2016-05-17 19:38:09 +00:00
|
|
|
/*
|
2018-04-17 13:18:40 +00:00
|
|
|
* Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2015-10-25 16:43:55 +00:00
|
|
|
*
|
2018-12-06 13:03:01 +00:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-17 19:38:09 +00:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2015-10-25 16:43:55 +00:00
|
|
|
*/
|
|
|
|
|
2016-06-26 11:40:15 +00:00
|
|
|
#if defined(_WIN32)
|
|
|
|
# include <windows.h>
|
|
|
|
#endif
|
|
|
|
|
2015-10-25 16:43:55 +00:00
|
|
|
#include <openssl/crypto.h>
|
|
|
|
|
|
|
|
#if defined(OPENSSL_THREADS) && !defined(CRYPTO_TDEBUG) && defined(OPENSSL_SYS_WINDOWS)
|
|
|
|
|
|
|
|
CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void)
|
|
|
|
{
|
2018-04-05 19:13:55 +00:00
|
|
|
CRYPTO_RWLOCK *lock;
|
|
|
|
|
|
|
|
if ((lock = OPENSSL_zalloc(sizeof(CRITICAL_SECTION))) == NULL) {
|
|
|
|
/* Don't set error, to avoid recursion blowup. */
|
2015-10-25 16:43:55 +00:00
|
|
|
return NULL;
|
2018-04-05 19:13:55 +00:00
|
|
|
}
|
2015-10-25 16:43:55 +00:00
|
|
|
|
2019-03-27 07:15:31 +00:00
|
|
|
#if !defined(_WIN32_WCE)
|
2015-10-25 16:43:55 +00:00
|
|
|
/* 0x400 is the spin count value suggested in the documentation */
|
2016-03-01 20:59:48 +00:00
|
|
|
if (!InitializeCriticalSectionAndSpinCount(lock, 0x400)) {
|
|
|
|
OPENSSL_free(lock);
|
2015-10-25 16:43:55 +00:00
|
|
|
return NULL;
|
2016-03-01 20:59:48 +00:00
|
|
|
}
|
2019-03-27 07:15:31 +00:00
|
|
|
#else
|
|
|
|
InitializeCriticalSection(lock);
|
|
|
|
#endif
|
2015-10-25 16:43:55 +00:00
|
|
|
|
|
|
|
return lock;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock)
|
|
|
|
{
|
|
|
|
EnterCriticalSection(lock);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock)
|
|
|
|
{
|
|
|
|
EnterCriticalSection(lock);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock)
|
|
|
|
{
|
|
|
|
LeaveCriticalSection(lock);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock)
|
|
|
|
{
|
|
|
|
if (lock == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
DeleteCriticalSection(lock);
|
|
|
|
OPENSSL_free(lock);
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
# define ONCE_UNINITED 0
|
|
|
|
# define ONCE_ININIT 1
|
|
|
|
# define ONCE_DONE 2
|
|
|
|
|
2016-05-19 19:11:09 +00:00
|
|
|
/*
|
|
|
|
* We don't use InitOnceExecuteOnce because that isn't available in WinXP which
|
|
|
|
* we still have to support.
|
|
|
|
*/
|
2015-10-25 16:43:55 +00:00
|
|
|
int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void))
|
|
|
|
{
|
|
|
|
LONG volatile *lock = (LONG *)once;
|
|
|
|
LONG result;
|
|
|
|
|
|
|
|
if (*lock == ONCE_DONE)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
do {
|
|
|
|
result = InterlockedCompareExchange(lock, ONCE_ININIT, ONCE_UNINITED);
|
|
|
|
if (result == ONCE_UNINITED) {
|
2016-11-13 12:48:15 +00:00
|
|
|
init();
|
2016-11-14 11:55:13 +00:00
|
|
|
*lock = ONCE_DONE;
|
2015-10-25 16:43:55 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
} while (result == ONCE_ININIT);
|
|
|
|
|
|
|
|
return (*lock == ONCE_DONE);
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_init_local(CRYPTO_THREAD_LOCAL *key, void (*cleanup)(void *))
|
|
|
|
{
|
|
|
|
*key = TlsAlloc();
|
|
|
|
if (*key == TLS_OUT_OF_INDEXES)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *CRYPTO_THREAD_get_local(CRYPTO_THREAD_LOCAL *key)
|
|
|
|
{
|
2018-05-20 21:24:30 +00:00
|
|
|
DWORD last_error;
|
|
|
|
void *ret;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TlsGetValue clears the last error even on success, so that callers may
|
|
|
|
* distinguish it successfully returning NULL or failing. It is documented
|
|
|
|
* to never fail if the argument is a valid index from TlsAlloc, so we do
|
|
|
|
* not need to handle this.
|
|
|
|
*
|
|
|
|
* However, this error-mangling behavior interferes with the caller's use of
|
|
|
|
* GetLastError. In particular SSL_get_error queries the error queue to
|
|
|
|
* determine whether the caller should look at the OS's errors. To avoid
|
|
|
|
* destroying state, save and restore the Windows error.
|
|
|
|
*
|
|
|
|
* https://msdn.microsoft.com/en-us/library/windows/desktop/ms686812(v=vs.85).aspx
|
|
|
|
*/
|
|
|
|
last_error = GetLastError();
|
|
|
|
ret = TlsGetValue(*key);
|
|
|
|
SetLastError(last_error);
|
|
|
|
return ret;
|
2015-10-25 16:43:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_set_local(CRYPTO_THREAD_LOCAL *key, void *val)
|
|
|
|
{
|
|
|
|
if (TlsSetValue(*key, val) == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_cleanup_local(CRYPTO_THREAD_LOCAL *key)
|
|
|
|
{
|
|
|
|
if (TlsFree(*key) == 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
CRYPTO_THREAD_ID CRYPTO_THREAD_get_current_id(void)
|
|
|
|
{
|
|
|
|
return GetCurrentThreadId();
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_THREAD_compare_id(CRYPTO_THREAD_ID a, CRYPTO_THREAD_ID b)
|
|
|
|
{
|
|
|
|
return (a == b);
|
|
|
|
}
|
|
|
|
|
|
|
|
int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock)
|
|
|
|
{
|
|
|
|
*ret = InterlockedExchangeAdd(val, amount) + amount;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-06-22 18:00:06 +00:00
|
|
|
int openssl_init_fork_handlers(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-25 16:43:55 +00:00
|
|
|
#endif
|