| 
									
										
										
										
											2016-05-18 02:52:22 +08:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2023-09-19 20:57:48 +08:00
										 |  |  |  * Copyright 2016-2023 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-12-06 21:03:01 +08:00
										 |  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-05-18 02:52:22 +08:00
										 |  |  |  * this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  |  * in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  |  * https://www.openssl.org/source/license.html
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-10-29 23:17:25 +08:00
										 |  |  | /* We need to use the OPENSSL_fork_*() deprecated APIs */ | 
					
						
							|  |  |  | #define OPENSSL_SUPPRESS_DEPRECATED
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | #include <openssl/crypto.h>
 | 
					
						
							| 
									
										
										
										
											2017-08-04 04:21:01 +08:00
										 |  |  | #include "internal/cryptlib.h"
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-06-21 16:31:05 +08:00
										 |  |  | #if defined(__sun)
 | 
					
						
							|  |  |  | # include <atomic.h>
 | 
					
						
							|  |  |  | #endif
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-07 21:07:37 +08:00
										 |  |  | #if defined(__apple_build_version__) && __apple_build_version__ < 6000000
 | 
					
						
							|  |  |  | /*
 | 
					
						
							|  |  |  |  * OS/X 10.7 and 10.8 had a weird version of clang which has __ATOMIC_ACQUIRE and | 
					
						
							|  |  |  |  * __ATOMIC_ACQ_REL but which expects only one parameter for __atomic_is_lock_free() | 
					
						
							|  |  |  |  * rather than two which has signature __atomic_is_lock_free(sizeof(_Atomic(T))). | 
					
						
							|  |  |  |  * All of this makes impossible to use __atomic_is_lock_free here. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * See: https://github.com/llvm/llvm-project/commit/a4c2602b714e6c6edb98164550a5ae829b2de760
 | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | #define BROKEN_CLANG_ATOMICS
 | 
					
						
							|  |  |  | #endif
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | #if defined(OPENSSL_THREADS) && !defined(CRYPTO_TDEBUG) && !defined(OPENSSL_SYS_WINDOWS)
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-28 03:03:09 +08:00
										 |  |  | # if defined(OPENSSL_SYS_UNIX)
 | 
					
						
							|  |  |  | #  include <sys/types.h>
 | 
					
						
							|  |  |  | #  include <unistd.h>
 | 
					
						
							|  |  |  | #endif
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-06-18 01:18:27 +08:00
										 |  |  | # include <assert.h>
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef PTHREAD_RWLOCK_INITIALIZER
 | 
					
						
							|  |  |  | #  define USE_RWLOCK
 | 
					
						
							|  |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef USE_RWLOCK
 | 
					
						
							| 
									
										
										
										
											2018-04-06 03:13:55 +08:00
										 |  |  |     CRYPTO_RWLOCK *lock; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if ((lock = OPENSSL_zalloc(sizeof(pthread_rwlock_t))) == NULL) { | 
					
						
							|  |  |  |         /* Don't set error, to avoid recursion blowup. */ | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |         return NULL; | 
					
						
							| 
									
										
										
										
											2018-04-06 03:13:55 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-03-02 04:59:48 +08:00
										 |  |  |     if (pthread_rwlock_init(lock, NULL) != 0) { | 
					
						
							|  |  |  |         OPENSSL_free(lock); | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |         return NULL; | 
					
						
							| 
									
										
										
										
											2016-03-02 04:59:48 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # else
 | 
					
						
							|  |  |  |     pthread_mutexattr_t attr; | 
					
						
							| 
									
										
										
										
											2018-04-06 03:13:55 +08:00
										 |  |  |     CRYPTO_RWLOCK *lock; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if ((lock = OPENSSL_zalloc(sizeof(pthread_mutex_t))) == NULL) { | 
					
						
							|  |  |  |         /* Don't set error, to avoid recursion blowup. */ | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |         return NULL; | 
					
						
							| 
									
										
										
										
											2018-04-06 03:13:55 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     /*
 | 
					
						
							|  |  |  |      * We don't use recursive mutexes, but try to catch errors if we do. | 
					
						
							|  |  |  |      */ | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |     pthread_mutexattr_init(&attr); | 
					
						
							| 
									
										
										
