2016-02-09 18:17:59 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2019-01-01 15:53:24 +08:00
|
|
|
OPENSSL_INIT_new, OPENSSL_INIT_set_config_filename,
|
|
|
|
OPENSSL_INIT_set_config_appname, OPENSSL_INIT_set_config_file_flags,
|
|
|
|
OPENSSL_INIT_free, OPENSSL_init_crypto, OPENSSL_cleanup, OPENSSL_atexit,
|
2019-05-29 23:04:17 +08:00
|
|
|
OPENSSL_thread_stop_ex, OPENSSL_thread_stop - OpenSSL initialisation
|
2019-01-01 15:53:24 +08:00
|
|
|
and deinitialisation functions
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/crypto.h>
|
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
void OPENSSL_cleanup(void);
|
2016-02-10 21:59:15 +08:00
|
|
|
int OPENSSL_init_crypto(uint64_t opts, const OPENSSL_INIT_SETTINGS *settings);
|
2016-02-10 00:52:40 +08:00
|
|
|
int OPENSSL_atexit(void (*handler)(void));
|
2019-05-29 23:04:17 +08:00
|
|
|
void OPENSSL_thread_stop_ex(OPENSSL_CTX *ctx);
|
2016-02-10 00:52:40 +08:00
|
|
|
void OPENSSL_thread_stop(void);
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2017-06-09 03:18:38 +08:00
|
|
|
OPENSSL_INIT_SETTINGS *OPENSSL_INIT_new(void);
|
2019-01-01 15:53:24 +08:00
|
|
|
int OPENSSL_INIT_set_config_filename(OPENSSL_INIT_SETTINGS *init,
|
|
|
|
const char* filename);
|
|
|
|
int OPENSSL_INIT_set_config_file_flags(OPENSSL_INIT_SETTINGS *init,
|
|
|
|
unsigned long flags);
|
2016-06-13 09:49:40 +08:00
|
|
|
int OPENSSL_INIT_set_config_appname(OPENSSL_INIT_SETTINGS *init,
|
|
|
|
const char* name);
|
2016-05-23 17:55:54 +08:00
|
|
|
void OPENSSL_INIT_free(OPENSSL_INIT_SETTINGS *init);
|
2016-02-10 22:55:48 +08:00
|
|
|
|
2016-02-09 18:17:59 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
During normal operation OpenSSL (libcrypto) will allocate various resources at
|
|
|
|
start up that must, subsequently, be freed on close down of the library.
|
|
|
|
Additionally some resources are allocated on a per thread basis (if the
|
|
|
|
application is multi-threaded), and these resources must be freed prior to the
|
|
|
|
thread closing.
|
|
|
|
|
|
|
|
As of version 1.1.0 OpenSSL will automatically allocate all resources that it
|
|
|
|
needs so no explicit initialisation is required. Similarly it will also
|
|
|
|
automatically deinitialise as required.
|
|
|
|
|
2018-11-16 00:27:34 +08:00
|
|
|
However, there may be situations when explicit initialisation is desirable or
|
2020-07-17 18:31:26 +08:00
|
|
|
needed, for example when some nondefault initialisation is required. The
|
2016-02-10 00:52:40 +08:00
|
|
|
function OPENSSL_init_crypto() can be used for this purpose for
|
|
|
|
libcrypto (see also L<OPENSSL_init_ssl(3)> for the libssl
|
2016-02-09 21:12:34 +08:00
|
|
|
equivalent).
|
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
Numerous internal OpenSSL functions call OPENSSL_init_crypto().
