| =pod |
| |
| =head1 NAME |
| |
| OPENSSL_malloc_init, |
| OPENSSL_malloc, OPENSSL_aligned_alloc, OPENSSL_zalloc, OPENSSL_realloc, |
| OPENSSL_malloc_array, OPENSSL_aligned_alloc_array, OPENSSL_calloc, |
| OPENSSL_realloc_array, OPENSSL_free, |
| OPENSSL_clear_realloc, OPENSSL_clear_realloc_array, |
| OPENSSL_clear_free, OPENSSL_cleanse, |
| CRYPTO_malloc, CRYPTO_aligned_alloc, CRYPTO_zalloc, |
| CRYPTO_malloc_array, CRYPTO_aligned_alloc_array, CRYPTO_calloc, |
| CRYPTO_realloc, CRYPTO_realloc_array, CRYPTO_free, |
| OPENSSL_strdup, OPENSSL_strndup, |
| OPENSSL_memdup, OPENSSL_strlcpy, OPENSSL_strlcat, OPENSSL_strtoul, |
| CRYPTO_strdup, CRYPTO_strndup, |
| OPENSSL_mem_debug_push, OPENSSL_mem_debug_pop, |
| CRYPTO_mem_debug_push, CRYPTO_mem_debug_pop, |
| CRYPTO_clear_realloc, CRYPTO_clear_realloc_array, CRYPTO_clear_free, |
| CRYPTO_malloc_fn, CRYPTO_realloc_fn, CRYPTO_free_fn, |
| CRYPTO_get_mem_functions, CRYPTO_set_mem_functions, |
| CRYPTO_get_alloc_counts, |
| CRYPTO_set_mem_debug, CRYPTO_mem_ctrl, |
| CRYPTO_mem_leaks, CRYPTO_mem_leaks_fp, CRYPTO_mem_leaks_cb, |
| OPENSSL_MALLOC_FAILURES, |
| OPENSSL_MALLOC_FD, |
| OPENSSL_MALLOC_SEED |
| - Memory allocation functions |
| |
| =head1 SYNOPSIS |
| |
| #include <openssl/crypto.h> |
| |
| int OPENSSL_malloc_init(void); |
| |
| void *OPENSSL_malloc(size_t num); |
| void *OPENSSL_aligned_alloc(size_t num, size_t alignment, void **freeptr); |
| void *OPENSSL_zalloc(size_t num); |
| void *OPENSSL_realloc(void *addr, size_t num); |
| void *OPENSSL_malloc_array(size_t num, size_t size); |
| void *OPENSSL_aligned_alloc_array(size_t num, size_t size, size_t alignment, |
| void **freeptr); |
| void *OPENSSL_calloc(size_t num, size_t size); |
| void *OPENSSL_realloc_array(void *addr, size_t num, size_t size); |
| void OPENSSL_free(void *addr); |
| char *OPENSSL_strdup(const char *str); |
| char *OPENSSL_strndup(const char *str, size_t s); |
| size_t OPENSSL_strlcat(char *dst, const char *src, size_t size); |
| size_t OPENSSL_strlcpy(char *dst, const char *src, size_t size); |
| int OPENSSL_strtoul(char *src, char **endptr, int base, unsigned long *num); |
| void *OPENSSL_memdup(void *data, size_t s); |
| void *OPENSSL_clear_realloc(void *p, size_t old_len, size_t num); |
| void *OPENSSL_clear_realloc_array(void *p, size_t old_len, size_t num, |
| size_t size); |
| void OPENSSL_clear_free(void *str, size_t num); |
| void OPENSSL_cleanse(void *ptr, size_t len); |
| |
| void *CRYPTO_malloc(size_t num, const char *file, int line); |
| void *CRYPTO_aligned_alloc(size_t num, size_t align, void **freeptr, |
| const char *file, int line); |
| void *CRYPTO_zalloc(size_t num, const char *file, int line); |
| void *CRYPTO_realloc(void *p, size_t num, const char *file, int line); |
| void *CRYPTO_malloc_array(size_t num, size_t size, const char *file, int line); |
| void *CRYPTO_aligned_alloc_array(size_t num, size_t size, size_t align, |
| void **freeptr, const char *file, int line); |
| void *CRYPTO_calloc(size_t num, size_t size, const char *file, int line); |
| void *CRYPTO_realloc_array(void *p, size_t num, size_t size, |
| const char *file, int line); |
| void CRYPTO_free(void *str, const char *file, int line); |
| char *CRYPTO_strdup(const char *p, const char *file, int line); |
| char *CRYPTO_strndup(const char *p, size_t num, const char *file, int line); |
| void *CRYPTO_clear_realloc(void *p, size_t old_len, size_t num, |
| const char *file, int line); |
| void *CRYPTO_clear_realloc_array(void *p, size_t old_len, size_t num, |
| size_t size, const char *file, int line); |
| void CRYPTO_clear_free(void *str, size_t num, const char *file, int line); |
| |
| typedef void *(*CRYPTO_malloc_fn)(size_t num, const char *file, int line); |
| typedef void *(*CRYPTO_realloc_fn)(void *addr, size_t num, const char *file, |
| int line); |
| typedef void (*CRYPTO_free_fn)(void *addr, const char *file, int line); |
| void CRYPTO_get_mem_functions(CRYPTO_malloc_fn *malloc_fn, |
