Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Diff: wolfcrypt/src/memory.c
- Revision:
- 17:ff9d1e86ad5f
- Parent:
- 16:048e5e270a58
--- a/wolfcrypt/src/memory.c Tue Nov 19 14:32:16 2019 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,955 +0,0 @@
-/* memory.c
- *
- * Copyright (C) 2006-2017 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
-
-
-#ifdef HAVE_CONFIG_H
- #include <config.h>
-#endif
-
-#include <wolfssl/wolfcrypt/settings.h>
-
-/* check old macros @wc_fips */
-#if defined(USE_CYASSL_MEMORY) && !defined(USE_WOLFSSL_MEMORY)
- #define USE_WOLFSSL_MEMORY
-#endif
-#if defined(CYASSL_MALLOC_CHECK) && !defined(WOLFSSL_MALLOC_CHECK)
- #define WOLFSSL_MALLOC_CHECK
-#endif
-
-#ifdef USE_WOLFSSL_MEMORY
-
-#include <wolfssl/wolfcrypt/memory.h>
-#include <wolfssl/wolfcrypt/error-crypt.h>
-#include <wolfssl/wolfcrypt/logging.h>
-
-#if defined(WOLFSSL_MALLOC_CHECK) || defined(WOLFSSL_TRACK_MEMORY_FULL)
- #include <stdio.h>
-#endif
-
-
-/* Set these to default values initially. */
-static wolfSSL_Malloc_cb malloc_function = NULL;
-static wolfSSL_Free_cb free_function = NULL;
-static wolfSSL_Realloc_cb realloc_function = NULL;
-
-int wolfSSL_SetAllocators(wolfSSL_Malloc_cb mf,
- wolfSSL_Free_cb ff,
- wolfSSL_Realloc_cb rf)
-{
- int res = 0;
-
- if (mf)
- malloc_function = mf;
- else
- res = BAD_FUNC_ARG;
-
- if (ff)
- free_function = ff;
- else
- res = BAD_FUNC_ARG;
-
- if (rf)
- realloc_function = rf;
- else
- res = BAD_FUNC_ARG;
-
- return res;
-}
-
-int wolfSSL_ResetAllocators(void)
-{
- /* allow nulls to be set for callbacks to restore defaults */
- malloc_function = NULL;
- free_function = NULL;
- realloc_function = NULL;
-
- return 0;
-}
-
-int wolfSSL_GetAllocators(wolfSSL_Malloc_cb* mf,
- wolfSSL_Free_cb* ff,
- wolfSSL_Realloc_cb* rf)
-{
- if (mf) *mf = malloc_function;
- if (ff) *ff = free_function;
- if (rf) *rf = realloc_function;
- return 0;
-}
-
-#ifndef WOLFSSL_STATIC_MEMORY
-#ifdef WOLFSSL_DEBUG_MEMORY
-void* wolfSSL_Malloc(size_t size, const char* func, unsigned int line)
-#else
-void* wolfSSL_Malloc(size_t size)
-#endif
-{
- void* res = 0;
-
- if (malloc_function) {
- #ifdef WOLFSSL_DEBUG_MEMORY
- res = malloc_function(size, func, line);
- #else
- res = malloc_function(size);
- #endif
- }
- else {
- #ifndef WOLFSSL_NO_MALLOC
- res = malloc(size);
- #else
- WOLFSSL_MSG("No malloc available");
- #endif
- }
-
- #ifdef WOLFSSL_MALLOC_CHECK
- if (res == NULL)
- puts("wolfSSL_malloc failed");
- #endif
-
- return res;
-}
-
-#ifdef WOLFSSL_DEBUG_MEMORY
-void wolfSSL_Free(void *ptr, const char* func, unsigned int line)
-#else
-void wolfSSL_Free(void *ptr)
-#endif
-{
- if (free_function) {
- #ifdef WOLFSSL_DEBUG_MEMORY
- free_function(ptr, func, line);
- #else
- free_function(ptr);
- #endif
- }
- else {
- #ifndef WOLFSSL_NO_MALLOC
- free(ptr);
- #else