|
2020-07-17 18:31:26 +08:00
|
|
|
Therefore, in order to perform nondefault initialisation,
|
2016-02-10 00:52:40 +08:00
|
|
|
OPENSSL_init_crypto() MUST be called by application code prior to
|
2016-02-09 21:12:34 +08:00
|
|
|
any other OpenSSL function calls.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
The B<opts> parameter specifies which aspects of libcrypto should be
|
|
|
|
initialised. Valid options are:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
|
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
Suppress automatic loading of the libcrypto error strings. This option is
|
2016-02-09 18:17:59 +08:00
|
|
|
not a default option. Once selected subsequent calls to
|
2016-02-10 00:52:40 +08:00
|
|
|
OPENSSL_init_crypto() with the option
|
|
|
|
B<OPENSSL_INIT_LOAD_CRYPTO_STRINGS> will be ignored.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_LOAD_CRYPTO_STRINGS
|
|
|
|
|
|
|
|
Automatic loading of the libcrypto error strings. With this option the
|
2016-02-10 00:52:40 +08:00
|
|
|
library will automatically load the libcrypto error strings.
|
|
|
|
This option is a default option. Once selected subsequent calls to
|
|
|
|
OPENSSL_init_crypto() with the option
|
2016-02-09 18:17:59 +08:00
|
|
|
B<OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS> will be ignored.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_ADD_ALL_CIPHERS
|
|
|
|
|
|
|
|
With this option the library will automatically load and make available all
|
|
|
|
libcrypto ciphers. This option is a default option. Once selected subsequent
|
2016-02-10 00:52:40 +08:00
|
|
|
calls to OPENSSL_init_crypto() with the option
|
2016-02-09 18:17:59 +08:00
|
|
|
B<OPENSSL_INIT_NO_ADD_ALL_CIPHERS> will be ignored.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_ADD_ALL_DIGESTS
|
|
|
|
|
|
|
|
With this option the library will automatically load and make available all
|
|
|
|
libcrypto digests. This option is a default option. Once selected subsequent
|
2016-02-10 00:52:40 +08:00
|
|
|
calls to OPENSSL_init_crypto() with the option
|
2016-02-09 18:17:59 +08:00
|
|
|
B<OPENSSL_INIT_NO_ADD_ALL_CIPHERS> will be ignored.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_NO_ADD_ALL_CIPHERS
|
|
|
|
|
|
|
|
With this option the library will suppress automatic loading of libcrypto
|
|
|
|
ciphers. This option is not a default option. Once selected subsequent
|
2016-02-10 00:52:40 +08:00
|
|
|
calls to OPENSSL_init_crypto() with the option
|
2016-02-09 18:17:59 +08:00
|
|
|
B<OPENSSL_INIT_ADD_ALL_CIPHERS> will be ignored.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_NO_ADD_ALL_DIGESTS
|
|
|
|
|
|
|
|
With this option the library will suppress automatic loading of libcrypto
|
|
|
|
digests. This option is not a default option. Once selected subsequent
|
2016-02-10 00:52:40 +08:00
|
|
|
calls to OPENSSL_init_crypto() with the option
|
2016-02-09 18:17:59 +08:00
|
|
|
B<OPENSSL_INIT_ADD_ALL_DIGESTS> will be ignored.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_LOAD_CONFIG
|
|
|
|
|
|
|
|
With this option an OpenSSL configuration file will be automatically loaded and
|
2019-07-30 23:42:53 +08:00
|
|
|
used by calling OPENSSL_config(). This is a default option.
|
|
|
|
Note that in OpenSSL 1.1.1 this was the default for libssl but not for
|
|
|
|
libcrypto (see L<OPENSSL_init_ssl(3)> for further details about libssl
|
|
|
|
initialisation).
|
2020-07-17 18:31:26 +08:00
|
|
|
In OpenSSL 1.1.0 this was a nondefault option for both libssl and libcrypto.
|
2019-07-30 23:42:53 +08:00
|
|
|
See the description of OPENSSL_INIT_new(), below.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_NO_LOAD_CONFIG
|
|
|
|
|
|
|
|
With this option the loading of OpenSSL configuration files will be suppressed.
|
|
|
|
It is the equivalent of calling OPENSSL_no_config(). This is not a default
|
|
|
|
option.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_ASYNC
|
|
|
|
|
|
|
|
With this option the library with automatically initialise the libcrypto async
|
|
|
|
sub-library (see L<ASYNC_start_job(3)>). This is a default option.