										
											2021-06-24 04:50:09 +08:00
										 |  |  | #  if !defined (__TANDEM) && !defined (_SPT_MODEL_)
 | 
					
						
							|  |  |  | #   if !defined(NDEBUG) && !defined(OPENSSL_NO_MUTEX_ERRORCHECK)
 | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_ERRORCHECK); | 
					
						
							| 
									
										
										
										
											2021-06-24 04:50:09 +08:00
										 |  |  | #   endif
 | 
					
						
							|  |  |  | #  else
 | 
					
						
							|  |  |  |     /* The SPT Thread Library does not define MUTEX attributes. */ | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  | #  endif
 | 
					
						
							| 
									
										
										
										
											2016-11-29 02:16:34 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |     if (pthread_mutex_init(lock, &attr) != 0) { | 
					
						
							|  |  |  |         pthread_mutexattr_destroy(&attr); | 
					
						
							|  |  |  |         OPENSSL_free(lock); | 
					
						
							|  |  |  |         return NULL; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-29 02:16:34 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |     pthread_mutexattr_destroy(&attr); | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return lock; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-02-19 04:31:56 +08:00
										 |  |  | __owur int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock) | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef USE_RWLOCK
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |     if (pthread_rwlock_rdlock(lock) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # else
 | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     if (pthread_mutex_lock(lock) != 0) { | 
					
						
							|  |  |  |         assert(errno != EDEADLK && errno != EBUSY); | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-02-19 04:31:56 +08:00
										 |  |  | __owur int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock) | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef USE_RWLOCK
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |     if (pthread_rwlock_wrlock(lock) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # else
 | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     if (pthread_mutex_lock(lock) != 0) { | 
					
						
							|  |  |  |         assert(errno != EDEADLK && errno != EBUSY); | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef USE_RWLOCK
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |     if (pthread_rwlock_unlock(lock) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # else
 | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     if (pthread_mutex_unlock(lock) != 0) { | 
					
						
							|  |  |  |         assert(errno != EPERM); | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |         return 0; | 
					
						
							| 
									
										
										
										
											2021-01-22 01:32:27 +08:00
										 |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (lock == NULL) | 
					
						
							|  |  |  |         return; | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # ifdef USE_RWLOCK
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |     pthread_rwlock_destroy(lock); | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # else
 | 
					
						
							| 
									
										
										
										
											2016-11-23 00:37:43 +08:00
										 |  |  |     pthread_mutex_destroy(lock); | 
					
						
							| 
									
										
										
										
											2016-11-29 01:54:43 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |     OPENSSL_free(lock); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void)) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (pthread_once(once, init) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_init_local(CRYPTO_THREAD_LOCAL *key, void (*cleanup)(void *)) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (pthread_key_create(key, cleanup) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void *CRYPTO_THREAD_get_local(CRYPTO_THREAD_LOCAL *key) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return pthread_getspecific(*key); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_set_local(CRYPTO_THREAD_LOCAL *key, void *val) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (pthread_setspecific(*key, val) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_cleanup_local(CRYPTO_THREAD_LOCAL *key) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (pthread_key_delete(*key) != 0) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | CRYPTO_THREAD_ID CRYPTO_THREAD_get_current_id(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return pthread_self(); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_THREAD_compare_id(CRYPTO_THREAD_ID a, CRYPTO_THREAD_ID b) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return pthread_equal(a, b); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2022-04-07 21:07:37 +08:00
										 |  |  | # if defined(__GNUC__) && defined(__ATOMIC_ACQ_REL) && !defined(BROKEN_CLANG_ATOMICS)
 | 
					
						
							| 
									
										
										
										
											2016-08-24 15:14:44 +08:00
										 |  |  |     if (__atomic_is_lock_free(sizeof(*val), val)) { | 
					
						
							|  |  |  |         *ret = __atomic_add_fetch(val, amount, __ATOMIC_ACQ_REL); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2019-06-21 16:31:05 +08:00
										 |  |  | # elif defined(__sun) && (defined(__SunOS_5_10) || defined(__SunOS_5_11))
 | 
					
						
							|  |  |  |     /* This will work for all future Solaris versions. */ | 
					
						
							|  |  |  |     if (ret != NULL) { | 
					
						
							|  |  |  |         *ret = atomic_add_int_nv((volatile unsigned int *)val, amount); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2016-08-24 15:14:44 +08:00
										 |  |  | # endif
 | 
					
						
							| 
									
										
										
