2000-02-24 02:10:42 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
CRYPTO_THREAD_run_once,
|
2015-10-26 00:43:55 +08:00
|
|
|
CRYPTO_THREAD_lock_new, CRYPTO_THREAD_read_lock, CRYPTO_THREAD_write_lock,
|
2018-08-14 04:53:14 +08:00
|
|
|
CRYPTO_THREAD_unlock, CRYPTO_THREAD_lock_free,
|
2024-06-28 13:16:10 +08:00
|
|
|
CRYPTO_atomic_add, CRYPTO_atomic_add64, CRYPTO_atomic_and, CRYPTO_atomic_or,
|
|
|
|
CRYPTO_atomic_load, CRYPTO_atomic_store, CRYPTO_atomic_load_int,
|
2021-09-28 04:42:11 +08:00
|
|
|
OSSL_set_max_threads, OSSL_get_max_threads,
|
2023-08-30 20:19:40 +08:00
|
|
|
OSSL_get_thread_support_flags, OSSL_THREAD_SUPPORT_FLAG_THREAD_POOL,
|
|
|
|
OSSL_THREAD_SUPPORT_FLAG_DEFAULT_SPAWN - OpenSSL thread support
|
2000-02-24 02:10:42 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/crypto.h>
|
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
CRYPTO_ONCE CRYPTO_ONCE_STATIC_INIT;
|
|
|
|
int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void));
|
|
|
|
|
2015-10-26 00:43:55 +08:00
|
|
|
CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void);
|
|
|
|
int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock);
|
|
|
|
int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock);
|
|
|
|
int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock);
|
|
|
|
void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock);
|
|
|
|
|
|
|
|
int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock);
|
2024-06-28 13:16:10 +08:00
|
|
|
int CRYPTO_atomic_add64(uint64_t *val, uint64_t op, uint64_t *ret,
|
|
|
|
CRYPTO_RWLOCK *lock);
|
|
|
|
int CRYPTO_atomic_and(uint64_t *val, uint64_t op, uint64_t *ret,
|
|
|
|
CRYPTO_RWLOCK *lock);
|
2020-12-23 19:15:03 +08:00
|
|
|
int CRYPTO_atomic_or(uint64_t *val, uint64_t op, uint64_t *ret,
|
|
|
|
CRYPTO_RWLOCK *lock);
|
|
|
|
int CRYPTO_atomic_load(uint64_t *val, uint64_t *ret, CRYPTO_RWLOCK *lock);
|
2024-03-09 00:58:07 +08:00
|
|
|
int CRYPTO_atomic_store(uint64_t *dst, uint64_t val, CRYPTO_RWLOCK *lock);
|
2023-05-17 20:15:01 +08:00
|
|
|
int CRYPTO_atomic_load_int(int *val, int *ret, CRYPTO_RWLOCK *lock);
|
2000-09-15 05:23:28 +08:00
|
|
|
|
2021-09-28 04:42:11 +08:00
|
|
|
int OSSL_set_max_threads(OSSL_LIB_CTX *ctx, uint64_t max_threads);
|
|
|
|
uint64_t OSSL_get_max_threads(OSSL_LIB_CTX *ctx);
|
|
|
|
uint32_t OSSL_get_thread_support_flags(void);
|
|
|
|
|
2023-08-30 20:19:40 +08:00
|
|
|
#define OSSL_THREAD_SUPPORT_FLAG_THREAD_POOL
|
|
|
|
#define OSSL_THREAD_SUPPORT_FLAG_DEFAULT_SPAWN
|
|
|
|
|
2000-02-24 02:10:42 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2015-10-26 00:43:55 +08:00
|
|
|
OpenSSL can be safely used in multi-threaded applications provided that
|
|
|
|
support for the underlying OS threading API is built-in. Currently, OpenSSL
|
|
|
|
supports the pthread and Windows APIs. OpenSSL can also be built without
|
|
|
|
any multi-threading support, for example on platforms that don't provide
|
|
|
|
any threading support or that provide a threading API that is not yet
|
|
|
|
supported by OpenSSL.
|
|
|
|
|
|
|
|
The following multi-threading function are provided:
|
2008-08-06 23:54:15 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=over 2
|
2008-08-06 23:54:15 +08:00
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
CRYPTO_THREAD_run_once() can be used to perform one-time initialization.
|
2020-12-23 19:15:03 +08:00
|
|
|
The I<once> argument must be a pointer to a static object of type
|
2016-05-16 01:02:17 +08:00
|
|
|
B<CRYPTO_ONCE> that was statically initialized to the value
|
|
|
|
B<CRYPTO_ONCE_STATIC_INIT>.
