| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | =pod | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 NAME | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_malloc_init, | 
					
						
							|  |  |  | OPENSSL_malloc, OPENSSL_zalloc, OPENSSL_realloc, OPENSSL_free, | 
					
						
							| 
									
										
										
										
											2016-05-22 02:49:58 +08:00
										 |  |  | OPENSSL_clear_realloc, OPENSSL_clear_free, OPENSSL_cleanse, | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | CRYPTO_malloc, CRYPTO_zalloc, CRYPTO_realloc, CRYPTO_free, | 
					
						
							|  |  |  | OPENSSL_strdup, OPENSSL_strndup, | 
					
						
							|  |  |  | OPENSSL_memdup, OPENSSL_strlcpy, OPENSSL_strlcat, | 
					
						
							| 
									
										
										
										
											2016-06-21 19:03:34 +08:00
										 |  |  | CRYPTO_strdup, CRYPTO_strndup, | 
					
						
							|  |  |  | OPENSSL_mem_debug_push, OPENSSL_mem_debug_pop, | 
					
						
							|  |  |  | CRYPTO_mem_debug_push, CRYPTO_mem_debug_pop, | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | CRYPTO_clear_realloc, CRYPTO_clear_free, | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  | CRYPTO_malloc_fn, CRYPTO_realloc_fn, CRYPTO_free_fn, | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | CRYPTO_get_mem_functions, CRYPTO_set_mem_functions, | 
					
						
							| 
									
										
										
										
											2017-10-05 09:17:58 +08:00
										 |  |  | CRYPTO_get_alloc_counts, | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | CRYPTO_set_mem_debug, CRYPTO_mem_ctrl, | 
					
						
							| 
									
										
										
										
											2017-04-19 18:51:06 +08:00
										 |  |  | CRYPTO_mem_leaks, CRYPTO_mem_leaks_fp, CRYPTO_mem_leaks_cb, | 
					
						
							| 
									
										
										
										
											2017-01-13 01:22:12 +08:00
										 |  |  | OPENSSL_MALLOC_FAILURES, | 
					
						
							|  |  |  | OPENSSL_MALLOC_FD | 
					
						
							|  |  |  | - Memory allocation functions | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 SYNOPSIS | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  #include <openssl/crypto.h> | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  int OPENSSL_malloc_init(void); | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  void *OPENSSL_malloc(size_t num); | 
					
						
							|  |  |  |  void *OPENSSL_zalloc(size_t num); | 
					
						
							|  |  |  |  void *OPENSSL_realloc(void *addr, size_t num); | 
					
						
							|  |  |  |  void OPENSSL_free(void *addr); | 
					
						
							|  |  |  |  char *OPENSSL_strdup(const char *str); | 
					
						
							|  |  |  |  char *OPENSSL_strndup(const char *str, size_t s); | 
					
						
							| 
									
										
										
										
											2016-06-21 19:03:34 +08:00
										 |  |  |  size_t OPENSSL_strlcat(char *dst, const char *src, size_t size); | 
					
						
							|  |  |  |  size_t OPENSSL_strlcpy(char *dst, const char *src, size_t size); | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  void *OPENSSL_memdup(void *data, size_t s); | 
					
						
							|  |  |  |  void *OPENSSL_clear_realloc(void *p, size_t old_len, size_t num); | 
					
						
							|  |  |  |  void OPENSSL_clear_free(void *str, size_t num); | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  |  void OPENSSL_cleanse(void *ptr, size_t len); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  void *CRYPTO_malloc(size_t num, const char *file, int line); | 
					
						
							|  |  |  |  void *CRYPTO_zalloc(size_t num, const char *file, int line); | 
					
						
							|  |  |  |  void *CRYPTO_realloc(void *p, size_t num, const char *file, int line); | 
					
						
							|  |  |  |  void CRYPTO_free(void *str, const char *, int); | 
					
						
							|  |  |  |  char *CRYPTO_strdup(const char *p, const char *file, int line); | 
					
						
							|  |  |  |  char *CRYPTO_strndup(const char *p, size_t num, const char *file, int line); | 
					
						
							| 
									
										
										