|
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_RDRAND
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
RDRAND engine (if available). This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_DYNAMIC
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
dynamic engine. This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_OPENSSL
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
openssl engine. This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_CRYPTODEV
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
cryptodev engine (if available). This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_CAPI
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
CAPI engine (if available). This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_PADLOCK
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
padlock engine (if available). This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2018-04-20 21:45:06 +08:00
|
|
|
=item OPENSSL_INIT_ENGINE_AFALG
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
With this option the library will automatically load and initialise the
|
2020-07-14 08:25:38 +08:00
|
|
|
AFALG engine. This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=item OPENSSL_INIT_ENGINE_ALL_BUILTIN
|
|
|
|
|
|
|
|
With this option the library will automatically load and initialise all the
|
2018-04-20 21:45:06 +08:00
|
|
|
built in engines listed above with the exception of the openssl and afalg
|
2020-07-14 08:25:38 +08:00
|
|
|
engines. This not a default option and is deprecated
|
|
|
|
in OpenSSL 3.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2017-07-01 01:55:08 +08:00
|
|
|
=item OPENSSL_INIT_ATFORK
|
2017-06-23 02:00:06 +08:00
|
|
|
|
2017-07-01 01:55:08 +08:00
|
|
|
With this option the library will register its fork handlers.
|
2017-06-23 02:00:06 +08:00
|
|
|
See OPENSSL_fork_prepare(3) for details.
|
|
|
|
|
2018-11-16 00:27:34 +08:00
|
|
|
=item OPENSSL_INIT_NO_ATEXIT
|
|
|
|
|
|
|
|
By default OpenSSL will attempt to clean itself up when the process exits via an
|
|
|
|
"atexit" handler. Using this option suppresses that behaviour. This means that
|
|
|
|
the application will have to clean up OpenSSL explicitly using
|
|
|
|
OPENSSL_cleanup().
|
|
|
|
|
2016-02-09 18:17:59 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
Multiple options may be combined together in a single call to
|
2016-02-11 00:17:01 +08:00
|
|
|
OPENSSL_init_crypto(). For example:
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2016-02-11 00:17:01 +08:00
|
|
|
OPENSSL_init_crypto(OPENSSL_INIT_NO_ADD_ALL_CIPHERS
|
|
|
|
| OPENSSL_INIT_NO_ADD_ALL_DIGESTS, NULL);
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
The OPENSSL_cleanup() function deinitialises OpenSSL (both libcrypto
|
2016-02-09 18:17:59 +08:00
|
|
|
and libssl). All resources allocated by OpenSSL are freed. Typically there
|
|
|
|
should be no need to call this function directly as it is initiated
|
|
|
|
automatically on application exit. This is done via the standard C library
|
2017-03-11 21:56:44 +08:00
|
|
|
atexit() function. In the event that the application will close in a manner
|
2016-02-09 18:17:59 +08:00
|
|
|
that will not call the registered atexit() handlers then the application should
|
2016-02-10 00:52:40 +08:00
|
|
|
call OPENSSL_cleanup() directly. Developers of libraries using OpenSSL
|
2016-02-09 18:17:59 +08:00
|
|
|
are discouraged from calling this function and should instead, typically, rely
|
|
|
|
on auto-deinitialisation. This is to avoid error conditions where both an
|
|
|
|
application and a library it depends on both use OpenSSL, and the library
|
|
|
|
deinitialises it before the application has finished using it.
|
|
|
|
|
2016-02-11 00:17:01 +08:00
|
|
|
Once OPENSSL_cleanup() has been called the library cannot be reinitialised.
|
|
|
|
Attempts to call OPENSSL_init_crypto() will fail and an ERR_R_INIT_FAIL error
|
|
|
|
will be added to the error stack. Note that because initialisation has failed
|
|
|
|
OpenSSL error strings will not be available, only an error code. This code can
|
|
|
|
be put through the openssl errstr command line application to produce a human
|
2019-11-02 04:26:05 +08:00
|
|
|
readable error (see L<openssl-errstr(1)>).
