]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/threads_pthread.c
Change EVP_MAC method from copy to dup
[thirdparty/openssl.git] / crypto / threads_pthread.c
CommitLineData
b1322259 1/*
28428130 2 * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
71a04cfc 3 *
0e9725bc 4 * Licensed under the Apache License 2.0 (the "License"). You may not use
b1322259
RS
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
71a04cfc
AG
8 */
9
10#include <openssl/crypto.h>
5f8dd0f8 11#include "internal/cryptlib.h"
71a04cfc
AG
12
13#if defined(OPENSSL_THREADS) && !defined(CRYPTO_TDEBUG) && !defined(OPENSSL_SYS_WINDOWS)
14
ec93a292
DK
15# ifdef PTHREAD_RWLOCK_INITIALIZER
16# define USE_RWLOCK
17# endif
2accf3f7 18
71a04cfc
AG
19CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void)
20{
ec93a292 21# ifdef USE_RWLOCK
7de2b9c4
RS
22 CRYPTO_RWLOCK *lock;
23
24 if ((lock = OPENSSL_zalloc(sizeof(pthread_rwlock_t))) == NULL) {
25 /* Don't set error, to avoid recursion blowup. */
71a04cfc 26 return NULL;
7de2b9c4 27 }
71a04cfc 28
0b2fc928
F
29 if (pthread_rwlock_init(lock, NULL) != 0) {
30 OPENSSL_free(lock);
71a04cfc 31 return NULL;
0b2fc928 32 }
ec93a292
DK
33# else
34 pthread_mutexattr_t attr;
7de2b9c4
RS
35 CRYPTO_RWLOCK *lock;
36
37 if ((lock = OPENSSL_zalloc(sizeof(pthread_mutex_t))) == NULL) {
38 /* Don't set error, to avoid recursion blowup. */
2accf3f7 39 return NULL;
7de2b9c4 40 }
2accf3f7 41
2accf3f7
DK
42 pthread_mutexattr_init(&attr);
43 pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE);
5d5eed44 44
2accf3f7
DK
45 if (pthread_mutex_init(lock, &attr) != 0) {
46 pthread_mutexattr_destroy(&attr);
47 OPENSSL_free(lock);
48 return NULL;
49 }
5d5eed44 50
2accf3f7 51 pthread_mutexattr_destroy(&attr);
ec93a292 52# endif
71a04cfc
AG
53
54 return lock;
55}
56
57int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock)
58{
ec93a292 59# ifdef USE_RWLOCK
71a04cfc
AG
60 if (pthread_rwlock_rdlock(lock) != 0)
61 return 0;
ec93a292 62# else
2accf3f7
DK
63 if (pthread_mutex_lock(lock) != 0)
64 return 0;
ec93a292 65# endif
71a04cfc
AG
66
67 return 1;
68}
69
70int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock)
71{
ec93a292 72# ifdef USE_RWLOCK
71a04cfc
AG
73 if (pthread_rwlock_wrlock(lock) != 0)
74 return 0;
ec93a292 75# else
2accf3f7
DK
76 if (pthread_mutex_lock(lock) != 0)
77 return 0;
ec93a292 78# endif
71a04cfc
AG
79
80 return 1;
81}
82
83int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock)
84{
ec93a292 85# ifdef USE_RWLOCK
71a04cfc
AG
86 if (pthread_rwlock_unlock(lock) != 0)
87 return 0;
ec93a292 88# else
2accf3f7
DK
89 if (pthread_mutex_unlock(lock) != 0)
90 return 0;
ec93a292 91# endif
71a04cfc
AG
92
93 return 1;
94}
95
96void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock)
97{
98 if (lock == NULL)
99 return;
100
ec93a292 101# ifdef USE_RWLOCK
71a04cfc 102 pthread_rwlock_destroy(lock);
ec93a292 103# else
2accf3f7 104 pthread_mutex_destroy(lock);
ec93a292 105# endif
71a04cfc
AG
106 OPENSSL_free(lock);
107
108 return;
109}
110
111int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void))
112{
113 if (pthread_once(once, init) != 0)
114 return 0;
115
116 return 1;
117}
118
119int CRYPTO_THREAD_init_local(CRYPTO_THREAD_LOCAL *key, void (*cleanup)(void *))
120{
121 if (pthread_key_create(key, cleanup) != 0)
122 return 0;
123
124 return 1;
125}
126
127void *CRYPTO_THREAD_get_local(CRYPTO_THREAD_LOCAL *key)
128{
129 return pthread_getspecific(*key);
130}
131
132int CRYPTO_THREAD_set_local(CRYPTO_THREAD_LOCAL *key, void *val)
133{
134 if (pthread_setspecific(*key, val) != 0)
135 return 0;
136
137 return 1;
138}
139
140int CRYPTO_THREAD_cleanup_local(CRYPTO_THREAD_LOCAL *key)
141{
142 if (pthread_key_delete(*key) != 0)
143 return 0;
144
145 return 1;
146}
147
148CRYPTO_THREAD_ID CRYPTO_THREAD_get_current_id(void)
149{
150 return pthread_self();
151}
152
153int CRYPTO_THREAD_compare_id(CRYPTO_THREAD_ID a, CRYPTO_THREAD_ID b)
154{
155 return pthread_equal(a, b);
156}
157
158int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock)
159{
11fc6c76 160# if defined(__GNUC__) && defined(__ATOMIC_ACQ_REL)
1beca676
RL
161 if (__atomic_is_lock_free(sizeof(*val), val)) {
162 *ret = __atomic_add_fetch(val, amount, __ATOMIC_ACQ_REL);
163 return 1;
164 }
165# endif
71a04cfc
AG
166 if (!CRYPTO_THREAD_write_lock(lock))
167 return 0;
168
169 *val += amount;
170 *ret = *val;
171
172 if (!CRYPTO_THREAD_unlock(lock))
173 return 0;
71a04cfc
AG
174
175 return 1;
176}
177
3593266d
MC
178# ifndef FIPS_MODE
179/* TODO(3.0): No fork protection in FIPS module yet! */
180
181# ifdef OPENSSL_SYS_UNIX
b842fcbb
RS
182static pthread_once_t fork_once_control = PTHREAD_ONCE_INIT;
183
184static void fork_once_func(void)
185{
186 pthread_atfork(OPENSSL_fork_prepare,
187 OPENSSL_fork_parent, OPENSSL_fork_child);
188}
3593266d 189# endif
b842fcbb 190
2915fe19
RS
191int openssl_init_fork_handlers(void)
192{
3593266d 193# ifdef OPENSSL_SYS_UNIX
b842fcbb 194 if (pthread_once(&fork_once_control, fork_once_func) == 0)
2915fe19 195 return 1;
3593266d 196# endif
2915fe19
RS
197 return 0;
198}
3593266d 199# endif /* FIPS_MODE */
71a04cfc 200#endif