										
											2017-01-21 02:58:49 +08:00
										 |  |  |  void *CRYPTO_clear_realloc(void *p, size_t old_len, size_t num, | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |                             const char *file, int line); | 
					
						
							| 
									
										
										
										
											2020-07-15 16:26:35 +08:00
										 |  |  |  void CRYPTO_clear_free(void *str, size_t num, const char *, int); | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  typedef void *(*CRYPTO_malloc_fn)(size_t num, const char *file, int line); | 
					
						
							|  |  |  |  typedef void *(*CRYPTO_realloc_fn)(void *addr, size_t num, const char *file, | 
					
						
							|  |  |  |                                     int line); | 
					
						
							|  |  |  |  typedef void (*CRYPTO_free_fn)(void *addr, const char *file, int line); | 
					
						
							|  |  |  |  void CRYPTO_get_mem_functions(CRYPTO_malloc_fn *malloc_fn, | 
					
						
							|  |  |  |                                CRYPTO_realloc_fn *realloc_fn, | 
					
						
							|  |  |  |                                CRYPTO_free_fn *free_fn); | 
					
						
							|  |  |  |  int CRYPTO_set_mem_functions(CRYPTO_malloc_fn malloc_fn, | 
					
						
							|  |  |  |                               CRYPTO_realloc_fn realloc_fn, | 
					
						
							|  |  |  |                               CRYPTO_free_fn free_fn); | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  |  void CRYPTO_get_alloc_counts(int *mcount, int *rcount, int *fcount); | 
					
						
							| 
									
										
										
										
											2017-10-05 09:17:58 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-01-13 01:22:12 +08:00
										 |  |  |  env OPENSSL_MALLOC_FAILURES=... <application> | 
					
						
							|  |  |  |  env OPENSSL_MALLOC_FD=... <application> | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-16 07:39:19 +08:00
										 |  |  | Deprecated since OpenSSL 3.0.0, can be hidden entirely by defining | 
					
						
							|  |  |  | B<OPENSSL_API_COMPAT> with a suitable version value, see | 
					
						
							|  |  |  | L<openssl_user_macros(7)>: | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-03-29 17:45:42 +08:00
										 |  |  |  int CRYPTO_mem_leaks(BIO *b); | 
					
						
							|  |  |  |  int CRYPTO_mem_leaks_fp(FILE *fp); | 
					
						
							|  |  |  |  int CRYPTO_mem_leaks_cb(int (*cb)(const char *str, size_t len, void *u), | 
					
						
							|  |  |  |                          void *u); | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-07-15 16:26:35 +08:00
										 |  |  |  int CRYPTO_set_mem_debug(int onoff); | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  |  int CRYPTO_mem_ctrl(int mode); | 
					
						
							| 
									
										
										
										
											2020-07-15 16:26:35 +08:00
										 |  |  |  int OPENSSL_mem_debug_push(const char *info); | 
					
						
							| 
									
										
										
										
											2019-07-11 04:22:12 +08:00
										 |  |  |  int OPENSSL_mem_debug_pop(void); | 
					
						
							|  |  |  |  int CRYPTO_mem_debug_push(const char *info, const char *file, int line); | 
					
						
							|  |  |  |  int CRYPTO_mem_debug_pop(void); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | =head1 DESCRIPTION | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OpenSSL memory allocation is handled by the B<OPENSSL_xxx> API. These are | 
					
						
							|  |  |  | generally macro's that add the standard C B<__FILE__> and B<__LINE__> | 
					
						
							|  |  |  | parameters and call a lower-level B<CRYPTO_xxx> API. | 
					
						
							|  |  |  | Some functions do not add those parameters, but exist for consistency. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-02-05 22:25:18 +08:00
										 |  |  | OPENSSL_malloc_init() does nothing and does not need to be called. It is | 
					
						
							|  |  |  | included for compatibility with older versions of OpenSSL. | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_malloc(), OPENSSL_realloc(), and OPENSSL_free() are like the | 
					
						
							|  |  |  | C malloc(), realloc(), and free() functions. | 
					
						
							|  |  |  | OPENSSL_zalloc() calls memset() to zero the memory before returning. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_clear_realloc() and OPENSSL_clear_free() should be used | 
					
						
							|  |  |  | when the buffer at B<addr> holds sensitive information. | 
					
						
							| 
									
										
										