- WOLFSSL_MSG("No free available");
- #endif
- }
-}
-
-#ifdef WOLFSSL_DEBUG_MEMORY
-void* wolfSSL_Realloc(void *ptr, size_t size, const char* func, unsigned int line)
-#else
-void* wolfSSL_Realloc(void *ptr, size_t size)
-#endif
-{
- void* res = 0;
-
- if (realloc_function) {
- #ifdef WOLFSSL_DEBUG_MEMORY
- res = realloc_function(ptr, size, func, line);
- #else
- res = realloc_function(ptr, size);
- #endif
- }
- else {
- #ifndef WOLFSSL_NO_MALLOC
- res = realloc(ptr, size);
- #else
- WOLFSSL_MSG("No realloc available");
- #endif
- }
-
- return res;
-}
-#endif /* WOLFSSL_STATIC_MEMORY */
-
-#ifdef WOLFSSL_STATIC_MEMORY
-
-struct wc_Memory {
- byte* buffer;
- struct wc_Memory* next;
- word32 sz;
-};
-
-
-/* returns amount of memory used on success. On error returns negative value
- wc_Memory** list is the list that new buckets are prepended to
- */
-static int create_memory_buckets(byte* buffer, word32 bufSz,
- word32 buckSz, word32 buckNum, wc_Memory** list) {
- word32 i;
- byte* pt = buffer;
- int ret = 0;
- word32 memSz = (word32)sizeof(wc_Memory);
- word32 padSz = -(int)memSz & (WOLFSSL_STATIC_ALIGN - 1);
-
- /* if not enough space available for bucket size then do not try */
- if (buckSz + memSz + padSz > bufSz) {
- return ret;
- }
-
- for (i = 0; i < buckNum; i++) {
- if ((buckSz + memSz + padSz) <= (bufSz - ret)) {
- /* create a new struct and set its values */
- wc_Memory* mem = (struct wc_Memory*)(pt);
- mem->sz = buckSz;
- mem->buffer = (byte*)pt + padSz + memSz;
- mem->next = NULL;
-
- /* add the newly created struct to front of list */
- if (*list == NULL) {
- *list = mem;
- } else {
- mem->next = *list;
- *list = mem;
- }
-
- /* advance pointer and keep track of memory used */
- ret += buckSz + padSz + memSz;
- pt += buckSz + padSz + memSz;
- }
- else {
- break; /* not enough space left for more buckets of this size */
- }
- }
-
- return ret;
-}
-
-int wolfSSL_init_memory_heap(WOLFSSL_HEAP* heap)
-{
- word32 wc_MemSz[WOLFMEM_DEF_BUCKETS] = { WOLFMEM_BUCKETS };
- word32 wc_Dist[WOLFMEM_DEF_BUCKETS] = { WOLFMEM_DIST };
-
- if (heap == NULL) {
- return BAD_FUNC_ARG;
- }
-
- XMEMSET(heap, 0, sizeof(WOLFSSL_HEAP));
-
- XMEMCPY(heap->sizeList, wc_MemSz, sizeof(wc_MemSz));
- XMEMCPY(heap->distList, wc_Dist, sizeof(wc_Dist));
-
- if (wc_InitMutex(&(heap->memory_mutex)) != 0) {
- WOLFSSL_MSG("Error creating heap memory mutex");
- return BAD_MUTEX_E;
- }
-
- return 0;
-}
-
-int wc_LoadStaticMemory(WOLFSSL_HEAP_HINT** pHint,
- unsigned char* buf, unsigned int sz, int flag, int max)
-{
- int ret;
- WOLFSSL_HEAP* heap;
- WOLFSSL_HEAP_HINT* hint;
- word32 idx = 0;
-
- if (pHint == NULL || buf == NULL) {
- return BAD_FUNC_ARG;
- }
-
- if ((sizeof(WOLFSSL_HEAP) + sizeof(WOLFSSL_HEAP_HINT)) > sz - idx) {
- return BUFFER_E; /* not enough memory for structures */
- }
-