| CRYPTO_realloc_fn *realloc_fn, |
| CRYPTO_free_fn *free_fn); |
| int CRYPTO_set_mem_functions(CRYPTO_malloc_fn malloc_fn, |
| CRYPTO_realloc_fn realloc_fn, |
| CRYPTO_free_fn free_fn); |
| |
| void CRYPTO_get_alloc_counts(int *mcount, int *rcount, int *fcount); |
| |
| env OPENSSL_MALLOC_FAILURES=... <application> |
| env OPENSSL_MALLOC_FD=... <application> |
| env OPENSSL_MALLOC_SEED=... <application> |
| |
| The following functions have been deprecated since OpenSSL 3.0, and can be |
| hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, |
| see L<openssl_user_macros(7)>: |
| |
| int CRYPTO_mem_leaks(BIO *b); |
| int CRYPTO_mem_leaks_fp(FILE *fp); |
| int CRYPTO_mem_leaks_cb(int (*cb)(const char *str, size_t len, void *u), |
| void *u); |
| |
| int CRYPTO_set_mem_debug(int onoff); |
| int CRYPTO_mem_ctrl(int mode); |
| int OPENSSL_mem_debug_push(const char *info); |
| int OPENSSL_mem_debug_pop(void); |
| int CRYPTO_mem_debug_push(const char *info, const char *file, int line); |
| int CRYPTO_mem_debug_pop(void); |
| |
| =head1 DESCRIPTION |
| |
| OpenSSL memory allocation is handled by the B<OPENSSL_xxx> API. These are |
| generally macro's that add the standard C B<__FILE__> and B<__LINE__> |
| parameters and call a lower-level B<CRYPTO_xxx> API. |
| Some functions do not add those parameters, but exist for consistency. |
| |
| OPENSSL_malloc_init() does nothing and does not need to be called. It is |
| included for compatibility with older versions of OpenSSL. |
| |
| OPENSSL_malloc(), OPENSSL_realloc(), and OPENSSL_free() are like the |
| C malloc(), realloc(), and free() functions. |
| OPENSSL_zalloc() calls memset() to zero the memory before returning. |
| |
| OPENSSL_aligned_alloc() operates just as OPENSSL_malloc() does, but it |
| allows for the caller to specify an alignment value, for instances in |
| which the default alignment of malloc is insufficient for the caller's |
| needs. Note, the alignment value must be a power of 2 no larger than 65536. |
| NOTE: the call to OPENSSL_aligned_alloc() accepts a 3rd argument, I<freeptr> |
| which must point to a void pointer. On some platforms, there is no available |
| library call to obtain memory allocations with alignment greater than what |
| malloc provides. In this case, OPENSSL_aligned_alloc() implements its own |
| alignment routine, allocating additional memory and offsetting the returned |
| pointer to be on the requested alignment boundary. In order to safely free |
| allocations made by this method, the caller must return the value |
| in the I<freeptr> variable, rather than the returned pointer. |
| |
| OPENSSL_clear_realloc() and OPENSSL_clear_free() should be used |
| when the buffer at B<addr> holds sensitive information. |
| The old buffer is filled with zero's by calling OPENSSL_cleanse() |
| before ultimately calling OPENSSL_free(). If the argument to OPENSSL_free() is |
| NULL, nothing is done. |
| |
| OPENSSL_malloc_array(), OPENSSL_calloc(), OPENSSL_aligned_alloc_array(), |
| OPENSSL_realloc_array(), and OPENSSL_clear_realloc_array() are variants |
| of OPENSSL_malloc(), OPENSSL_zalloc(), OPENSSL_aligned_alloc(), |
| OPENSSL_realloc(), and OPENSSL_clear_realloc(), respectively, that accept |
| an additional parameter, B<size>, which enables memory allocation |
| operations for an array of B<num> members B<size> bytes each; |
| these functions return an error if multiplication of B<num> and B<size> |
| leads to an integer overflow, thus preventing allocations of an incorrect size. |
| |
| OPENSSL_cleanse() fills B<ptr> of size B<len> with a string of 0's. |
| Use OPENSSL_cleanse() with care if the memory is a mapping of a file. |
| If the storage controller uses write compression, then it's possible |
| that sensitive tail bytes will survive zeroization because the block of |
| zeros will be compressed. If the storage controller uses wear leveling, |
| then the old sensitive data will not be overwritten; rather, a block of |