										
											2016-02-27 09:44:35 +08:00
										 |  |  | The old buffer is filled with zero's by calling OPENSSL_cleanse() | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | before ultimately calling OPENSSL_free(). | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-27 09:44:35 +08:00
										 |  |  | OPENSSL_cleanse() fills B<ptr> of size B<len> with a string of 0's. | 
					
						
							|  |  |  | Use OPENSSL_cleanse() with care if the memory is a mapping of a file. | 
					
						
							| 
									
										
										
										
											2020-12-08 12:35:31 +08:00
										 |  |  | If the storage controller uses write compression, then it's possible | 
					
						
							| 
									
										
										
										
											2016-05-20 20:11:46 +08:00
										 |  |  | that sensitive tail bytes will survive zeroization because the block of | 
					
						
							| 
									
										
										
										
											2016-06-29 04:51:51 +08:00
										 |  |  | zeros will be compressed. If the storage controller uses wear leveling, | 
					
						
							| 
									
										
										
										
											2016-05-20 20:11:46 +08:00
										 |  |  | then the old sensitive data will not be overwritten; rather, a block of | 
					
						
							| 
									
										
										
										
											2016-02-27 09:44:35 +08:00
										 |  |  | 0's will be written at a new physical location. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | OPENSSL_strdup(), OPENSSL_strndup() and OPENSSL_memdup() are like the | 
					
						
							|  |  |  | equivalent C functions, except that memory is allocated by calling the | 
					
						
							| 
									
										
										
										
											2016-06-29 04:39:55 +08:00
										 |  |  | OPENSSL_malloc() and should be released by calling OPENSSL_free(). | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_strlcpy(), | 
					
						
							|  |  |  | OPENSSL_strlcat() and OPENSSL_strnlen() are equivalents of the common C | 
					
						
							|  |  |  | library functions and are provided for portability. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | If no allocations have been done, it is possible to "swap out" the default | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | implementations for OPENSSL_malloc(), OPENSSL_realloc() and OPENSSL_free() | 
					
						
							|  |  |  | and replace them with alternate versions. | 
					
						
							| 
									
										
										
										
											2016-02-17 09:32:27 +08:00
										 |  |  | CRYPTO_get_mem_functions() function fills in the given arguments with the | 
					
						
							|  |  |  | function pointers for the current implementations. | 
					
						
							|  |  |  | With CRYPTO_set_mem_functions(), you can specify a different set of functions. | 
					
						
							| 
									
										
										
										
											2020-02-10 14:49:10 +08:00
										 |  |  | If any of B<malloc_fn>, B<realloc_fn>, or B<free_fn> are NULL, then | 
					
						
							|  |  |  | the function is not changed. | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | While it's permitted to swap out only a few and not all the functions | 
					
						
							|  |  |  | with CRYPTO_set_mem_functions(), it's recommended to swap them all out | 
					
						
							|  |  |  | at once. | 
					
						
							| 
									
										
										
										
											2017-04-19 18:51:06 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-10-05 09:17:58 +08:00
										 |  |  | If the library is built with the C<crypto-mdebug> option, then one | 
					
						
							|  |  |  | function, CRYPTO_get_alloc_counts(), and two additional environment | 
					
						
							|  |  |  | variables, B<OPENSSL_MALLOC_FAILURES> and B<OPENSSL_MALLOC_FD>, | 
					
						
							|  |  |  | are available. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The function CRYPTO_get_alloc_counts() fills in the number of times | 
					
						
							|  |  |  | each of CRYPTO_malloc(), CRYPTO_realloc(), and CRYPTO_free() have been | 
					
						
							|  |  |  | called, into the values pointed to by B<mcount>, B<rcount>, and B<fcount>, | 
					
						
							|  |  |  | respectively.  If a pointer is NULL, then the corresponding count is not stored. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The variable | 
					
						
							|  |  |  | B<OPENSSL_MALLOC_FAILURES> controls how often allocations should fail. | 
					
						
							|  |  |  | It is a set of fields separated by semicolons, which each field is a count | 
					
						
							|  |  |  | (defaulting to zero) and an optional atsign and percentage (defaulting | 
					
						
							|  |  |  | to 100).  If the count is zero, then it lasts forever.  For example, | 
					