|
2020-12-23 19:15:03 +08:00
|
|
|
The I<init> argument is a pointer to a function that performs the desired
|
2016-05-16 01:02:17 +08:00
|
|
|
exactly once initialization.
|
|
|
|
In particular, this can be used to allocate locks in a thread-safe manner,
|
|
|
|
which can then be used with the locking functions below.
|
|
|
|
|
2008-08-06 23:54:15 +08:00
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2015-10-26 00:43:55 +08:00
|
|
|
CRYPTO_THREAD_lock_new() allocates, initializes and returns a new read/write
|
|
|
|
lock.
|
2008-08-06 23:54:15 +08:00
|
|
|
|
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_THREAD_read_lock() locks the provided I<lock> for reading.
|
2008-08-06 23:54:15 +08:00
|
|
|
|
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_THREAD_write_lock() locks the provided I<lock> for writing.
|
2008-08-06 23:54:15 +08:00
|
|
|
|
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_THREAD_unlock() unlocks the previously locked I<lock>.
|
2000-09-15 04:22:14 +08:00
|
|
|
|
2000-06-18 23:59:04 +08:00
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_THREAD_lock_free() frees the provided I<lock>.
|
2024-06-25 17:58:49 +08:00
|
|
|
If the argument is NULL, nothing is done.
|
2000-06-18 23:59:04 +08:00
|
|
|
|
|
|
|
=item *
|
2017-04-08 01:37:47 +08:00
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_atomic_add() atomically adds I<amount> to I<*val> and returns the
|
|
|
|
result of the operation in I<*ret>. I<lock> will be locked, unless atomic
|
2015-10-26 00:43:55 +08:00
|
|
|
operations are supported on the specific platform. Because of this, if a
|
|
|
|
variable is modified by CRYPTO_atomic_add() then CRYPTO_atomic_add() must
|
2020-12-23 19:15:03 +08:00
|
|
|
be the only way that the variable is modified. If atomic operations are not
|
|
|
|
supported and I<lock> is NULL, then the function will fail.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2024-06-28 13:16:10 +08:00
|
|
|
CRYPTO_atomic_add64() atomically adds I<op> to I<*val> and returns the
|
|
|
|
result of the operation in I<*ret>. I<lock> will be locked, unless atomic
|
|
|
|
operations are supported on the specific platform. Because of this, if a
|
|
|
|
variable is modified by CRYPTO_atomic_add64() then CRYPTO_atomic_add64() must
|
|
|
|
be the only way that the variable is modified. If atomic operations are not
|
|
|
|
supported and I<lock> is NULL, then the function will fail.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
|
|
|
CRYPTO_atomic_and() performs an atomic bitwise and of I<op> and I<*val> and stores
|
|
|
|
the result back in I<*val>. It also returns the result of the operation in
|
|
|
|
I<*ret>. I<lock> will be locked, unless atomic operations are supported on the
|
|
|
|
specific platform. Because of this, if a variable is modified by
|
|
|
|
CRYPTO_atomic_and() or read by CRYPTO_atomic_load() then CRYPTO_atomic_and() must
|
|
|
|
be the only way that the variable is modified. If atomic operations are not
|
|
|
|
supported and I<lock> is NULL, then the function will fail.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2020-12-23 19:15:03 +08:00
|
|
|
CRYPTO_atomic_or() performs an atomic bitwise or of I<op> and I<*val> and stores
|
|
|
|
the result back in I<*val>. It also returns the result of the operation in
|
|
|
|
I<*ret>. I<lock> will be locked, unless atomic operations are supported on the
|
|
|
|
specific platform. Because of this, if a variable is modified by
|
|
|
|
CRYPTO_atomic_or() or read by CRYPTO_atomic_load() then CRYPTO_atomic_or() must
|
|
|
|
be the only way that the variable is modified. If atomic operations are not
|
|
|
|
supported and I<lock> is NULL, then the function will fail.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
|
|
|
CRYPTO_atomic_load() atomically loads the contents of I<*val> into I<*ret>.
|
|
|
|
I<lock> will be locked, unless atomic operations are supported on the specific
|
|
|
|
platform. Because of this, if a variable is modified by CRYPTO_atomic_or() or
|
|
|
|
read by CRYPTO_atomic_load() then CRYPTO_atomic_load() must be the only way that
|
|
|
|
the variable is read. If atomic operations are not supported and I<lock> is
|
|
|
|
NULL, then the function will fail.
