2015-01-22 11:40:55 +08:00
|
|
|
/*
|
2020-04-23 20:55:52 +08:00
|
|
|
* Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2017-06-15 22:16:46 +08:00
|
|
|
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
|
2000-10-27 05:07:28 +08:00
|
|
|
*
|
2018-12-06 20:39:00 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:52:22 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2000-10-27 05:07:28 +08:00
|
|
|
*/
|
2016-05-18 02:52:22 +08:00
|
|
|
|
2020-07-14 07:40:29 +08:00
|
|
|
/* We need to use some engine deprecated APIs */
|
|
|
|
#define OPENSSL_SUPPRESS_DEPRECATED
|
|
|
|
|
2019-09-28 06:45:40 +08:00
|
|
|
#include "eng_local.h"
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* The linked-list of pointers to engine types. engine_list_head incorporates
|
|
|
|
* an implicit structural reference but engine_list_tail does not - the
|
2017-05-14 17:17:30 +08:00
|
|
|
* latter is a computational optimization and only points to something that
|
|
|
|
* is already pointed to by its predecessor in the list (or engine_list_head
|
2015-01-22 11:40:55 +08:00
|
|
|
* itself). In the same way, the use of the "prev" pointer in each ENGINE is
|
|
|
|
* to save excessive list iteration, it doesn't correspond to an extra
|
|
|
|
* structural reference. Hence, engine_list_head, and each non-null "next"
|
|
|
|
* pointer account for the list itself assuming exactly 1 structural
|
|
|
|
* reference on each list member.
|
|
|
|
*/
|
2000-10-27 05:07:28 +08:00
|
|
|
static ENGINE *engine_list_head = NULL;
|
|
|
|
static ENGINE *engine_list_tail = NULL;
|
2001-09-26 04:00:51 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* This cleanup function is only needed internally. If it should be called,
|
2016-04-12 19:20:16 +08:00
|
|
|
* we register it with the "engine_cleanup_int()" stack to be called during
|
2015-01-22 11:40:55 +08:00
|
|
|
* cleanup.
|
|
|
|
*/
|
2001-09-26 04:00:51 +08:00
|
|
|
|
|
|
|
static void engine_list_cleanup(void)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *iterator = engine_list_head;
|
2001-09-26 04:00:51 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
while (iterator != NULL) {
|
|
|
|
ENGINE_remove(iterator);
|
|
|
|
iterator = engine_list_head;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* These static functions starting with a lower case "engine_" always take
|
2016-03-09 00:44:34 +08:00
|
|
|
* place when global_engine_lock has been locked up.
|
2015-01-22 11:40:55 +08:00
|
|
|
*/
|
2000-10-27 05:07:28 +08:00
|
|
|
static int engine_list_add(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
int conflict = 0;
|
|
|
|
ENGINE *iterator = NULL;
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
iterator = engine_list_head;
|
|
|
|
while (iterator && !conflict) {
|
|
|
|
conflict = (strcmp(iterator->id, e->id) == 0);
|
|
|
|
iterator = iterator->next;
|
|
|
|
}
|
|
|
|
if (conflict) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_CONFLICTING_ENGINE_ID);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (engine_list_head == NULL) {
|
|
|
|
/* We are adding to an empty list. */
|
|
|
|
if (engine_list_tail) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INTERNAL_LIST_ERROR);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
engine_list_head = e;
|
|
|
|
e->prev = NULL;
|
|
|
|
/*
|
|
|
|
* The first time the list allocates, we should register the cleanup.
|
|
|
|
*/
|
|
|
|
engine_cleanup_add_last(engine_list_cleanup);
|
|
|
|
} else {
|
|
|
|
/* We are adding to the tail of an existing list. */
|
|
|
|
if ((engine_list_tail == NULL) || (engine_list_tail->next != NULL)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INTERNAL_LIST_ERROR);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
engine_list_tail->next = e;
|
|
|
|
e->prev = engine_list_tail;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Having the engine in the list assumes a structural reference.