- /* check if hint has already been assigned */
- if (*pHint == NULL) {
- heap = (WOLFSSL_HEAP*)buf;
- idx += sizeof(WOLFSSL_HEAP);
- hint = (WOLFSSL_HEAP_HINT*)(buf + idx);
- idx += sizeof(WOLFSSL_HEAP_HINT);
-
- ret = wolfSSL_init_memory_heap(heap);
- if (ret != 0) {
- return ret;
- }
-
- XMEMSET(hint, 0, sizeof(WOLFSSL_HEAP_HINT));
- hint->memory = heap;
- }
- else {
- #ifdef WOLFSSL_HEAP_TEST
- /* do not load in memory if test has been set */
- if (heap == (void*)WOLFSSL_HEAP_TEST) {
- return 0;
- }
- #endif
-
- hint = (WOLFSSL_HEAP_HINT*)(*pHint);
- heap = hint->memory;
- }
-
- ret = wolfSSL_load_static_memory(buf + idx, sz - idx, flag, heap);
- if (ret != 1) {
- WOLFSSL_MSG("Error partitioning memory");
- return -1;
- }
-
- /* determine what max applies too */
- if ((flag & WOLFMEM_IO_POOL) || (flag & WOLFMEM_IO_POOL_FIXED)) {
- heap->maxIO = max;
- }
- else { /* general memory used in handshakes */
- heap->maxHa = max;
- }
-
- heap->flag |= flag;
- *pHint = hint;
-
- (void)max;
-
- return 0;
-}
-
-int wolfSSL_load_static_memory(byte* buffer, word32 sz, int flag,
- WOLFSSL_HEAP* heap)
-{
- word32 ava = sz;
- byte* pt = buffer;
- int ret = 0;
- word32 memSz = (word32)sizeof(wc_Memory);
- word32 padSz = -(int)memSz & (WOLFSSL_STATIC_ALIGN - 1);
-
- WOLFSSL_ENTER("wolfSSL_load_static_memory");
-
- if (buffer == NULL) {
- return BAD_FUNC_ARG;
- }
-
- /* align pt */
- while ((wolfssl_word)pt % WOLFSSL_STATIC_ALIGN && pt < (buffer + sz)) {
- *pt = 0x00;
- pt++;
- ava--;
- }
-
-#ifdef WOLFSSL_DEBUG_MEMORY
- printf("Allocated %d bytes for static memory @ %p\n", ava, pt);
-#endif
-
- /* devide into chunks of memory and add them to available list */
- while (ava >= (heap->sizeList[0] + padSz + memSz)) {
- int i;
- /* creating only IO buffers from memory passed in, max TLS is 16k */
- if (flag & WOLFMEM_IO_POOL || flag & WOLFMEM_IO_POOL_FIXED) {
- if ((ret = create_memory_buckets(pt, ava,
- WOLFMEM_IO_SZ, 1, &(heap->io))) < 0) {
- WOLFSSL_LEAVE("wolfSSL_load_static_memory", ret);
- return ret;
- }
-
- /* check if no more room left for creating IO buffers */
- if (ret == 0) {
- break;
- }
-
- /* advance pointer in buffer for next buckets and keep track
- of how much memory is left available */
- pt += ret;
- ava -= ret;
- }
- else {
- /* start at largest and move to smaller buckets */
- for (i = (WOLFMEM_MAX_BUCKETS - 1); i >= 0; i--) {
- if ((heap->sizeList[i] + padSz + memSz) <= ava) {
- if ((ret = create_memory_buckets(pt, ava, heap->sizeList[i],
- heap->distList[i], &(heap->ava[i]))) < 0) {
- WOLFSSL_LEAVE("wolfSSL_load_static_memory", ret);
- return ret;
- }
-
- /* advance pointer in buffer for next buckets and keep track
- of how much memory is left available */
- pt += ret;
- ava -= ret;
- }
- }
- }
- }
-
- return 1;
-}
-
-
-/* returns the size of management memory needed for each bucket.