|
2000-06-18 23:59:04 +08:00
|
|
|
|
2021-09-28 04:42:11 +08:00
|
|
|
=item *
|
|
|
|
|
2024-03-09 00:58:07 +08:00
|
|
|
CRYPTO_atomic_store() atomically stores the contents of I<val> into I<*dst>.
|
|
|
|
I<lock> will be locked, unless atomic operations are supported on the specific
|
2024-04-30 07:07:15 +08:00
|
|
|
platform.
|
2024-03-09 00:58:07 +08:00
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2023-05-17 20:15:01 +08:00
|
|
|
CRYPTO_atomic_load_int() works identically to CRYPTO_atomic_load() but operates
|
|
|
|
on an I<int> value instead of a I<uint64_t> value.
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
2021-09-28 04:42:11 +08:00
|
|
|
OSSL_set_max_threads() sets the maximum number of threads to be used by the
|
|
|
|
thread pool. If the argument is 0, thread pooling is disabled. OpenSSL will
|
|
|
|
not create any threads and existing threads in the thread pool will be torn
|
|
|
|
down. The maximum thread count is a limit, not a target. Threads will not be
|
|
|
|
spawned unless (and until) there is demand. Thread polling is disabled by
|
|
|
|
default. To enable threading you must call OSSL_set_max_threads() explicitly.
|
|
|
|
Under no circumstances is this done for you.
|
|
|
|
|
2023-08-30 20:19:40 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
OSSL_get_thread_support_flags() determines what thread pool functionality
|
|
|
|
OpenSSL is compiled with and is able to support in the current run time
|
|
|
|
environment. B<OSSL_THREAD_SUPPORT_FLAG_THREAD_POOL> indicates that the base
|
|
|
|
thread pool functionality is available, and
|
|
|
|
B<OSSL_THREAD_SUPPORT_FLAG_DEFAULT_SPAWN> indicates that the default thread pool
|
|
|
|
model is available. The default thread pool model is currently the only model
|
|
|
|
available, therefore both of these flags must be set for thread pool
|
|
|
|
functionality to be used.
|
|
|
|
|
2000-09-15 04:22:14 +08:00
|
|
|
=back
|
|
|
|
|
2000-02-24 09:20:31 +08:00
|
|
|
=head1 RETURN VALUES
|
2000-02-24 08:22:17 +08:00
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
CRYPTO_THREAD_run_once() returns 1 on success, or 0 on error.
|
|
|
|
|
2015-10-26 00:43:55 +08:00
|
|
|
CRYPTO_THREAD_lock_new() returns the allocated lock, or NULL on error.
|
2000-06-18 23:59:04 +08:00
|
|
|
|
2018-02-09 15:52:56 +08:00
|
|
|
CRYPTO_THREAD_lock_free() returns no value.
|
2000-06-18 23:59:04 +08:00
|
|
|
|
2021-09-28 04:42:11 +08:00
|
|
|
OSSL_set_max_threads() returns 1 on success and 0 on failure. Returns failure
|
|
|
|
if OpenSSL-managed thread pooling is not supported (for example, if it is not
|
|
|
|
supported on the current platform, or because OpenSSL is not built with the
|
|
|
|
necessary support).
|
|
|
|
|
|
|
|
OSSL_get_max_threads() returns the maximum number of threads currently allowed
|
|
|
|
to be used by the thread pool. If thread pooling is disabled or not available,
|
|
|
|
returns 0.
|
|
|
|
|
2023-08-30 20:19:40 +08:00
|
|
|
OSSL_get_thread_support_flags() returns zero or more B<OSSL_THREAD_SUPPORT_FLAG>
|
|
|
|
values.
|
|
|
|
|
2018-02-09 15:52:56 +08:00
|
|
|
The other functions return 1 on success, or 0 on error.
|
2000-02-24 08:22:17 +08:00
|
|
|
|
2016-06-26 19:40:15 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
On Windows platforms the CRYPTO_THREAD_* types and functions in the
|
2021-01-12 22:44:43 +08:00
|
|
|
F<< <openssl/crypto.h> >> header are dependent on some of the types
|
|
|
|
customarily made available by including F<< <windows.h> >>. The application
|
|
|
|
developer is likely to require control over when the latter is included,
|
|
|
|
commonly as one of the first included headers. Therefore, it is defined as an
|
|
|
|
application developer's responsibility to include F<< <windows.h> >> prior to
|
|
|
|
F<< <openssl/crypto.h> >> where use of CRYPTO_THREAD_* types and functions is
|
|
|
|
required.