|
2016-02-11 00:17:01 +08:00
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
The OPENSSL_atexit() function enables the registration of a
|
|
|
|
function to be called during OPENSSL_cleanup(). Stop handlers are
|
2016-02-09 18:17:59 +08:00
|
|
|
called after deinitialisation of resources local to a thread, but before other
|
|
|
|
process wide resources are freed. In the event that multiple stop handlers are
|
|
|
|
registered, no guarantees are made about the order of execution.
|
|
|
|
|
2019-05-29 23:04:17 +08:00
|
|
|
The OPENSSL_thread_stop_ex() function deallocates resources associated
|
|
|
|
with the current thread for the given OPENSSL_CTX B<ctx>. The B<ctx> parameter
|
|
|
|
can be NULL in which case the default OPENSSL_CTX is used.
|
|
|
|
|
|
|
|
Typically, this function will be called automatically by the library when
|
|
|
|
the thread exits as long as the OPENSSL_CTX has not been freed before the thread
|
|
|
|
exits. If OPENSSL_CTX_free() is called OPENSSL_thread_stop_ex will be called
|
|
|
|
automatically for the current thread (but not any other threads that may have
|
|
|
|
used this OPENSSL_CTX).
|
|
|
|
|
|
|
|
OPENSSL_thread_stop_ex should be called on all threads that will exit after the
|
|
|
|
OPENSSL_CTX is freed.
|
|
|
|
Typically this is not necessary for the default OPENSSL_CTX (because all
|
|
|
|
resources are cleaned up on library exit) except if thread local resources
|
|
|
|
should be freed before library exit, or under the circumstances described in
|
|
|
|
the NOTES section below.
|
|
|
|
|
|
|
|
OPENSSL_thread_stop() is the same as OPENSSL_thread_stop_ex() except that the
|
|
|
|
default OPENSSL_CTX is always used.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2019-01-01 15:53:24 +08:00
|
|
|
The B<OPENSSL_INIT_LOAD_CONFIG> flag will load a configuration file, as with
|
|
|
|
L<CONF_modules_load_file(3)> with NULL filename and application name and the
|
|
|
|
B<CONF_MFLAGS_IGNORE_MISSING_FILE>, B<CONF_MFLAGS_IGNORE_RETURN_CODES> and
|
|
|
|
B<CONF_MFLAGS_DEFAULT_SECTION> flags.
|
|
|
|
The filename, application name, and flags can be customized by providing a
|
|
|
|
non-null B<OPENSSL_INIT_SETTINGS> object.
|
2019-07-30 23:42:53 +08:00
|
|
|
The object can be allocated via B<OPENSSL_INIT_new()>.
|
2019-01-01 15:53:24 +08:00
|
|
|
The B<OPENSSL_INIT_set_config_filename()> function can be used to specify a
|
2020-07-17 18:31:26 +08:00
|
|
|
nondefault filename, which is copied and need not refer to persistent storage.
|
2019-01-01 15:53:24 +08:00
|
|
|
Similarly, OPENSSL_INIT_set_config_appname() can be used to specify a
|
2020-07-17 18:31:26 +08:00
|
|
|
nondefault application name.
|
|
|
|
Finally, OPENSSL_INIT_set_file_flags can be used to specify nondefault flags.
|
2019-01-01 15:53:24 +08:00
|
|
|
If the B<CONF_MFLAGS_IGNORE_RETURN_CODES> flag is not included, any errors in
|
|
|
|
the configuration file will cause an error return from B<OPENSSL_init_crypto>
|
|
|
|
or indirectly L<OPENSSL_init_ssl(3)>.
|
|
|
|
The object can be released with OPENSSL_INIT_free() when done.