|
|
|
|
*/
|
|
|
|
e->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(e, 0, 1);
|
|
|
|
/* However it came to be, e is the last item in the list. */
|
|
|
|
engine_list_tail = e;
|
2015-01-22 11:40:55 +08:00
|
|
|
e->next = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
|
|
|
static int engine_list_remove(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *iterator;
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* We need to check that e is in our linked list! */
|
|
|
|
iterator = engine_list_head;
|
|
|
|
while (iterator && (iterator != e))
|
|
|
|
iterator = iterator->next;
|
|
|
|
if (iterator == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_ENGINE_IS_NOT_IN_LIST);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* un-link e from the chain. */
|
|
|
|
if (e->next)
|
|
|
|
e->next->prev = e->prev;
|
|
|
|
if (e->prev)
|
|
|
|
e->prev->next = e->next;
|
|
|
|
/* Correct our head/tail if necessary. */
|
|
|
|
if (engine_list_head == e)
|
|
|
|
engine_list_head = e->next;
|
|
|
|
if (engine_list_tail == e)
|
|
|
|
engine_list_tail = e->prev;
|
|
|
|
engine_free_util(e, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
|
|
|
/* Get the first/last "ENGINE" type available. */
|
|
|
|
ENGINE *ENGINE_get_first(void)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *ret;
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2016-07-20 01:42:11 +08:00
|
|
|
if (!RUN_ONCE(&engine_lock_init, do_engine_lock_init)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
|
2016-07-20 01:42:11 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
ret = engine_list_head;
|
|
|
|
if (ret) {
|
|
|
|
ret->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(ret, 0, 1);
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2001-09-26 04:00:51 +08:00
|
|
|
|
2000-10-27 05:07:28 +08:00
|
|
|
ENGINE *ENGINE_get_last(void)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *ret;
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2016-07-20 01:42:11 +08:00
|
|
|
if (!RUN_ONCE(&engine_lock_init, do_engine_lock_init)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
|
2016-07-20 01:42:11 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
ret = engine_list_tail;
|
|
|
|
if (ret) {
|
|
|
|
ret->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(ret, 0, 1);
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
|
|
|
/* Iterate to the next/previous "ENGINE" type (NULL = end of the list). */
|
|
|
|
ENGINE *ENGINE_get_next(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *ret = NULL;
|
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
ret = e->next;
|
|
|
|
if (ret) {
|
2016-02-06 04:23:54 +08:00
|
|
|
/* Return a valid structural reference to the next ENGINE */
|
2015-01-22 11:40:55 +08:00
|
|
|
ret->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(ret, 0, 1);
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
/* Release the structural reference to the previous ENGINE */
|
|
|
|
ENGINE_free(e);
|
|
|
|
return ret;
|
|
|
|
}
|
2001-09-26 04:00:51 +08:00
|
|
|
|
2000-10-27 05:07:28 +08:00
|
|
|
ENGINE *ENGINE_get_prev(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *ret = NULL;
|
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
ret = e->prev;
|
|
|
|
if (ret) {
|
|
|
|
/* Return a valid structural reference to the next ENGINE */
|
|
|
|
ret->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(ret, 0, 1);
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
/* Release the structural reference to the previous ENGINE */
|
|
|
|
ENGINE_free(e);
|
|
|
|
return ret;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
|
|
|
/* Add another "ENGINE" type into the list. */
|
|
|
|
int ENGINE_add(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
int to_return = 1;
|
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if ((e->id == NULL) || (e->name == NULL)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_ID_OR_NAME_MISSING);
|
2015-10-08 17:53:07 +08:00
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
if (!engine_list_add(e)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INTERNAL_LIST_ERROR);
|
2015-01-22 11:40:55 +08:00
|
|
|
to_return = 0;
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
return to_return;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
|
|
|
/* Remove an existing "ENGINE" type from the array. */
|
|
|
|
int ENGINE_remove(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
int to_return = 1;
|
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
if (!engine_list_remove(e)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ENGINE_R_INTERNAL_LIST_ERROR);
|
2015-01-22 11:40:55 +08:00
