs = sk_OPENSSL_STRING_new_null();
165     if (c->dirs == NULL) {
166         ERR_raise(ERR_LIB_ENGINE, ERR_R_CRYPTO_LIB);
167         goto end;
168     }
169     c->DYNAMIC_F1 = "v_check";
170     c->DYNAMIC_F2 = "bind_engine";
171     c->dir_load = 1;
172     if (!CRYPTO_THREAD_write_lock(global_engine_lock))
173         goto end;
174     if ((*ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e,
175              dynamic_ex_data_idx))
176         == NULL) {
177         /* Good, we're the first */
178         ret = ENGINE_set_ex_data(e, dynamic_ex_data_idx, c);
179         if (ret) {
180             *ctx = c;
181             c = NULL;
182         }
183     }
184     CRYPTO_THREAD_unlock(global_engine_lock);
185     ret = 1;
186     /*
187      * If we lost the race to set the context, c is non-NULL and *ctx is the
188      * context of the thread that won.
189      */
190 end:
191     if (c != NULL)
192         sk_OPENSSL_STRING_free(c->dirs);
193     OPENSSL_free(c);
194     return ret;
195 }
196 
197 /*
198  * This function retrieves the context structure from an ENGINE's "ex_data",
199  * or if it doesn't exist yet, sets it up.
200  */
dynamic_get_data_ctx(ENGINE * e)201 static dynamic_data_ctx *dynamic_get_data_ctx(ENGINE *e)
202 {
203     dynamic_data_ctx *ctx;
204     if (dynamic_ex_data_idx < 0) {
205         /*
206          * Create and register the ENGINE ex_data, and associate our "free"
207          * function with it to ensure any allocated contexts get freed when
208          * an ENGINE goes underground.
209          */
210         int new_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL,
211             dynamic_data_ctx_free_func);
212         if (new_idx == -1) {
213             ERR_raise(ERR_LIB_ENGINE, ENGINE_R_NO_INDEX);
214             return NULL;
215         }
216         if (!CRYPTO_THREAD_write_lock(global_engine_lock))
217             return NULL;
218         /* Avoid a race by checking again inside this lock */
219         if (dynamic_ex_data_idx < 0) {
220             /* Good, someone didn't beat us to it */
221             dynamic_ex_data_idx = new_idx;
222             new_idx = -1;
223         }
224         CRYPTO_THREAD_unlock(global_engine_lock);
225         /*
226          * In theory we could "give back" the index here if (new_idx>-1), but
227          * it's not possible and wouldn't gain us much if it were.
228          */
229     }
230     ctx = (dynamic_data_ctx *)ENGINE_get_ex_data(e, dynamic_ex_data_idx);
231     /* Check if the context needs to be created */
232     if ((ctx == NULL) && !dynamic_set_data_ctx(e, &ctx))
233         /* "set_data" will set errors if necessary */
234         return NULL;
235     return ctx;
236 }
237 
engine_dynamic(void)238 static ENGINE *engine_dynamic(void)
239 {
240     ENGINE *ret = ENGINE_new();
241     if (ret == NULL)
242         return NULL;
243     if (!ENGINE_set_id(ret, engine_dynamic_id) || !ENGINE_set_name(ret, engine_dynamic_name) || !ENGINE_set_init_function(ret, dynamic_init) || !ENGINE_set_finish_function(ret, dynamic_finish) || !ENGINE_set_ctrl_function(ret, dynamic_ctrl) || !ENGINE_set_flags(ret, ENGINE_FLAGS_BY_ID_COPY) || !ENGINE_set_cmd_defns(ret, dynamic_cmd_defns)) {
244         ENGINE_free(ret);
245         return NULL;
246     }
247     return ret;
248 }
249 
engine_load_dynamic_int(void)250 void engine_load_dynamic_int(void)
251 {
252     ENGINE *toadd = engine_dynamic();
253     if (!toadd)
254         return;
255 
256     ERR_set_mark();
257     ENGINE_add(toadd);
258     /*
259      * If the "add" worked, it gets a structural reference. So either way, we
260      * release our just-created reference.
261      */
262     ENGINE_free(toadd);
263     /*
264      * If the "add" didn't work, it was probably a conflict because it was
265      * already added (eg. someone calling ENGINE_load_blah then calling
266      * ENGINE_load_builtin_engines() perhaps).
267      */
268     ERR_pop_to_mark();
269 }
270 
dynamic_init(ENGINE * e)271 static int dynamic_init(ENGINE *e)
272 {
273     /*
274      * We always return failure - the "dynamic" engine itself can't be used
275      * for anything.
276      */
277     return 0;
278 }
279 
dynamic_finish(ENGINE * e)280 static int dynamic_finish(ENGINE *e)
281 {
282     /*
283      * This should never be called on account of "dynamic_init" always
284      * failing.