- * This is memory that is used to keep track of and align memory buckets. */
-int wolfSSL_MemoryPaddingSz(void)
-{
- word32 memSz = (word32)sizeof(wc_Memory);
- word32 padSz = -(int)memSz & (WOLFSSL_STATIC_ALIGN - 1);
- return memSz + padSz;
-}
-
-
-/* Used to calculate memory size for optimum use with buckets.
- returns the suggested size rounded down to the nearest bucket. */
-int wolfSSL_StaticBufferSz(byte* buffer, word32 sz, int flag)
-{
- word32 bucketSz[WOLFMEM_MAX_BUCKETS] = {WOLFMEM_BUCKETS};
- word32 distList[WOLFMEM_MAX_BUCKETS] = {WOLFMEM_DIST};
-
- word32 ava = sz;
- byte* pt = buffer;
- word32 memSz = (word32)sizeof(wc_Memory);
- word32 padSz = -(int)memSz & (WOLFSSL_STATIC_ALIGN - 1);
-
- WOLFSSL_ENTER("wolfSSL_static_size");
-
- if (buffer == NULL) {
- return BAD_FUNC_ARG;
- }
-
- /* align pt */
- while ((wolfssl_word)pt % WOLFSSL_STATIC_ALIGN && pt < (buffer + sz)) {
- pt++;
- ava--;
- }
-
- /* creating only IO buffers from memory passed in, max TLS is 16k */
- if (flag & WOLFMEM_IO_POOL || flag & WOLFMEM_IO_POOL_FIXED) {
- if (ava < (memSz + padSz + WOLFMEM_IO_SZ)) {
- return 0; /* not enough room for even one bucket */
- }
-
- ava = ava % (memSz + padSz + WOLFMEM_IO_SZ);
- }
- else {
- int i, k;
-
- if (ava < (bucketSz[0] + padSz + memSz)) {
- return 0; /* not enough room for even one bucket */
- }
-
- while ((ava >= (bucketSz[0] + padSz + memSz)) && (ava > 0)) {
- /* start at largest and move to smaller buckets */
- for (i = (WOLFMEM_MAX_BUCKETS - 1); i >= 0; i--) {
- for (k = distList[i]; k > 0; k--) {
- if ((bucketSz[i] + padSz + memSz) <= ava) {
- ava -= bucketSz[i] + padSz + memSz;
- }
- }
- }
- }
- }
-
- return sz - ava; /* round down */
-}
-
-
-int FreeFixedIO(WOLFSSL_HEAP* heap, wc_Memory** io)
-{
- WOLFSSL_MSG("Freeing fixed IO buffer");
-
- /* check if fixed buffer was set */
- if (*io == NULL) {
- return 1;
- }
-
- if (heap == NULL) {
- WOLFSSL_MSG("No heap to return fixed IO too");
- }
- else {
- /* put IO buffer back into IO pool */
- (*io)->next = heap->io;
- heap->io = *io;
- *io = NULL;
- }
-
- return 1;
-}
-
-
-int SetFixedIO(WOLFSSL_HEAP* heap, wc_Memory** io)
-{
- WOLFSSL_MSG("Setting fixed IO for SSL");
- if (heap == NULL) {
- return MEMORY_E;
- }
-
- *io = heap->io;
-
- if (*io != NULL) {
- heap->io = (*io)->next;
- (*io)->next = NULL;
- }
- else { /* failed to grab an IO buffer */
- return 0;
- }
-
- return 1;
-}
-
-
-int wolfSSL_GetMemStats(WOLFSSL_HEAP* heap, WOLFSSL_MEM_STATS* stats)
-{
- word32 i;
- wc_Memory* pt;
-
- XMEMSET(stats, 0, sizeof(WOLFSSL_MEM_STATS));
-