|
2016-06-26 19:40:15 +08:00
|
|
|
|
2019-08-16 02:26:08 +08:00
|
|
|
=head1 EXAMPLES
|
2016-05-16 01:02:17 +08:00
|
|
|
|
2019-08-16 20:34:16 +08:00
|
|
|
You can find out if OpenSSL was configured with thread support:
|
|
|
|
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#if defined(OPENSSL_THREADS)
|
|
|
|
/* thread support enabled */
|
|
|
|
#else
|
|
|
|
/* no thread support */
|
|
|
|
#endif
|
|
|
|
|
2016-05-16 01:02:17 +08:00
|
|
|
This example safely initializes and uses a lock.
|
|
|
|
|
2016-11-19 07:10:05 +08:00
|
|
|
#ifdef _WIN32
|
|
|
|
# include <windows.h>
|
|
|
|
#endif
|
|
|
|
#include <openssl/crypto.h>
|
|
|
|
|
|
|
|
static CRYPTO_ONCE once = CRYPTO_ONCE_STATIC_INIT;
|
|
|
|
static CRYPTO_RWLOCK *lock;
|
|
|
|
|
|
|
|
static void myinit(void)
|
|
|
|
{
|
|
|
|
lock = CRYPTO_THREAD_lock_new();
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mylock(void)
|
|
|
|
{
|
|
|
|
if (!CRYPTO_THREAD_run_once(&once, void init) || lock == NULL)
|
|
|
|
return 0;
|
|
|
|
return CRYPTO_THREAD_write_lock(lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int myunlock(void)
|
|
|
|
{
|
|
|
|
return CRYPTO_THREAD_unlock(lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
int serialized(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2024-07-02 09:16:03 +08:00
|
|
|
if (!mylock()) {
|
|
|
|
/* Do not unlock unless the lock was successfully acquired. */
|
|
|
|
return 0;
|
2016-11-19 07:10:05 +08:00
|
|
|
}
|
2024-07-02 09:16:03 +08:00
|
|
|
|
|
|
|
/* Your code here, do not return without releasing the lock! */
|
|
|
|
ret = ... ;
|
2016-11-19 07:10:05 +08:00
|
|
|
myunlock();
|
|
|
|
return ret;
|
|
|
|
}
|
2016-05-16 01:02:17 +08:00
|
|
|
|
|
|
|
Finalization of locks is an advanced topic, not covered in this example.
|
|
|
|
This can only be done at process exit or when a dynamically loaded library is
|
|
|
|
no longer in use and is unloaded.
|
|
|
|
The simplest solution is to just "leak" the lock in applications and not
|
|
|
|
repeatedly load/unload shared libraries that allocate locks.
|
|
|
|
|
2000-02-24 02:10:42 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2021-01-06 07:05:42 +08:00
|
|
|
L<crypto(7)>, L<openssl-threads(7)>.
|
2000-02-24 02:10:42 +08:00
|
|
|
|
Introduce new internal hashtable implementation
Create a new hashtable that is more efficient than the existing LHASH_OF
implementation. the new ossl_ht api offers several new features that
improve performance opportunistically
* A more generalized hash function. Currently using fnv1a, provides a
more general hash function, but can still be overridden where needed
* Improved locking and reference counting. This hash table is
internally locked with an RCU lock, and optionally reference counts
elements, allowing for users to not have to create and manage their
own read/write locks
* Lockless operation. The hash table can be configured to operate
locklessly on the read side, improving performance, at the sacrifice
of the ability to grow the hash table or delete elements from it
* A filter function allowing for the retrieval of several elements at a
time matching a given criteria without having to hold a lock
permanently
* a doall_until iterator variant, that allows callers which need to
iterate over the entire hash table until a given condition is met (as
defined by the return value of the iterator callback). This allows
for callers attempting to do expensive cache searches for a small
number of elements to terminate the iteration early, saving cpu cycles
* Dynamic type safety. The hash table provides operations to set and
get data of a specific type without having to define a type at the
instatiation point
* Multiple data type storage. The hash table can store multiple data
types allowing for more flexible usage
* Ubsan safety. Because the API deals with concrete single types
(HT_KEY and HT_VALUE), leaving specific type casting to the call
recipient with dynamic type validation, this implementation is safe
from the ubsan undefined behavior warnings that require additional
thunking on callbacks.
Testing of this new hashtable with an equivalent hash function, I can
observe approximately a 6% performance improvement in the lhash_test
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23671)
2024-01-28 23:50:38 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
CRYPTO_atomic_store() was added in OpenSSL 3.4.0
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2024-09-05 15:35:49 +08:00
|
|
|
Copyright 2000-2024 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|