|
2016-02-10 22:55:48 +08:00
|
|
|
|
2016-02-09 18:17:59 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
Resources local to a thread are deallocated automatically when the thread exits
|
|
|
|
(e.g. in a pthreads environment, when pthread_exit() is called). On Windows
|
|
|
|
platforms this is done in response to a DLL_THREAD_DETACH message being sent to
|
2016-03-03 19:42:01 +08:00
|
|
|
the libcrypto32.dll entry point. Some windows functions may cause threads to exit
|
2016-02-09 18:17:59 +08:00
|
|
|
without sending this message (for example ExitProcess()). If the application
|
|
|
|
uses such functions, then the application must free up OpenSSL resources
|
Document the issue with threads and dlopen()
If using threads and OpenSSL is loaded via dlopen(), and subsequently
closed again via dlclose() *before* the threads are destroyed, then
OpenSSL will not free up the per thread resources. We need to document
this restriction, and provide some guidance on what to do about it.
I did some testing and discovered/verified a few of things (at least
this is the behaviour on Linux):
- Using OpenSSL via dlopen in a mutli-threaded app does leak memory if
threads are destroyed after dlcose() is called.
- In a single threaded environment, or if threads are destroyed prior to
dlclose() being called, then no memory is leaked
- Using the RTLD_NODELETE flag to dlopen solves the above problem
- Interestingly the OpenSSL atexit() handler gets called when dlclose()
is called rather than at application exit (I was worred that it might crash
if there was an atexit() handler for a function that has been unloaded)
- RTLD_NODELETE is a non-standard flag - but it does seem to be fairly
widely supported. As far as I could determine (via google), at least Linux,
Solaris, OpenBSD, FreeBSD, HP-UX all seem to support it.
I also tested on Windows (using LoadLibrary instead of dlopen and
FreeLibrary instead of dlclose) and experienced similar behaviour, except
that (AFAIK) there is no equivalent of RTLD_NODELETE on Windows.
GitHub Issue #653
Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-06-07 20:24:01 +08:00
|
|
|
directly via a call to OPENSSL_thread_stop() on each thread. Similarly this
|
|
|
|
message will also not be sent if OpenSSL is linked statically, and therefore
|
|
|
|
applications using static linking should also call OPENSSL_thread_stop() on each
|
|
|
|
thread. Additionally if OpenSSL is loaded dynamically via LoadLibrary() and the
|
|
|
|
threads are not destroyed until after FreeLibrary() is called then each thread
|
|
|
|
should call OPENSSL_thread_stop() prior to the FreeLibrary() call.
|
|
|
|
|
|
|
|
On Linux/Unix where OpenSSL has been loaded via dlopen() and the application is
|
|
|
|
multi-threaded and if dlclose() is subsequently called prior to the threads
|
|
|
|
being destroyed then OpenSSL will not be able to deallocate resources associated
|
|
|
|
with those threads. The application should either call OPENSSL_thread_stop() on
|
|
|
|
each thread prior to the dlclose() call, or alternatively the original dlopen()
|
|
|
|
call should use the RTLD_NODELETE flag (where available on the platform).
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2016-05-23 17:55:54 +08:00
|
|
|
The functions OPENSSL_init_crypto, OPENSSL_atexit() and
|
2016-06-13 09:49:40 +08:00
|
|
|
OPENSSL_INIT_set_config_appname() return 1 on success or 0 on error.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
L<OPENSSL_init_ssl(3)>
|
2016-02-09 18:17:59 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2016-02-10 00:52:40 +08:00
|
|
|
The OPENSSL_init_crypto(), OPENSSL_cleanup(), OPENSSL_atexit(),
|
2017-06-09 03:18:38 +08:00
|
|
|
OPENSSL_thread_stop(), OPENSSL_INIT_new(), OPENSSL_INIT_set_config_appname()
|
2016-05-23 17:55:54 +08:00
|
|
|
and OPENSSL_INIT_free() functions were added in OpenSSL 1.1.0.
|
2016-02-09 18:17:59 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-07-16 20:47:04 +08:00
|
|
|
Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|