- stats->totalAlloc = heap->alloc;
- stats->totalFr = heap->frAlc;
- stats->curAlloc = stats->totalAlloc - stats->totalFr;
- stats->maxHa = heap->maxHa;
- stats->maxIO = heap->maxIO;
- for (i = 0; i < WOLFMEM_MAX_BUCKETS; i++) {
- stats->blockSz[i] = heap->sizeList[i];
- for (pt = heap->ava[i]; pt != NULL; pt = pt->next) {
- stats->avaBlock[i] += 1;
- }
- }
-
- for (pt = heap->io; pt != NULL; pt = pt->next) {
- stats->avaIO++;
- }
-
- stats->flag = heap->flag; /* flag used */
-
- return 1;
-}
-
-
-#ifdef WOLFSSL_DEBUG_MEMORY
-void* wolfSSL_Malloc(size_t size, void* heap, int type, const char* func, unsigned int line)
-#else
-void* wolfSSL_Malloc(size_t size, void* heap, int type)
-#endif
-{
- void* res = 0;
- wc_Memory* pt = NULL;
- int i;
-
- /* check for testing heap hint was set */
-#ifdef WOLFSSL_HEAP_TEST
- if (heap == (void*)WOLFSSL_HEAP_TEST) {
- return malloc(size);
- }
-#endif
-
- /* if no heap hint then use dynamic memory*/
- if (heap == NULL) {
- #ifdef WOLFSSL_HEAP_TEST
- /* allow using malloc for creating ctx and method */
- if (type == DYNAMIC_TYPE_CTX || type == DYNAMIC_TYPE_METHOD ||
- type == DYNAMIC_TYPE_CERT_MANAGER) {
- WOLFSSL_MSG("ERROR allowing null heap hint for ctx/method\n");
- res = malloc(size);
- }
- else {
- WOLFSSL_MSG("ERROR null heap hint passed into XMALLOC\n");
- res = NULL;
- }
- #else
- #ifndef WOLFSSL_NO_MALLOC
- #ifdef FREERTOS
- res = pvPortMalloc(size);
- #else
- res = malloc(size);
- #endif
- #else
- WOLFSSL_MSG("No heap hint found to use and no malloc");
- #ifdef WOLFSSL_DEBUG_MEMORY
- printf("ERROR: at %s:%d\n", func, line);
- #endif
- #endif /* WOLFSSL_NO_MALLOC */
- #endif /* WOLFSSL_HEAP_TEST */
- }
- else {
- WOLFSSL_HEAP_HINT* hint = (WOLFSSL_HEAP_HINT*)heap;
- WOLFSSL_HEAP* mem = hint->memory;
-
- if (wc_LockMutex(&(mem->memory_mutex)) != 0) {
- WOLFSSL_MSG("Bad memory_mutex lock");
- return NULL;
- }
-
- /* case of using fixed IO buffers */
- if (mem->flag & WOLFMEM_IO_POOL_FIXED &&
- (type == DYNAMIC_TYPE_OUT_BUFFER ||
- type == DYNAMIC_TYPE_IN_BUFFER)) {
- if (type == DYNAMIC_TYPE_OUT_BUFFER) {
- pt = hint->outBuf;
- }
- if (type == DYNAMIC_TYPE_IN_BUFFER) {
- pt = hint->inBuf;
- }
- }
- else {
- /* check if using IO pool flag */
- if (mem->flag & WOLFMEM_IO_POOL &&
- (type == DYNAMIC_TYPE_OUT_BUFFER ||
- type == DYNAMIC_TYPE_IN_BUFFER)) {
- if (mem->io != NULL) {
- pt = mem->io;
- mem->io = pt->next;
- }
- }
-
- /* general static memory */
- if (pt == NULL) {
- for (i = 0; i < WOLFMEM_MAX_BUCKETS; i++) {
- if ((word32)size < mem->sizeList[i]) {
- if (mem->ava[i] != NULL) {
- pt = mem->ava[i];