| 0's will be written at a new physical location. |
| |
| OPENSSL_strdup(), OPENSSL_strndup() and OPENSSL_memdup() are like the |
| equivalent C functions, except that memory is allocated by calling the |
| OPENSSL_malloc() and should be released by calling OPENSSL_free(). |
| |
| OPENSSL_strlcpy(), |
| OPENSSL_strlcat() and OPENSSL_strnlen() are equivalents of the common C |
| library functions and are provided for portability. |
| |
| OPENSSL_strtoul() is a wrapper around the POSIX function strtoul, with the same |
| behaviors listed in the POSIX documentation, with the additional behavior that |
| it validates the input I<str> and I<num> parameters for not being NULL, and confirms |
| that at least a single byte of input has been consumed in the translation, |
| returning an error in the event that no bytes were consumed. |
| |
| If no allocations have been done, it is possible to "swap out" the default |
| implementations for OPENSSL_malloc(), OPENSSL_realloc() and OPENSSL_free() |
| and replace them with alternate versions. |
| CRYPTO_get_mem_functions() function fills in the given arguments with the |
| function pointers for the current implementations. |
| With CRYPTO_set_mem_functions(), you can specify a different set of functions. |
| If any of B<malloc_fn>, B<realloc_fn>, or B<free_fn> are NULL, then |
| the function is not changed. |
| While it's permitted to swap out only a few and not all the functions |
| with CRYPTO_set_mem_functions(), it's recommended to swap them all out |
| at once. |
| |
| If the library is built with the C<crypto-mdebug> option, then one |
| function, CRYPTO_get_alloc_counts(), and three additional environment |
| variables, B<OPENSSL_MALLOC_FAILURES>, B<OPENSSL_MALLOC_FD>, |
| and B<OPENSSL_MALLOC_SEED>, are available. |
| |
| The function CRYPTO_get_alloc_counts() fills in the number of times |
| each of CRYPTO_malloc(), CRYPTO_realloc(), and CRYPTO_free() have been |
| called, into the values pointed to by B<mcount>, B<rcount>, and B<fcount>, |
| respectively. If a pointer is NULL, then the corresponding count is not stored. |
| |
| The variable |
| B<OPENSSL_MALLOC_FAILURES> controls how often allocations should fail. |
| It is a set of fields separated by semicolons, which each field is a count |
| (defaulting to zero) and an optional atsign and percentage (interpreted |
| as a floating point number that is rounded up to two decimal digits |
| of precision, defaulting to 100). If the count is zero, then it lasts forever. |
| For example, C<100;@0.258> or C<100@0;0@0.258> means the first 100 allocations |
| pass, then all other allocations (until the program exits or crashes) have |
| a 0.26% chance of failing, with random(3) used as a source of randomness. |
| The length of the value of B<OPENSSL_MALLOC_FAILURES> must be 256 or fewer |
| characters. |
| |
| If the variable B<OPENSSL_MALLOC_FD> is parsed as a positive integer, then |
| it is taken as an open file descriptor. This is used in conjunction with |
| B<OPENSSL_MALLOC_FAILURES> described above. For every allocation it will log |
| details about how many allocations there have been so far, what percentage |
| chance there is for this allocation failing, and whether it has actually failed. |
| The following example in classic shell syntax shows how to use this (will not |
| work on all platforms): |
| |
| OPENSSL_MALLOC_FAILURES='200;@10' |
| export OPENSSL_MALLOC_FAILURES |
| OPENSSL_MALLOC_FD=3 |
| export OPENSSL_MALLOC_FD |
| ...app invocation... 3>/tmp/log$$ |
| |
| If the environment variable B<OPENSSL_MALLOC_SEED> is set, its value |
| is interpreted as an integer using atoi(3) and supplied to the srandom(3) |
| call for the random number generator initialisation. |
| |
| =head1 RETURN VALUES |
| |
| OPENSSL_malloc_init(), OPENSSL_free(), OPENSSL_clear_free() |
| CRYPTO_free(), CRYPTO_clear_free() and CRYPTO_get_mem_functions() |
| return no value. |
| |
| OPENSSL_malloc(), OPENSSL_aligned_alloc(), OPENSSL_zalloc(), OPENSSL_realloc(), |
