}
#endif
-#define err_clear_data(p, i) \
- do { \
- if ((p)->err_data_flags[i] & ERR_TXT_MALLOCED) {\
- OPENSSL_free((p)->err_data[i]); \
- (p)->err_data[i] = NULL; \
- } \
- (p)->err_data_flags[i] = 0; \
+#define err_get_slot(p) \
+ do { \
+ (p)->top = ((p)->top + 1) % ERR_NUM_ERRORS; \
+ if ((p)->top == (p)->bottom) \
+ (p)->bottom = ((p)->bottom + 1) % ERR_NUM_ERRORS; \
+ } while (0)
+
+#define err_clear_data(p, i, deall) \
+ do { \
+ if ((p)->err_data_flags[i] & ERR_TXT_MALLOCED) { \
+ if (deall) { \
+ OPENSSL_free((p)->err_data[i]); \
+ (p)->err_data[i] = NULL; \
+ (p)->err_data_size[i] = 0; \
+ (p)->err_data_flags[i] = 0; \
+ } else if ((p)->err_data[i] != NULL) { \
+ (p)->err_data[i][0] = '\0'; \
+ } \
+ } else { \
+ (p)->err_data[i] = NULL; \
+ (p)->err_data_size[i] = 0; \
+ (p)->err_data_flags[i] = 0; \
+ } \
} while (0)
-#define err_clear(p, i) \
+#define err_clear(p, i, deall) \
do { \
- err_clear_data(p, i); \
+ err_clear_data((p), (i), (deall)); \
(p)->err_flags[i] = 0; \
(p)->err_buffer[i] = 0; \
(p)->err_file[i] = NULL; \
if (s == NULL)
return;
for (i = 0; i < ERR_NUM_ERRORS; i++) {
- err_clear_data(s, i);
+ err_clear_data(s, i, 1);
}
OPENSSL_free(s);
}
if (es == NULL)
return;
- es->top = (es->top + 1) % ERR_NUM_ERRORS;
- if (es->top == es->bottom)
- es->bottom = (es->bottom + 1) % ERR_NUM_ERRORS;
- es->err_flags[es->top] = 0;
+ err_get_slot(es);
+ err_clear(es, es->top, 0);
es->err_buffer[es->top] = ERR_PACK(lib, func, reason);
es->err_file[es->top] = file;
es->err_line[es->top] = line;
- err_clear_data(es, es->top);
}
void ERR_clear_error(void)
return;
for (i = 0; i < ERR_NUM_ERRORS; i++) {
- err_clear(es, i);
+ err_clear(es, i, 0);
}
es->top = es->bottom = 0;
}
while (es->bottom != es->top) {
if (es->err_flags[es->top] & ERR_FLAG_CLEAR) {
- err_clear(es, es->top);
+ err_clear(es, es->top, 0);
es->top = es->top > 0 ? es->top - 1 : ERR_NUM_ERRORS - 1;
continue;
}
i = (es->bottom + 1) % ERR_NUM_ERRORS;
if (es->err_flags[i] & ERR_FLAG_CLEAR) {
es->bottom = i;
- err_clear(es, es->bottom);
+ err_clear(es, es->bottom, 0);
continue;
}
break;
if (data == NULL) {
if (inc) {
- err_clear_data(es, i);
+ err_clear_data(es, i, 0);
}
} else {
if (es->err_data[i] == NULL) {
return ret;
}
-static int err_set_error_data_int(char *data, int flags)
+static int err_set_error_data_int(char *data, size_t size, int flags,
+ int deallocate)
{
ERR_STATE *es;
int i;
i = es->top;
- err_clear_data(es, i);
+ err_clear_data(es, es->top, deallocate);
es->err_data[i] = data;
+ es->err_data_size[i] = size;
es->err_data_flags[i] = flags;
return 1;
/*
* This function is void so we cannot propagate the error return. Since it
* is also in the public API we can't change the return type.
+ *
+ * We estimate the size of the data. If it's not flagged as allocated,
+ * then this is safe, and if it is flagged as allocated, then our size
+ * may be smaller than the actual allocation, but that doesn't matter
+ * too much, the buffer will remain untouched or will eventually be
+ * reallocated to a new size.
+ *
+ * callers should be advised that this function takes over ownership of
+ * the allocated memory, i.e. they can't count on the pointer to remain
+ * valid.
*/
- err_set_error_data_int(data, flags);
+ err_set_error_data_int(data, strlen(data) + 1, flags, 1);
}
void ERR_add_error_data(int num, ...)
void ERR_add_error_vdata(int num, va_list args)
{
int i, len, size;
- char *str, *p, *arg;
+ int flags = ERR_TXT_MALLOCED | ERR_TXT_STRING;
+ char *str, *arg;
ERR_STATE *es;
/* Get the current error data; if an allocated string get it. */
if (es == NULL)
return;
i = es->top;
- p = es->err_data_flags[i] == (ERR_TXT_MALLOCED | ERR_TXT_STRING)
- ? es->err_data[i] : "";
- /* Start with initial (or empty) string and allocate a new buffer */
- size = 80 + strlen(p);
- if ((str = OPENSSL_malloc(size + 1)) == NULL) {
- /* ERRerr(ERR_F_ERR_ADD_ERROR_VDATA, ERR_R_MALLOC_FAILURE); */
+ /*
+ * If err_data is allocated already, re-use the space.
+ * Otherwise, allocate a small new buffer.
+ */
+ if ((es->err_data_flags[i] & flags) == flags) {
+ str = es->err_data[i];
+ size = es->err_data_size[i];
+
+ /*
+ * To protect the string we just grabbed from tampering by other
+ * functions we may call, or to protect them from freeing a pointer
+ * that may no longer be valid at that point, we clear away the
+ * data pointer and the flags. We will set them again at the end
+ * of this function.
+ */
+ es->err_data[i] = NULL;
+ es->err_data_flags[i] = 0;
+ } else if ((str = OPENSSL_malloc(size = 81)) == NULL) {
return;
+ } else {
+ str[0] = '\0';
}
- strcpy(str, p);
+ len = strlen(str);
for (len = 0; --num >= 0; ) {
arg = va_arg(args, char *);
arg = "<NULL>";
len += strlen(arg);
if (len > size) {
+ char *p;
+
size = len + 20;
p = OPENSSL_realloc(str, size + 1);
if (p == NULL) {
}
OPENSSL_strlcat(str, arg, (size_t)size + 1);
}
- if (!err_set_error_data_int(str, ERR_TXT_MALLOCED | ERR_TXT_STRING))
+ if (!err_set_error_data_int(str, size, flags, 0))
OPENSSL_free(str);
}
while (es->bottom != es->top
&& (es->err_flags[es->top] & ERR_FLAG_MARK) == 0) {
- err_clear(es, es->top);
+ err_clear(es, es->top, 0);
es->top = es->top > 0 ? es->top - 1 : ERR_NUM_ERRORS - 1;
}