- mem->ava[i] = pt->next;
- break;
- }
- }
- }
- }
- }
-
- if (pt != NULL) {
- mem->inUse += pt->sz;
- mem->alloc += 1;
- res = pt->buffer;
-
- #ifdef WOLFSSL_DEBUG_MEMORY
- printf("Alloc: %p -> %u at %s:%d\n", pt->buffer, pt->sz, func, line);
- #endif
-
- /* keep track of connection statistics if flag is set */
- if (mem->flag & WOLFMEM_TRACK_STATS) {
- WOLFSSL_MEM_CONN_STATS* stats = hint->stats;
- if (stats != NULL) {
- stats->curMem += pt->sz;
- if (stats->peakMem < stats->curMem) {
- stats->peakMem = stats->curMem;
- }
- stats->curAlloc++;
- if (stats->peakAlloc < stats->curAlloc) {
- stats->peakAlloc = stats->curAlloc;
- }
- stats->totalAlloc++;
- }
- }
- }
- else {
- WOLFSSL_MSG("ERROR ran out of static memory");
- #ifdef WOLFSSL_DEBUG_MEMORY
- printf("Looking for %lu bytes at %s:%d\n", size, func, line);
- #endif
- }
-
- wc_UnLockMutex(&(mem->memory_mutex));
- }
-
- #ifdef WOLFSSL_MALLOC_CHECK
- if ((wolfssl_word)res % WOLFSSL_STATIC_ALIGN) {
- WOLFSSL_MSG("ERROR memory is not alligned");
- res = NULL;
- }
- #endif
-
-
- (void)i;
- (void)pt;
- (void)type;
-
- return res;
-}
-
-
-#ifdef WOLFSSL_DEBUG_MEMORY
-void wolfSSL_Free(void *ptr, void* heap, int type, const char* func, unsigned int line)
-#else
-void wolfSSL_Free(void *ptr, void* heap, int type)
-#endif
-{
- int i;
- wc_Memory* pt;
-
- if (ptr) {
- /* check for testing heap hint was set */
- #ifdef WOLFSSL_HEAP_TEST
- if (heap == (void*)WOLFSSL_HEAP_TEST) {
- return free(ptr);
- }
- #endif
-
- if (heap == NULL) {
- #ifdef WOLFSSL_HEAP_TEST
- /* allow using malloc for creating ctx and method */
- if (type == DYNAMIC_TYPE_CTX || type == DYNAMIC_TYPE_METHOD ||
- type == DYNAMIC_TYPE_CERT_MANAGER) {
- WOLFSSL_MSG("ERROR allowing null heap hint for ctx/method\n");
- }
- else {
- WOLFSSL_MSG("ERROR null heap hint passed into XFREE\n");
- }
- #endif
- #ifndef WOLFSSL_NO_MALLOC
- #ifdef FREERTOS
- vPortFree(ptr);
- #else
- free(ptr);
- #endif
- #else
- WOLFSSL_MSG("Error trying to call free when turned off");
- #endif /* WOLFSSL_NO_MALLOC */
- }
- else {
- WOLFSSL_HEAP_HINT* hint = (WOLFSSL_HEAP_HINT*)heap;
- WOLFSSL_HEAP* mem = hint->memory;
- word32 padSz = -(int)sizeof(wc_Memory) & (WOLFSSL_STATIC_ALIGN - 1);
-
- /* get memory struct and add it to available list */
- pt = (wc_Memory*)((byte*)ptr - sizeof(wc_Memory) - padSz);
- if (wc_LockMutex(&(mem->memory_mutex)) != 0) {
- WOLFSSL_MSG("Bad memory_mutex lock");
- return;
- }
-
- /* case of using fixed IO buffers */
- if (mem->flag & WOLFMEM_IO_POOL_FIXED &&
- (type == DYNAMIC_TYPE_OUT_BUFFER ||