						
							|  |  |  | C<100;@25> or C<100@0;0@25> means the first 100 allocations pass, then all | 
					
						
							|  |  |  | other allocations (until the program exits or crashes) have a 25% chance of | 
					
						
							|  |  |  | failing. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | If the variable B<OPENSSL_MALLOC_FD> is parsed as a positive integer, then | 
					
						
							|  |  |  | it is taken as an open file descriptor, and a record of all allocations is | 
					
						
							|  |  |  | written to that descriptor.  If an allocation will fail, and the platform | 
					
						
							|  |  |  | supports it, then a backtrace will be written to the descriptor.  This can | 
					
						
							|  |  |  | be useful because a malloc may fail but not be checked, and problems will | 
					
						
							|  |  |  | only occur later.  The following example in classic shell syntax shows how | 
					
						
							|  |  |  | to use this (will not work on all platforms): | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   OPENSSL_MALLOC_FAILURES='200;@10' | 
					
						
							|  |  |  |   export OPENSSL_MALLOC_FAILURES | 
					
						
							|  |  |  |   OPENSSL_MALLOC_FD=3 | 
					
						
							|  |  |  |   export OPENSSL_MALLOC_FD | 
					
						
							|  |  |  |   ...app invocation... 3>/tmp/log$$ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | =head1 RETURN VALUES | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_malloc_init(), OPENSSL_free(), OPENSSL_clear_free() | 
					
						
							| 
									
										
										
										
											2016-01-11 07:25:07 +08:00
										 |  |  | CRYPTO_free(), CRYPTO_clear_free() and CRYPTO_get_mem_functions() | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | return no value. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_malloc(), OPENSSL_zalloc(), OPENSSL_realloc(), | 
					
						
							|  |  |  | OPENSSL_clear_realloc(), | 
					
						
							|  |  |  | CRYPTO_malloc(), CRYPTO_zalloc(), CRYPTO_realloc(), | 
					
						
							|  |  |  | CRYPTO_clear_realloc(), | 
					
						
							|  |  |  | OPENSSL_strdup(), and OPENSSL_strndup() | 
					
						
							|  |  |  | return a pointer to allocated memory or NULL on error. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | CRYPTO_set_mem_functions() returns 1 on success or 0 on failure (almost | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | always because allocations have already happened). | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | CRYPTO_mem_leaks(), CRYPTO_mem_leaks_fp(), CRYPTO_mem_leaks_cb(), | 
					
						
							|  |  |  | CRYPTO_set_mem_debug(), and CRYPTO_mem_ctrl() are deprecated and return -1. | 
					
						
							|  |  |  | OPENSSL_mem_debug_push(), OPENSSL_mem_debug_pop(), | 
					
						
							|  |  |  | CRYPTO_mem_debug_push(), and CRYPTO_mem_debug_pop() | 
					
						
							|  |  |  | are deprecated and return 0. | 
					
						
							| 
									
										
										
										
											2019-07-11 04:22:12 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 HISTORY | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_mem_debug_push(), OPENSSL_mem_debug_pop(), | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | CRYPTO_mem_debug_push(), CRYPTO_mem_debug_pop(), | 
					
						
							|  |  |  | CRYPTO_mem_leaks(), CRYPTO_mem_leaks_fp(), | 
					
						
							|  |  |  | CRYPTO_mem_leaks_cb(), CRYPTO_set_mem_debug(), CRYPTO_mem_ctrl() | 
					
						
							| 
									
										
										
										
											2019-07-11 04:22:12 +08:00
										 |  |  | were deprecated in OpenSSL 3.0. | 
					
						
							| 
									
										
										
										
											2019-12-05 02:15:08 +08:00
										 |  |  | The memory-leak checking has been deprecated in OpenSSL 3.0 in favor of | 
					
						
							|  |  |  | clang's memory and leak sanitizer. | 
					
						
							| 
									
										
										
										
											2019-07-11 04:22:12 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-02-17 09:32:27 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | =head1 COPYRIGHT | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-04-23 20:55:52 +08:00
										 |  |  | Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-12-06 21:04:44 +08:00
										 |  |  | Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  | in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  | L<https://www.openssl.org/source/license.html>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =cut |