summaryrefslogtreecommitdiffstats
path: root/crypto/property/defn_cache.c
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2022-11-24 18:48:10 +0100
committerTomas Mraz <tomas@openssl.org>2022-11-29 08:21:34 +0100
commit92a25e24e6ec9735dea9ec645502cb075a5f8d24 (patch)
tree480f7c3a97fd27f48bc2b85a407213daff15dc3a /crypto/property/defn_cache.c
parent055d029610712a281aed0c23ddd3c8f4dbf40f80 (diff)
Fix occasional assertion failure when storing properties
Fixes #18631 The store lock does not prevent concurrent access to the property cache, because there are multiple stores. We drop the newly created entry and use the exisiting one if there is one already. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19762)
Diffstat (limited to 'crypto/property/defn_cache.c')
-rw-r--r--crypto/property/defn_cache.c35
1 files changed, 18 insertions, 17 deletions
diff --git a/crypto/property/defn_cache.c b/crypto/property/defn_cache.c
index bb555fccc1..eb68a55aa7 100644
--- a/crypto/property/defn_cache.c
+++ b/crypto/property/defn_cache.c
@@ -70,22 +70,24 @@ OSSL_PROPERTY_LIST *ossl_prop_defn_get(OSSL_LIB_CTX *ctx, const char *prop)
property_defns = ossl_lib_ctx_get_data(ctx,
OSSL_LIB_CTX_PROPERTY_DEFN_INDEX);
- if (property_defns == NULL || !ossl_lib_ctx_read_lock(ctx))
+ if (!ossl_assert(property_defns != NULL) || !ossl_lib_ctx_read_lock(ctx))
return NULL;
elem.prop = prop;
r = lh_PROPERTY_DEFN_ELEM_retrieve(property_defns, &elem);
ossl_lib_ctx_unlock(ctx);
- return r != NULL ? r->defn : NULL;
+ if (r == NULL || !ossl_assert(r->defn != NULL))
+ return NULL;
+ return r->defn;
}
/*
- * Cache the property list for a given property string. Callers of this function
- * should call ossl_prop_defn_get first to ensure that there is no existing
- * cache entry for this property string.
+ * Cache the property list for a given property string *pl.
+ * If an entry already exists in the cache *pl is freed and
+ * overwritten with the existing entry from the cache.
*/
int ossl_prop_defn_set(OSSL_LIB_CTX *ctx, const char *prop,
- OSSL_PROPERTY_LIST *pl)
+ OSSL_PROPERTY_LIST **pl)
{
PROPERTY_DEFN_ELEM elem, *old, *p = NULL;
size_t len;
@@ -102,28 +104,27 @@ int ossl_prop_defn_set(OSSL_LIB_CTX *ctx, const char *prop,
if (!ossl_lib_ctx_write_lock(ctx))
return 0;
+ elem.prop = prop;
if (pl == NULL) {
- elem.prop = prop;
lh_PROPERTY_DEFN_ELEM_delete(property_defns, &elem);
goto end;
}
+ /* check if property definition is in the cache already */
+ if ((p = lh_PROPERTY_DEFN_ELEM_retrieve(property_defns, &elem)) != NULL) {
+ ossl_property_free(*pl);
+ *pl = p->defn;
+ goto end;
+ }
len = strlen(prop);
p = OPENSSL_malloc(sizeof(*p) + len);
if (p != NULL) {
p->prop = p->body;
- p->defn = pl;
+ p->defn = *pl;
memcpy(p->body, prop, len + 1);
old = lh_PROPERTY_DEFN_ELEM_insert(property_defns, p);
- if (!ossl_assert(old == NULL)) {
- /*
- * This should not happen. Any caller of ossl_prop_defn_set should
- * have called ossl_prop_defn_get first - so we should know that
- * there is no existing entry. If we get here we have a bug. We
- * deliberately leak the |old| reference in order to avoid a crash
- * if there are any existing users of it.
- */
+ if (!ossl_assert(old == NULL))
+ /* This should not happen. An existing entry is handled above. */
goto end;
- }
if (!lh_PROPERTY_DEFN_ELEM_error(property_defns))
goto end;
}