2012-01-30 21:21:16 +00:00
|
|
|
/*
|
|
|
|
* Asterisk -- An open source telephony toolkit.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2009-2012, Digium, Inc.
|
|
|
|
*
|
|
|
|
* Russell Bryant <russell@digium.com>
|
|
|
|
*
|
|
|
|
* See http://www.asterisk.org for more information about
|
|
|
|
* the Asterisk project. Please do not directly contact
|
|
|
|
* any of the maintainers of this project for assistance;
|
|
|
|
* the project provides a web site, mailing lists and IRC
|
|
|
|
* channels for your use.
|
|
|
|
*
|
|
|
|
* This program is free software, distributed under the terms of
|
|
|
|
* the GNU General Public License Version 2. See the LICENSE file
|
|
|
|
* at the top of the source tree.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*!
|
|
|
|
* \file
|
|
|
|
* \brief Common OpenSSL support code
|
|
|
|
*
|
|
|
|
* \author Russell Bryant <russell@digium.com>
|
|
|
|
*/
|
|
|
|
|
2012-06-15 16:20:16 +00:00
|
|
|
/*** MODULEINFO
|
|
|
|
<support_level>core</support_level>
|
|
|
|
***/
|
|
|
|
|
2012-01-30 21:21:16 +00:00
|
|
|
#include "asterisk.h"
|
|
|
|
|
git migration: Refactor the ASTERISK_FILE_VERSION macro
Git does not support the ability to replace a token with a version
string during check-in. While it does have support for replacing a
token on clone, this is somewhat sub-optimal: the token is replaced
with the object hash, which is not particularly easy for human
consumption. What's more, in practice, the source file version was often
not terribly useful. Generally, when triaging bugs, the overall version
of Asterisk is far more useful than an individual SVN version of a file. As a
result, this patch removes Asterisk's support for showing source file
versions.
Specifically, it does the following:
* Rename ASTERISK_FILE_VERSION macro to ASTERISK_REGISTER_FILE, and
remove passing the version in with the macro. Other facilities
than 'core show file version' make use of the file names, such as
setting a debug level only on a specific file. As such, the act of
registering source files with the Asterisk core still has use. The
macro rename now reflects the new macro purpose.
* main/asterisk:
- Refactor the file_version structure to reflect that it no longer
tracks a version field.
- Remove the "core show file version" CLI command. Without the file
version, it is no longer useful.
- Remove the ast_file_version_find function. The file version is no
longer tracked.
- Rename ast_register_file_version/ast_unregister_file_version to
ast_register_file/ast_unregister_file, respectively.
* main/manager: Remove value from the Version key of the ModuleCheck
Action. The actual key itself has not been removed, as doing so would
absolutely constitute a backwards incompatible change. However, since
the file version is no longer tracked, there is no need to attempt to
include it in the Version key.
* UPGRADE: Add notes for:
- Modification to the ModuleCheck AMI Action
- Removal of the "core show file version" CLI command
Change-Id: I6cf0ff280e1668bf4957dc21f32a5ff43444a40e
2015-04-12 02:38:22 +00:00
|
|
|
ASTERISK_REGISTER_FILE()
|
2012-01-30 21:21:16 +00:00
|
|
|
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <dlfcn.h>
|
|
|
|
|
|
|
|
#include "asterisk/_private.h" /* ast_ssl_init() */
|
|
|
|
|
|
|
|
#include "asterisk/utils.h"
|
|
|
|
#include "asterisk/lock.h"
|
|
|
|
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
|
|
|
|
#define get_OpenSSL_function(func) do { real_##func = dlsym(RTLD_NEXT, __stringify(func)); } while(0)
|
|
|
|
|
|
|
|
static int startup_complete;
|
|
|
|
|
|
|
|
static ast_mutex_t *ssl_locks;
|
|
|
|
|
|
|
|
static int ssl_num_locks;
|
|
|
|
|
|
|
|
static unsigned long ssl_threadid(void)
|
|
|
|
{
|
|
|
|
return (unsigned long) pthread_self();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ssl_lock(int mode, int n, const char *file, int line)
|
|
|
|
{
|
|
|
|
if (n < 0 || n >= ssl_num_locks) {
|
|
|
|
ast_log(LOG_ERROR, "OpenSSL is full of LIES!!! - "
|
|
|
|
"ssl_num_locks '%d' - n '%d'\n",
|
|
|
|
ssl_num_locks, n);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mode & CRYPTO_LOCK) {
|
|
|
|
ast_mutex_lock(&ssl_locks[n]);
|
|
|
|
} else {
|
|
|
|
ast_mutex_unlock(&ssl_locks[n]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int SSL_library_init(void)
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
2012-07-10 13:34:15 +00:00
|
|
|
return 1;
|
2012-01-30 21:21:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void SSL_load_error_strings(void)
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void ERR_load_SSL_strings(void)
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void ERR_load_crypto_strings(void)
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void ERR_load_BIO_strings(void)
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void CRYPTO_set_id_callback(unsigned long (*func)(void))
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void CRYPTO_set_locking_callback(void (*func)(int mode,int type, const char *file, int line))
|
|
|
|
{
|
|
|
|
#if defined(AST_DEVMODE)
|
|
|
|
if (startup_complete) {
|
|
|
|
ast_debug(1, "Called after startup... ignoring!\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void ERR_free_strings(void)
|
|
|
|
{
|
|
|
|
/* we can't allow this to be called, ever */
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* HAVE_OPENSSL */
|
|
|
|
|
|
|
|
/*!