285      */
286     return 0;
287 }
288 
dynamic_ctrl(ENGINE * e,int cmd,long i,void * p,void (* f)(void))289 static int dynamic_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void))
290 {
291     dynamic_data_ctx *ctx = dynamic_get_data_ctx(e);
292     int initialised;
293 
294     if (!ctx) {
295         ERR_raise(ERR_LIB_ENGINE, ENGINE_R_NOT_LOADED);
296         return 0;
297     }
298     initialised = ((ctx->dynamic_dso == NULL) ? 0 : 1);
299     /* All our control commands require the ENGINE to be uninitialised */
300     if (initialised) {
301         ERR_raise(ERR_LIB_ENGINE, ENGINE_R_ALREADY_LOADED);
302         return 0;
303     }
304     switch (cmd) {
305     case DYNAMIC_CMD_SO_PATH:
306         /* a NULL 'p' or a string of zero-length is the same thing */
307         if (p && (strlen((const char *)p) < 1))
308             p = NULL;
309         OPENSSL_free(ctx->DYNAMIC_LIBNAME);
310         if (p)
311             ctx->DYNAMIC_LIBNAME = OPENSSL_strdup(p);
312         else
313             ctx->DYNAMIC_LIBNAME = NULL;
314         return (ctx->DYNAMIC_LIBNAME ? 1 : 0);
315     case DYNAMIC_CMD_NO_VCHECK:
316         ctx->no_vcheck = ((i == 0) ? 0 : 1);
317         return 1;
318     case DYNAMIC_CMD_ID:
319         /* a NULL 'p' or a string of zero-length is the same thing */
320         if (p && (strlen((const char *)p) < 1))
321             p = NULL;
322         OPENSSL_free(ctx->engine_id);
323         if (p)
324             ctx->engine_id = OPENSSL_strdup(p);
325         else
326             ctx->engine_id = NULL;
327         return (ctx->engine_id ? 1 : 0);
328     case DYNAMIC_CMD_LIST_ADD:
329         if ((i < 0) || (i > 2)) {
330             ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
331             return 0;
332         }
333         ctx->list_add_value = (int)i;
334         return 1;
335     case DYNAMIC_CMD_LOAD:
336         return dynamic_load(e, ctx);
337     case DYNAMIC_CMD_DIR_LOAD:
338         if ((i < 0) || (i > 2)) {
339             ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
340             return 0;
341         }
342         ctx->dir_load = (int)i;
343         return 1;
344     case DYNAMIC_CMD_DIR_ADD:
345         /* a NULL 'p' or a string of zero-length is the same thing */
346         if (p == NULL || (strlen((const char *)p) < 1)) {
347             ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INVALID_ARGUMENT);
348             return 0;
349         }
350         {
351             char *tmp_str = OPENSSL_strdup(p);
352             if (tmp_str == NULL)
353                 return 0;
354             if (!sk_OPENSSL_STRING_push(ctx->dirs, tmp_str)) {
355                 OPENSSL_free(tmp_str);
356                 ERR_raise(ERR_LIB_ENGINE, ERR_R_CRYPTO_LIB);
357                 return 0;
358             }
359         }
360         return 1;
361     default:
362         break;
363     }
364     ERR_raise(ERR_LIB_ENGINE, ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED);
365     return 0;
366 }
367 
int_load(dynamic_data_ctx * ctx)368 static int int_load(dynamic_data_ctx *ctx)
369 {
370     int num, loop;
371     /* Unless told not to, try a direct load */
372     if ((ctx->dir_load != 2) && (DSO_load(ctx->dynamic_dso, ctx->DYNAMIC_LIBNAME, NULL, 0)) != NULL)
373         return 1;
374     /* If we're not allowed to use 'dirs' or we have none, fail */
375     if (!ctx->dir_load || (num = sk_OPENSSL_STRING_num(ctx->dirs)) < 1)
376         return 0;
377     for (loop = 0; loop < num; loop++) {
378         const char *s = sk_OPENSSL_STRING_value(ctx->dirs, loop);
379         char *merge = DSO_merge(ctx->dynamic_dso, ctx->DYNAMIC_LIBNAME, s);
380         if (!merge)
381             return 0;
382         if (DSO_load(ctx->dynamic_dso, merge, NULL, 0)) {
383             /* Found what we're looking for */
384             OPENSSL_free(merge);
385             return 1;
386         }
387         OPENSSL_free(merge);
388     }
389     return 0;
390 }
391 
392 /*
393  * Unfortunately the version checker does not distinguish between
394  * engines built for openssl 1.1.x and openssl 3.x, but loading
395  * an engine that is built for openssl 1.1.x will cause a fatal
396  * error.  Detect such engines, since EVP_PKEY_base_id is exported
397  * as a function in openssl 1.1.x, while it is named EVP_PKEY_get_base_id
398  * in openssl 3.x.  Therefore we take the presence of that symbol
399  * as an indication that the engine will be incompatible.