|
|
|
to_return = 0;
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
return to_return;
|
|
|
|
}
|
2000-10-27 05:07:28 +08:00
|
|
|
|
2001-09-26 04:00:51 +08:00
|
|
|
static void engine_cpy(ENGINE *dest, const ENGINE *src)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
dest->id = src->id;
|
|
|
|
dest->name = src->name;
|
|
|
|
dest->rsa_meth = src->rsa_meth;
|
2001-09-26 04:00:51 +08:00
|
|
|
#ifndef OPENSSL_NO_DSA
|
2015-01-22 11:40:55 +08:00
|
|
|
dest->dsa_meth = src->dsa_meth;
|
2001-09-26 04:00:51 +08:00
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_DH
|
2015-01-22 11:40:55 +08:00
|
|
|
dest->dh_meth = src->dh_meth;
|
2002-02-14 02:21:51 +08:00
|
|
|
#endif
|
2015-03-11 07:09:27 +08:00
|
|
|
#ifndef OPENSSL_NO_EC
|
2015-10-28 20:29:43 +08:00
|
|
|
dest->ec_meth = src->ec_meth;
|
2001-09-26 04:00:51 +08:00
|
|
|
#endif
|
2015-01-22 11:40:55 +08:00
|
|
|
dest->rand_meth = src->rand_meth;
|
|
|
|
dest->ciphers = src->ciphers;
|
|
|
|
dest->digests = src->digests;
|
|
|
|
dest->pkey_meths = src->pkey_meths;
|
|
|
|
dest->destroy = src->destroy;
|
|
|
|
dest->init = src->init;
|
|
|
|
dest->finish = src->finish;
|
|
|
|
dest->ctrl = src->ctrl;
|
|
|
|
dest->load_privkey = src->load_privkey;
|
|
|
|
dest->load_pubkey = src->load_pubkey;
|
|
|
|
dest->cmd_defns = src->cmd_defns;
|
|
|
|
dest->flags = src->flags;
|
|
|
|
}
|
2001-09-26 04:00:51 +08:00
|
|
|
|
2000-10-27 05:07:28 +08:00
|
|
|
ENGINE *ENGINE_by_id(const char *id)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
ENGINE *iterator;
|
|
|
|
char *load_dir = NULL;
|
|
|
|
if (id == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
2020-04-14 10:25:34 +08:00
|
|
|
ENGINE_load_builtin_engines();
|
|
|
|
|
2016-07-20 01:42:11 +08:00
|
|
|
if (!RUN_ONCE(&engine_lock_init, do_engine_lock_init)) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_MALLOC_FAILURE);
|
2016-07-20 01:42:11 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_write_lock(global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
iterator = engine_list_head;
|
|
|
|
while (iterator && (strcmp(id, iterator->id) != 0))
|
|
|
|
iterator = iterator->next;
|
2015-10-30 19:12:26 +08:00
|
|
|
if (iterator != NULL) {
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* We need to return a structural reference. If this is an ENGINE
|
|
|
|
* type that returns copies, make a duplicate - otherwise increment
|
|
|
|
* the existing ENGINE's reference count.
|
|
|
|
*/
|
|
|
|
if (iterator->flags & ENGINE_FLAGS_BY_ID_COPY) {
|
|
|
|
ENGINE *cp = ENGINE_new();
|
2015-10-30 19:12:26 +08:00
|
|
|
if (cp == NULL)
|
2015-01-22 11:40:55 +08:00
|
|
|
iterator = NULL;
|
|
|
|
else {
|
|
|
|
engine_cpy(cp, iterator);
|
|
|
|
iterator = cp;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
iterator->struct_ref++;
|
2016-02-01 02:49:39 +08:00
|
|
|
engine_ref_debug(iterator, 0, 1);
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
|
|
|
}
|
2016-03-09 00:44:34 +08:00
|
|
|
CRYPTO_THREAD_unlock(global_engine_lock);
|
2015-10-30 19:12:26 +08:00
|
|
|
if (iterator != NULL)
|
2015-01-22 11:40:55 +08:00
|
|
|
return iterator;
|
|
|
|
/*
|
2016-02-06 04:23:54 +08:00
|
|
|
* Prevent infinite recursion if we're looking for the dynamic engine.
|
2015-01-22 11:40:55 +08:00
|
|
|
*/
|
|
|
|
if (strcmp(id, "dynamic")) {
|
2018-09-24 09:21:18 +08:00
|
|
|
if ((load_dir = ossl_safe_getenv("OPENSSL_ENGINES")) == NULL)
|
2015-01-22 11:40:55 +08:00
|
|
|
load_dir = ENGINESDIR;
|
|
|
|
iterator = ENGINE_by_id("dynamic");
|
|
|
|
if (!iterator || !ENGINE_ctrl_cmd_string(iterator, "ID", id, 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "DIR_LOAD", "2", 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "DIR_ADD",
|
|
|
|
load_dir, 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "LIST_ADD", "1", 0) ||
|
|
|
|
!ENGINE_ctrl_cmd_string(iterator, "LOAD", NULL, 0))
|
|
|
|
goto notfound;
|
|
|
|
return iterator;
|
|
|
|
}
|
|
|
|
notfound:
|
|
|
|
ENGINE_free(iterator);
|
2020-11-04 23:14:00 +08:00
|
|
|
ERR_raise_data(ERR_LIB_ENGINE, ENGINE_R_NO_SUCH_ENGINE, "id=%s", id);
|
2015-01-22 11:40:55 +08:00
|
|
|
return NULL;
|
|
|
|
/* EEK! Experimental code ends */
|
|
|
|
}
|
2002-10-16 09:29:37 +08:00
|
|
|
|
|
|
|
int ENGINE_up_ref(ENGINE *e)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
2016-03-09 00:44:34 +08:00
|
|
|
int i;
|
2015-01-22 11:40:55 +08:00
|
|
|
if (e == NULL) {
|
2020-11-04 19:23:19 +08:00
|
|
|
ERR_raise(ERR_LIB_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2016-08-27 22:01:08 +08:00
|
|
|
CRYPTO_UP_REF(&e->struct_ref, &i, global_engine_lock);
|
2015-01-22 11:40:55 +08:00
|
|
|
return 1;
|
|
|
|
}
|