| OPENSSL_malloc_array(), OPENSSL_aligned_alloc_array(), OPENSSL_calloc(), |
| OPENSSL_realloc_array(), |
| OPENSSL_clear_realloc(), OPENSSL_clear_realloc_array(), |
| CRYPTO_malloc(), CRYPTO_zalloc(), CRYPTO_realloc(), |
| CRYPTO_malloc_array(), CRYPTO_calloc(), CRYPTO_realloc_array(), |
| CRYPTO_clear_realloc(), CRYPTO_clear_realloc_array(), |
| OPENSSL_strdup(), and OPENSSL_strndup() |
| return a pointer to allocated memory or NULL on error. |
| |
| OPENSSL_aligned_alloc() and OPENSSL_aligned_alloc_array() set B<freeptr> |
| to NULL on error. |
| |
| CRYPTO_set_mem_functions() returns 1 on success or 0 on failure (almost |
| always because allocations have already happened). |
| |
| CRYPTO_mem_leaks(), CRYPTO_mem_leaks_fp(), CRYPTO_mem_leaks_cb(), |
| CRYPTO_set_mem_debug(), and CRYPTO_mem_ctrl() are deprecated and are no-ops that |
| always return -1. |
| OPENSSL_mem_debug_push(), OPENSSL_mem_debug_pop(), |
| CRYPTO_mem_debug_push(), and CRYPTO_mem_debug_pop() |
| are deprecated and are no-ops that always return 0. |
| |
| OPENSSL_strtoul() returns 1 on success and 0 in the event that an error has |
| occurred. Specifically, 0 is returned in the following events: |
| |
| =over 4 |
| |
| =item * |
| |
| If the underlying call to strtoul returned a non zero errno value |
| |
| =item * |
| |
| If the translation did not consume the entire input string, and the passed |
| endptr value was NULL |
| |
| =item * |
| |
| If no characters were consumed in the translation |
| |
| =back |
| |
| Note that a success condition does not imply that the expected |
| translation has been performed. For instance calling |
| |
| OPENSSL_strtoul("0x12345", &endptr, 10, &num); |
| |
| will result in a successful translation with num having the value 0, and |
| *endptr = 'x'. Be sure to validate how much data was consumed when calling this |
| function. |
| |
| =head1 HISTORY |
| |
| OPENSSL_mem_debug_push(), OPENSSL_mem_debug_pop(), |
| CRYPTO_mem_debug_push(), CRYPTO_mem_debug_pop(), |
| CRYPTO_mem_leaks(), CRYPTO_mem_leaks_fp(), |
| CRYPTO_mem_leaks_cb(), CRYPTO_set_mem_debug(), CRYPTO_mem_ctrl() |
| were deprecated in OpenSSL 3.0. |
| The memory-leak checking has been deprecated in OpenSSL 3.0 in favor of |
| clang's memory and leak sanitizer. |
| OPENSSL_aligned_alloc(), CRYPTO_aligned_alloc(), OPENSSL_strtoul() were |
| added in OpenSSL 3.4. |
| OPENSSL_malloc_array(), OPENSSL_calloc(), OPENSSL_aligned_alloc_array(), |
| OPENSSL_realloc_array(), OPENSSL_clear_realloc_array(), CRYPTO_malloc_array(), |
| CRYPTO_calloc(), CRYPTO_aligned_alloc_array(), CRYPTO_realloc_array(), |
| CRYPTO_clear_realloc_array() were added in OpenSSL 3.6. |
| |
| Before OpenSSL 3.6, there was an OPENSSL_aligned_malloc() requirement |
| that the size must be a multiple of the alignment, that was enforced |
| only on platforms that do not provide posix_memalign(3), but do provide |
| aligned_alloc(3). |
| |
| Before OpenSSL 4.0, the call to OPENSSL_aligned_alloc() may fail for reasons |
| other than memory exhaustion or incorrect arguments, depending on the underlying |
| implementation, and, most notably, OpenSSL library's build configuration: |
| for example, it always returned C<NULL> without setting any error if OpenSSL |
| was built with C<OPENSSL_SMALL_FOOTPRINT> macro defined. Consequently, |
| the caller may need to fall back to a non-aligned memory allocation |
| (and open-code the alignment routine if the alignment is a requirement). |
| |
| Before OpenSSL 4.0, the call to OPENSSL_aligned_alloc() did not have |
| an explicit upper limit on the value of I<alignment>. |
| |
| =head1 COPYRIGHT |
| |
| Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved. |
| |
| Licensed under the Apache License 2.0 (the "License"). You may not use |
| this file except in compliance with the License. You can obtain a copy |
| in the file LICENSE in the source distribution or at |
| L<https://www.openssl.org/source/license.html>. |
| |
| =cut |