400  */
using_libcrypto_11(dynamic_data_ctx * ctx)401 static int using_libcrypto_11(dynamic_data_ctx *ctx)
402 {
403     int ret;
404 
405     ERR_set_mark();
406     ret = DSO_bind_func(ctx->dynamic_dso, "EVP_PKEY_base_id") != NULL;
407     ERR_pop_to_mark();
408 
409     return ret;
410 }
411 
dynamic_load(ENGINE * e,dynamic_data_ctx * ctx)412 static int dynamic_load(ENGINE *e, dynamic_data_ctx *ctx)
413 {
414     ENGINE cpy;
415     dynamic_fns fns;
416 
417     if (ctx->dynamic_dso == NULL)
418         ctx->dynamic_dso = DSO_new();
419     if (ctx->dynamic_dso == NULL)
420         return 0;
421     if (!ctx->DYNAMIC_LIBNAME) {
422         if (!ctx->engine_id)
423             return 0;
424         DSO_ctrl(ctx->dynamic_dso, DSO_CTRL_SET_FLAGS,
425             DSO_FLAG_NAME_TRANSLATION_EXT_ONLY, NULL);
426         ctx->DYNAMIC_LIBNAME = DSO_convert_filename(ctx->dynamic_dso, ctx->engine_id);
427     }
428     if (!int_load(ctx)) {
429         ERR_raise(ERR_LIB_ENGINE, ENGINE_R_DSO_NOT_FOUND);
430         DSO_free(ctx->dynamic_dso);
431         ctx->dynamic_dso = NULL;
432         return 0;
433     }
434     /* We have to find a bind function otherwise it'll always end badly */
435     if (!(ctx->bind_engine = (dynamic_bind_engine)DSO_bind_func(ctx->dynamic_dso,
436               ctx->DYNAMIC_F2))) {
437         ctx->bind_engine = NULL;
438         DSO_free(ctx->dynamic_dso);
439         ctx->dynamic_dso = NULL;
440         ERR_raise(ERR_LIB_ENGINE, ENGINE_R_DSO_FAILURE);
441         return 0;
442     }
443     /* Do we perform version checking? */
444     if (!ctx->no_vcheck) {
445         unsigned long vcheck_res = 0;
446         /*
447          * Now we try to find a version checking function and decide how to
448          * cope with failure if/when it fails.
449          */
450         ctx->v_check = (dynamic_v_check_fn)DSO_bind_func(ctx->dynamic_dso,
451             ctx->DYNAMIC_F1);
452         if (ctx->v_check)
453             vcheck_res = ctx->v_check(OSSL_DYNAMIC_VERSION);
454         /*
455          * We fail if the version checker veto'd the load *or* if it is
456          * deferring to us (by returning its version) and we think it is too
457          * old. Also fail if this is engine for openssl 1.1.x.
458          */
459         if (vcheck_res < OSSL_DYNAMIC_OLDEST || using_libcrypto_11(ctx)) {
460             /* Fail */
461             ctx->bind_engine = NULL;
462             ctx->v_check = NULL;
463             DSO_free(ctx->dynamic_dso);
464             ctx->dynamic_dso = NULL;
465             ERR_raise(ERR_LIB_ENGINE, ENGINE_R_VERSION_INCOMPATIBILITY);
466             return 0;
467         }
468     }
469     /*
470      * First binary copy the ENGINE structure so that we can roll back if the
471      * hand-over fails
472      */
473     memcpy(&cpy, e, sizeof(ENGINE));
474     /*
475      * Provide the ERR, "ex_data", memory, and locking callbacks so the
476      * loaded library uses our state rather than its own. FIXME: As noted in
477      * engine.h, much of this would be simplified if each area of code
478      * provided its own "summary" structure of all related callbacks. It
479      * would also increase opaqueness.
480      */
481     fns.static_state = ENGINE_get_static_state();
482     CRYPTO_get_mem_functions(&fns.mem_fns.malloc_fn, &fns.mem_fns.realloc_fn,
483         &fns.mem_fns.free_fn);
484     /*
485      * Now that we've loaded the dynamic engine, make sure no "dynamic"
486      * ENGINE elements will show through.
487      */
488     engine_set_all_null(e);
489 
490     /* Try to bind the ENGINE onto our own ENGINE structure */
491     if (!engine_add_dynamic_id(e, (ENGINE_DYNAMIC_ID)ctx->bind_engine, 1)
492         || !ctx->bind_engine(e, ctx->engine_id, &fns)) {
493         engine_remove_dynamic_id(e, 1);
494         ctx->bind_engine = NULL;
495         ctx->v_check = NULL;
496         DSO_free(ctx->dynamic_dso);
497         ctx->dynamic_dso = NULL;
498         ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INIT_FAILED);
499         /* Copy the original ENGINE structure back */
500         memcpy(e, &cpy, sizeof(ENGINE));
501         return 0;
502     }
503     /* Do we try to add this ENGINE to the internal list too? */
504     if (ctx->list_add_value > 0) {
505         if (!ENGINE_add(e)) {
506             /* Do we tolerate this or fail? */
507             if (ctx->list_add_value > 1) {
508                 /*
509                  * Fail - NB: By this time, it's too late to rollback, and
510                  * trying to do so allows the bind_engine() code to have
511                  * created leaks. We just have to fail where we are, after
512                  * the ENGINE has changed.
513                  */
514                 ERR_raise(ERR_LIB_ENGINE, ENGINE_R_CONFLICTING_ENGINE_ID);
515                 return 0;
516             }
517             /* Tolerate */
518             ERR_clear_error();
519         }
520     }
521     return 1;
522 }
523