- type == DYNAMIC_TYPE_IN_BUFFER)) {
- /* fixed IO pools are free'd at the end of SSL lifetime
- using FreeFixedIO(WOLFSSL_HEAP* heap, wc_Memory** io) */
- }
- else if (mem->flag & WOLFMEM_IO_POOL && pt->sz == WOLFMEM_IO_SZ &&
- (type == DYNAMIC_TYPE_OUT_BUFFER ||
- type == DYNAMIC_TYPE_IN_BUFFER)) {
- pt->next = mem->io;
- mem->io = pt;
- }
- else { /* general memory free */
- for (i = 0; i < WOLFMEM_MAX_BUCKETS; i++) {
- if (pt->sz == mem->sizeList[i]) {
- pt->next = mem->ava[i];
- mem->ava[i] = pt;
- break;
- }
- }
- }
- mem->inUse -= pt->sz;
- mem->frAlc += 1;
-
- #ifdef WOLFSSL_DEBUG_MEMORY
- printf("Free: %p -> %u at %s:%d\n", pt->buffer, pt->sz, func, line);
- #endif
-
- /* keep track of connection statistics if flag is set */
- if (mem->flag & WOLFMEM_TRACK_STATS) {
- WOLFSSL_MEM_CONN_STATS* stats = hint->stats;
- if (stats != NULL) {
- /* avoid under flow */
- if (stats->curMem > pt->sz) {
- stats->curMem -= pt->sz;
- }
- else {
- stats->curMem = 0;
- }
-
- if (stats->curAlloc > 0) {
- stats->curAlloc--;
- }
- stats->totalFr++;
- }
- }
- wc_UnLockMutex(&(mem->memory_mutex));
- }
- }
-
- (void)i;
- (void)pt;
- (void)type;
-}
-
-#ifdef WOLFSSL_DEBUG_MEMORY
-void* wolfSSL_Realloc(void *ptr, size_t size, void* heap, int type, const char* func, unsigned int line)
-#else
-void* wolfSSL_Realloc(void *ptr, size_t size, void* heap, int type)
-#endif
-{
- void* res = 0;
- wc_Memory* pt = NULL;
- word32 prvSz;
- int i;
-
- /* check for testing heap hint was set */
-#ifdef WOLFSSL_HEAP_TEST
- if (heap == (void*)WOLFSSL_HEAP_TEST) {
- return realloc(ptr, size);
- }
-#endif
-
- if (heap == NULL) {
- #ifdef WOLFSSL_HEAP_TEST
- WOLFSSL_MSG("ERROR null heap hint passed in to XREALLOC\n");
- #endif
- #ifndef WOLFSSL_NO_MALLOC
- res = realloc(ptr, size);
- #else
- WOLFSSL_MSG("NO heap found to use for realloc");
- #endif /* WOLFSSL_NO_MALLOC */
- }
- else {
- WOLFSSL_HEAP_HINT* hint = (WOLFSSL_HEAP_HINT*)heap;
- WOLFSSL_HEAP* mem = hint->memory;
- word32 padSz = -(int)sizeof(wc_Memory) & (WOLFSSL_STATIC_ALIGN - 1);
-
- if (wc_LockMutex(&(mem->memory_mutex)) != 0) {
- WOLFSSL_MSG("Bad memory_mutex lock");
- return NULL;
- }
-
- /* case of using fixed IO buffers or IO pool */
- if (((mem->flag & WOLFMEM_IO_POOL)||(mem->flag & WOLFMEM_IO_POOL_FIXED))
- && (type == DYNAMIC_TYPE_OUT_BUFFER ||
- type == DYNAMIC_TYPE_IN_BUFFER)) {
- /* no realloc, is fixed size */
- pt = (wc_Memory*)((byte*)ptr - padSz - sizeof(wc_Memory));
- if (pt->sz < size) {
- WOLFSSL_MSG("Error IO memory was not large enough");
- res = NULL; /* return NULL in error case */
- }
