mirror of
https://github.com/MariaDB/server.git
synced 2025-01-30 02:30:06 +01:00
4b0ac5a12b
Based on FreeBSD patch. The FreeBSD inclusion of check_openssl_compatibility prevented any use of the crypto callbacks and as such the later differences where ignored. The later differences in coc_malloc didn't propegate to the other callback functions of CRYPTO_set_mem_functions where a reduced argument list also applied. Looking where[2] libressl added the functions it was of the same prototype 10 years ago so omitting any version check. [1]a34cf9c2db/databases/mariadb106-server/files/patch-mysys__ssl_openssl.c
[2]5ebad8acea (diff-7f393e5489e6c5780773408f11ca27d9b3bb8f55b174631a1e9467a1dd3010b9R22)
98 lines
2.4 KiB
C
98 lines
2.4 KiB
C
/*
|
|
Copyright (c) 2017, MariaDB Corporation.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
|
|
|
|
#include <my_global.h>
|
|
#include <openssl/evp.h>
|
|
#include <ssl_compat.h>
|
|
|
|
/*
|
|
The check is only done for OpenSSL 1.1.x.
|
|
It could run for OpenSSL 1.0.x but it doesn't make much sense
|
|
and it hits this bug:
|
|
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1594748
|
|
*/
|
|
|
|
#ifndef HAVE_OPENSSL11
|
|
int check_openssl_compatibility()
|
|
{
|
|
return 0;
|
|
}
|
|
#else
|
|
#include <openssl/evp.h>
|
|
|
|
static uint testing;
|
|
static size_t alloc_size, alloc_count;
|
|
|
|
static void *coc_malloc(size_t size
|
|
#ifndef LIBRESSL_VERSION_NUMBER
|
|
, const char *f __attribute__((unused)),
|
|
int l __attribute__((unused))
|
|
#endif
|
|
)
|
|
{
|
|
if (unlikely(testing))
|
|
{
|
|
alloc_size+= size;
|
|
alloc_count++;
|
|
}
|
|
return malloc(size);
|
|
}
|
|
|
|
static void *coc_realloc(void *addr, size_t num
|
|
#ifndef LIBRESSL_VERSION_NUMBER
|
|
, const char *file __attribute__((unused)),
|
|
int line __attribute__((unused))
|
|
#endif
|
|
)
|
|
{
|
|
return realloc(addr, num);
|
|
}
|
|
|
|
static void coc_free(void *addr
|
|
#ifndef LIBRESSL_VERSION_NUMBER
|
|
, const char *file __attribute__((unused)),
|
|
int line __attribute__((unused))
|
|
#endif
|
|
)
|
|
{
|
|
free(addr);
|
|
}
|
|
|
|
int check_openssl_compatibility()
|
|
{
|
|
EVP_CIPHER_CTX *evp_ctx;
|
|
EVP_MD_CTX *md5_ctx;
|
|
|
|
if (!CRYPTO_set_mem_functions(coc_malloc, coc_realloc, coc_free))
|
|
return 0;
|
|
|
|
testing= 1;
|
|
alloc_size= alloc_count= 0;
|
|
evp_ctx= EVP_CIPHER_CTX_new();
|
|
EVP_CIPHER_CTX_free(evp_ctx);
|
|
if (alloc_count != 1 || !alloc_size || alloc_size > EVP_CIPHER_CTX_SIZE)
|
|
return 1;
|
|
|
|
alloc_size= alloc_count= 0;
|
|
md5_ctx= EVP_MD_CTX_new();
|
|
EVP_MD_CTX_free(md5_ctx);
|
|
if (alloc_count != 1 || !alloc_size || alloc_size > EVP_MD_CTX_SIZE)
|
|
return 1;
|
|
|
|
testing= 0;
|
|
return 0;
|
|
}
|
|
#endif
|