2 Bacula® - The Network Backup Solution
4 Copyright (C) 2005-2007 Free Software Foundation Europe e.V.
6 The main author of Bacula is Kern Sibbald, with contributions from
7 many others, a complete list can be found in the file AUTHORS.
8 This program is Free Software; you can redistribute it and/or
9 modify it under the terms of version two of the GNU General Public
10 License as published by the Free Software Foundation plus additions
11 that are listed in the file LICENSE.
13 This program is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
23 Bacula® is a registered trademark of John Walker.
24 The licensor of Bacula is the Free Software Foundation Europe
25 (FSFE), Fiduciary Program, Sumatrastrasse 25, 8006 Zürich,
26 Switzerland, email:ftf@fsfeurope.org.
29 * openssl.c OpenSSL support functions
31 * Author: Landon Fuller <landonf@opendarwin.org>
35 * This file was contributed to the Bacula project by Landon Fuller.
37 * Landon Fuller has been granted a perpetual, worldwide, non-exclusive,
38 * no-charge, royalty-free, irrevocable copyright license to reproduce,
39 * prepare derivative works of, publicly display, publicly perform,
40 * sublicense, and distribute the original work contributed by Landon Fuller
41 * to the Bacula project in source or object form.
43 * If you wish to license these contributions under an alternate open source
44 * license please contact Landon Fuller <landonf@opendarwin.org>.
53 /* Array of mutexes for use with OpenSSL static locking */
54 static pthread_mutex_t *mutexes;
56 /* OpenSSL dynamic locking structure */
57 struct CRYPTO_dynlock_value {
58 pthread_mutex_t mutex;
62 * ***FIXME*** this is a sort of dummy to avoid having to
63 * change all the existing code to pass either a jcr or
64 * a NULL. Passing a NULL causes the messages to be
65 * printed by the daemon -- not very good :-(
67 void openssl_post_errors(int code, const char *errstring)
69 openssl_post_errors(NULL, code, errstring);
74 * Post all per-thread openssl errors
76 void openssl_post_errors(JCR *jcr, int code, const char *errstring)
81 /* Pop errors off of the per-thread queue */
82 while((sslerr = ERR_get_error()) != 0) {
83 /* Acquire the human readable string */
84 ERR_error_string_n(sslerr, buf, sizeof(buf));
85 Dmsg3(100, "jcr=%p %s: ERR=%s\n", jcr, errstring, buf);
86 Jmsg2(jcr, M_ERROR, 0, "%s: ERR=%s\n", errstring, buf);
91 * Return an OpenSSL thread ID
95 static unsigned long get_openssl_thread_id(void)
97 /* Comparison without use of pthread_equal() is mandated by the OpenSSL API */
98 return ((unsigned long)pthread_self());
102 * Allocate a dynamic OpenSSL mutex
104 static struct CRYPTO_dynlock_value *openssl_create_dynamic_mutex (const char *file, int line)
106 struct CRYPTO_dynlock_value *dynlock;
109 dynlock = (struct CRYPTO_dynlock_value *)malloc(sizeof(struct CRYPTO_dynlock_value));
111 if ((stat = pthread_mutex_init(&dynlock->mutex, NULL)) != 0) {
113 Emsg1(M_ABORT, 0, _("Unable to init mutex: ERR=%s\n"), be.bstrerror(stat));
119 static void openssl_update_dynamic_mutex(int mode, struct CRYPTO_dynlock_value *dynlock, const char *file, int line)
121 if (mode & CRYPTO_LOCK) {
128 static void openssl_destroy_dynamic_mutex(struct CRYPTO_dynlock_value *dynlock, const char *file, int line)
132 if ((stat = pthread_mutex_destroy(&dynlock->mutex)) != 0) {
134 Emsg1(M_ABORT, 0, _("Unable to destroy mutex: ERR=%s\n"), be.bstrerror(stat));
141 * (Un)Lock a static OpenSSL mutex
143 static void openssl_update_static_mutex (int mode, int i, const char *file, int line)
145 if (mode & CRYPTO_LOCK) {
153 * Initialize OpenSSL thread support
154 * Returns: 0 on success
157 int openssl_init_threads (void)
163 /* Set thread ID callback */
164 CRYPTO_set_id_callback(get_openssl_thread_id);
166 /* Initialize static locking */
167 numlocks = CRYPTO_num_locks();
168 mutexes = (pthread_mutex_t *) malloc(numlocks * sizeof(pthread_mutex_t));
169 for (i = 0; i < numlocks; i++) {
170 if ((stat = pthread_mutex_init(&mutexes[i], NULL)) != 0) {
172 Emsg1(M_ERROR, 0, _("Unable to init mutex: ERR=%s\n"), be.bstrerror(stat));
177 /* Set static locking callback */
178 CRYPTO_set_locking_callback(openssl_update_static_mutex);
180 /* Initialize dyanmic locking */
181 CRYPTO_set_dynlock_create_callback(openssl_create_dynamic_mutex);
182 CRYPTO_set_dynlock_lock_callback(openssl_update_dynamic_mutex);
183 CRYPTO_set_dynlock_destroy_callback(openssl_destroy_dynamic_mutex);
189 * Clean up OpenSSL threading support
191 void openssl_cleanup_threads(void)
196 /* Unset thread ID callback */
197 CRYPTO_set_id_callback(NULL);
199 /* Deallocate static lock mutexes */
200 numlocks = CRYPTO_num_locks();
201 for (i = 0; i < numlocks; i++) {
202 if ((stat = pthread_mutex_destroy(&mutexes[i])) != 0) {
204 /* We don't halt execution, reporting the error should be sufficient */
205 Emsg1(M_ERROR, 0, _("Unable to destroy mutex: ERR=%s\n"), be.bstrerror(stat));
209 /* Unset static locking callback */
210 CRYPTO_set_locking_callback(NULL);
212 /* Free static lock array */
215 /* Unset dynamic locking callbacks */
216 CRYPTO_set_dynlock_create_callback(NULL);
217 CRYPTO_set_dynlock_lock_callback(NULL);
218 CRYPTO_set_dynlock_destroy_callback(NULL);
224 * Returns: 1 on success
227 int openssl_seed_prng (void)
229 const char *names[] = { "/dev/urandom", "/dev/random", NULL };
234 // Read saved entropy?
236 for (i = 0; names[i]; i++) {
237 if (RAND_load_file(names[i], 1024) != -1) {
248 * Save OpenSSL Entropy
249 * Returns: 1 on success
252 int openssl_save_prng (void)
255 // Implement PRNG state save
259 #endif /* HAVE_OPENSSL */