- res = pt->buffer;
- }
- else {
- /* general memory */
- for (i = 0; i < WOLFMEM_MAX_BUCKETS; i++) {
- if ((word32)size < mem->sizeList[i]) {
- if (mem->ava[i] != NULL) {
- pt = mem->ava[i];
- mem->ava[i] = pt->next;
- break;
- }
- }
- }
-
- if (pt != NULL && res == NULL) {
- res = pt->buffer;
-
- /* copy over original information and free ptr */
- prvSz = ((wc_Memory*)((byte*)ptr - padSz -
- sizeof(wc_Memory)))->sz;
- prvSz = (prvSz > pt->sz)? pt->sz: prvSz;
- XMEMCPY(pt->buffer, ptr, prvSz);
- mem->inUse += pt->sz;
- mem->alloc += 1;
-
- /* free memory that was previously being used */
- wc_UnLockMutex(&(mem->memory_mutex));
- wolfSSL_Free(ptr, heap, type
- #ifdef WOLFSSL_DEBUG_MEMORY
- , func, line
- #endif
- );
- if (wc_LockMutex(&(mem->memory_mutex)) != 0) {
- WOLFSSL_MSG("Bad memory_mutex lock");
- return NULL;
- }
- }
- }
- wc_UnLockMutex(&(mem->memory_mutex));
- }
-
- #ifdef WOLFSSL_MALLOC_CHECK
- if ((wolfssl_word)res % WOLFSSL_STATIC_ALIGN) {
- WOLFSSL_MSG("ERROR memory is not alligned");
- res = NULL;
- }
- #endif
-
- (void)i;
- (void)pt;
- (void)type;
-
- return res;
-}
-#endif /* WOLFSSL_STATIC_MEMORY */
-
-#endif /* USE_WOLFSSL_MEMORY */
-
-
-#ifdef HAVE_IO_POOL
-
-/* Example for user io pool, shared build may need definitions in lib proper */
-
-#include <wolfssl/wolfcrypt/types.h>
-#include <stdlib.h>
-
-#ifndef HAVE_THREAD_LS
- #error "Oops, simple I/O pool example needs thread local storage"
-#endif
-
-
-/* allow simple per thread in and out pools */
-/* use 17k size since max record size is 16k plus overhead */
-static THREAD_LS_T byte pool_in[17*1024];
-static THREAD_LS_T byte pool_out[17*1024];
-
-
-void* XMALLOC(size_t n, void* heap, int type)
-{
- (void)heap;
-
- if (type == DYNAMIC_TYPE_IN_BUFFER) {
- if (n < sizeof(pool_in))
- return pool_in;
- else
- return NULL;
- }
-
- if (type == DYNAMIC_TYPE_OUT_BUFFER) {
- if (n < sizeof(pool_out))
- return pool_out;
- else
- return NULL;
- }
-
- return malloc(n);
-}
-
-void* XREALLOC(void *p, size_t n, void* heap, int type)
-{
- (void)heap;
-
- if (type == DYNAMIC_TYPE_IN_BUFFER) {
- if (n < sizeof(pool_in))
- return pool_in;
- else
- return NULL;
- }
-
- if (type == DYNAMIC_TYPE_OUT_BUFFER) {
- if (n < sizeof(pool_out))
- return pool_out;
- else
- return NULL;
- }
-
- return realloc(p, n);
-}
-
-void XFREE(void *p, void* heap, int type)
-{
- (void)heap;
-
- if (type == DYNAMIC_TYPE_IN_BUFFER)
- return; /* do nothing, static pool */
-
- if (type == DYNAMIC_TYPE_OUT_BUFFER)
- return; /* do nothing, static pool */
-
- free(p);
-}
-
-#endif /* HAVE_IO_POOL */
-
-