|
|
|
|
* \internal
|
|
|
|
* \brief Common OpenSSL initialization for all of Asterisk.
|
|
|
|
*/
|
|
|
|
int ast_ssl_init(void)
|
|
|
|
{
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
unsigned int i;
|
|
|
|
int (*real_SSL_library_init)(void);
|
|
|
|
void (*real_CRYPTO_set_id_callback)(unsigned long (*)(void));
|
|
|
|
void (*real_CRYPTO_set_locking_callback)(void (*)(int, int, const char *, int));
|
|
|
|
void (*real_SSL_load_error_strings)(void);
|
|
|
|
void (*real_ERR_load_SSL_strings)(void);
|
|
|
|
void (*real_ERR_load_BIO_strings)(void);
|
|
|
|
const char *errstr;
|
|
|
|
|
|
|
|
/* clear any previous dynamic linker errors */
|
|
|
|
dlerror();
|
|
|
|
get_OpenSSL_function(SSL_library_init);
|
|
|
|
if ((errstr = dlerror()) != NULL) {
|
|
|
|
ast_debug(1, "unable to get real address of SSL_library_init: %s\n", errstr);
|
|
|
|
/* there is no way to continue in this situation... SSL will
|
|
|
|
* likely be broken in this process
|
|
|
|
*/
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
real_SSL_library_init();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Make OpenSSL usage thread-safe. */
|
|
|
|
|
|
|
|
dlerror();
|
|
|
|
get_OpenSSL_function(CRYPTO_set_id_callback);
|
|
|
|
if ((errstr = dlerror()) != NULL) {
|
|
|
|
ast_debug(1, "unable to get real address of CRYPTO_set_id_callback: %s\n", errstr);
|
|
|
|
/* there is no way to continue in this situation... SSL will
|
|
|
|
* likely be broken in this process
|
|
|
|
*/
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
real_CRYPTO_set_id_callback(ssl_threadid);
|
|
|
|
}
|
|
|
|
|
|
|
|
dlerror();
|
|
|
|
get_OpenSSL_function(CRYPTO_set_locking_callback);
|
|
|
|
if ((errstr = dlerror()) != NULL) {
|
|
|
|
ast_debug(1, "unable to get real address of CRYPTO_set_locking_callback: %s\n", errstr);
|
|
|
|
/* there is no way to continue in this situation... SSL will
|
|
|
|
* likely be broken in this process
|
|
|
|
*/
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
ssl_num_locks = CRYPTO_num_locks();
|
|
|
|
if (!(ssl_locks = ast_calloc(ssl_num_locks, sizeof(ssl_locks[0])))) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
for (i = 0; i < ssl_num_locks; i++) {
|
|
|
|
ast_mutex_init(&ssl_locks[i]);
|
|
|
|
}
|
|
|
|
real_CRYPTO_set_locking_callback(ssl_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* after this point, we don't check for errors from the dlsym() calls,
|
|
|
|
* under the assumption that if the ones above were successful, all
|
|
|
|
* the rest will be too. this assumption holds as long as OpenSSL still
|
|
|
|
* provides all of these functions.
|
|
|
|
*/
|
|
|
|
|
|
|
|
get_OpenSSL_function(SSL_load_error_strings);
|
|
|
|
real_SSL_load_error_strings();
|
|
|
|
|
|
|
|
get_OpenSSL_function(ERR_load_SSL_strings);
|
|
|
|
real_ERR_load_SSL_strings();
|
|
|
|
|
|
|
|
get_OpenSSL_function(ERR_load_BIO_strings);
|
|
|
|
real_ERR_load_BIO_strings();
|
|
|
|
|
|
|
|
startup_complete = 1;
|
|
|
|
|
|
|
|
#endif /* HAVE_OPENSSL */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|