										
											2020-12-23 01:43:07 +08:00
										 |  |  |     if (lock == NULL || !CRYPTO_THREAD_write_lock(lock)) | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     *val += amount; | 
					
						
							|  |  |  |     *ret  = *val; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!CRYPTO_THREAD_unlock(lock)) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-12-23 01:43:07 +08:00
										 |  |  | int CRYPTO_atomic_or(uint64_t *val, uint64_t op, uint64_t *ret, | 
					
						
							|  |  |  |                      CRYPTO_RWLOCK *lock) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2022-04-07 21:07:37 +08:00
										 |  |  | # if defined(__GNUC__) && defined(__ATOMIC_ACQ_REL) && !defined(BROKEN_CLANG_ATOMICS)
 | 
					
						
							| 
									
										
										
										
											2020-12-23 01:43:07 +08:00
										 |  |  |     if (__atomic_is_lock_free(sizeof(*val), val)) { | 
					
						
							|  |  |  |         *ret = __atomic_or_fetch(val, op, __ATOMIC_ACQ_REL); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | # elif defined(__sun) && (defined(__SunOS_5_10) || defined(__SunOS_5_11))
 | 
					
						
							|  |  |  |     /* This will work for all future Solaris versions. */ | 
					
						
							|  |  |  |     if (ret != NULL) { | 
					
						
							|  |  |  |         *ret = atomic_or_64_nv(val, op); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | # endif
 | 
					
						
							|  |  |  |     if (lock == NULL || !CRYPTO_THREAD_write_lock(lock)) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     *val |= op; | 
					
						
							|  |  |  |     *ret  = *val; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!CRYPTO_THREAD_unlock(lock)) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | int CRYPTO_atomic_load(uint64_t *val, uint64_t *ret, CRYPTO_RWLOCK *lock) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2022-04-07 21:07:37 +08:00
										 |  |  | # if defined(__GNUC__) && defined(__ATOMIC_ACQUIRE) && !defined(BROKEN_CLANG_ATOMICS)
 | 
					
						
							| 
									
										
										
										
											2020-12-23 01:43:07 +08:00
										 |  |  |     if (__atomic_is_lock_free(sizeof(*val), val)) { | 
					
						
							|  |  |  |         __atomic_load(val, ret, __ATOMIC_ACQUIRE); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | # elif defined(__sun) && (defined(__SunOS_5_10) || defined(__SunOS_5_11))
 | 
					
						
							|  |  |  |     /* This will work for all future Solaris versions. */ | 
					
						
							|  |  |  |     if (ret != NULL) { | 
					
						
							|  |  |  |         *ret = atomic_or_64_nv(val, 0); | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | # endif
 | 
					
						
							|  |  |  |     if (lock == NULL || !CRYPTO_THREAD_read_lock(lock)) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  |     *ret  = *val; | 
					
						
							|  |  |  |     if (!CRYPTO_THREAD_unlock(lock)) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2020-04-14 04:34:56 +08:00
										 |  |  | # ifndef FIPS_MODULE
 | 
					
						
							| 
									
										
										
										
											2017-06-23 02:00:06 +08:00
										 |  |  | int openssl_init_fork_handlers(void) | 
					
						
							|  |  |  | { | 
					
						
							| 
									
										
										
										
											2022-03-09 01:04:59 +08:00
										 |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2017-06-23 02:00:06 +08:00
										 |  |  | } | 
					
						
							| 
									
										
										
										
											2020-04-14 04:34:56 +08:00
										 |  |  | # endif /* FIPS_MODULE */
 | 
					
						
							| 
									
										
										
										
											2019-05-28 03:03:09 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | int openssl_get_fork_id(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return getpid(); | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2015-10-26 00:43:55 +08:00
										 |  |  | #endif
 |