mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			340 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			340 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
=pod
 | 
						|
 | 
						|
=head1 NAME
 | 
						|
 | 
						|
openssl-quic-concurrency - OpenSSL QUIC Concurrency Model
 | 
						|
 | 
						|
=head1 DESCRIPTION
 | 
						|
 | 
						|
A QUIC domain is a group of QUIC resources such as listeners (see
 | 
						|
L<SSL_new_listener(3)>) and connections which share common event processing
 | 
						|
resources, such as internal pollers, timers and locks. All usage of OpenSSL QUIC
 | 
						|
happens inside a QUIC domain.
 | 
						|
 | 
						|
These resources can be accessed and used concurrently depending on the
 | 
						|
circumstances. This man page discusses the available concurrency models and how
 | 
						|
they can be used.
 | 
						|
 | 
						|
=head1 EXPLICIT AND IMPLICIT QUIC DOMAINS
 | 
						|
 | 
						|
A QUIC domain is instantiated either explicitly (L<SSL_new_domain(3)>) or
 | 
						|
implicitly by calling L<SSL_new(3)> or L<SSL_new_listener(3)>:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item
 | 
						|
 | 
						|
An explicit QUIC domain is created by and visible to the application as a QUIC
 | 
						|
domain SSL object and has other QUIC SSL objects created underneath it, such as
 | 
						|
listeners or connections.
 | 
						|
 | 
						|
=item
 | 
						|
 | 
						|
An implicit QUIC domain is one which is created internally due to the direct
 | 
						|
creation of a QUIC connection or listener SSL object; the application does not
 | 
						|
explicitly create a QUIC domain SSL object and never directly references the
 | 
						|
domain.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
Explicit creation of a QUIC domain provides the greatest level of control for an
 | 
						|
application. Applications can use an implicit QUIC domain for ease of use and to
 | 
						|
avoid needing to create a separate QUIC domain SSL object.
 | 
						|
 | 
						|
Regardless of whether a QUIC domain is explicitly created, the internal
 | 
						|
processing model is the same and the application must choose an appropriate
 | 
						|
concurrency model as discussed below.
 | 
						|
 | 
						|
=head1 CONCURRENCY MODELS
 | 
						|
 | 
						|
The OpenSSL QUIC implementation supports multiple concurrency models to support
 | 
						|
a wide variety of usage scenarios.
 | 
						|
 | 
						|
The available concurrency models are as follows:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Single-Threaded Concurrency Model (SCM)>, which supports only
 | 
						|
application-synchronised single-threaded usage.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Contentive Concurrency Model (CCM)>, which supports multi-threaded usage.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Thread-Assisted Concurrency Model (TACM)>, which also supports
 | 
						|
multi-threaded usage and provides assistance to an application for handling QUIC
 | 
						|
timer events.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
The merits of these models are as follows:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Single-Threaded Concurrency Model (SCM)> performs no locking or
 | 
						|
synchronisation. It is entirely up to the application to synchronise access to
 | 
						|
the QUIC domain and its subsidiary SSL objects.
 | 
						|
 | 
						|
This concurrency model is also useful for an application which wants to use the
 | 
						|
OpenSSL QUIC implementation as a pure state machine.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Contentive Concurrency Model (CCM)> performs automatic locking when making
 | 
						|
API calls to SSL objects in a QUIC domain. This provides automatic
 | 
						|
synchronisation for multi-threaded usage of QUIC objects. For example, different
 | 
						|
QUIC stream SSL objects in the same QUIC connection can be safely accessed from
 | 
						|
different threads.
 | 
						|
 | 
						|
This concurrency model adds the overhead of locking over the Single-Threaded
 | 
						|
Concurrency Model in order to support multi-threaded usage, but provides limited
 | 
						|
performance in highly contended multi-threaded usage due to its simple approach.
 | 
						|
However, it may still prove a good solution for a broad class of applications
 | 
						|
which spend the majority of their time in application logic and not in QUIC I/O
 | 
						|
processing.
 | 
						|
 | 
						|
An advantage of this model relative to the more sophisticated concurrency models
 | 
						|
below is that it does not create any OS threads.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The B<Thread-Assisted Concurrency Model (TACM)> is identical to the Contentive
 | 
						|
Concurrency Model except that a thread is spun up in the background to ensure
 | 
						|
that QUIC timer events are handled in a timely fashion. This ensures that QUIC
 | 
						|
timeout events are handled even if an application does not periodically call
 | 
						|
into the QUIC domain to ensure that any outstanding QUIC-related timer or
 | 
						|
network I/O events are handled. The assist thread contends for the same
 | 
						|
resources like any other thread. However, handshake layer events (TLS) are never
 | 
						|
processed by the assist thread.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
The default concurrency model is CCM or TACM, depending on the B<SSL_METHOD>
 | 
						|
used with a B<SSL_CTX>. Using L<OSSL_QUIC_client_method(3)> results in a default
 | 
						|
concurrency model of CCM, whereas using L<OSSL_QUIC_client_thread_method(3)>
 | 
						|
results in a default concurrency model of TACM.
 | 
						|
 | 
						|
Additional concurrency models may be offered in future releases of OpenSSL.
 | 
						|
 | 
						|
=head1 BLOCKING I/O CAPABILITIES
 | 
						|
 | 
						|
All of the supported concurrency models are capable of supporting blocking I/O
 | 
						|
calls, where application-level I/O calls (for example, to L<SSL_read_ex(3)> or
 | 
						|
L<SSL_write_ex(3)> on a QUIC stream SSL object) block until the request can be
 | 
						|
serviced. This includes the use of L<SSL_poll(3)> in a blocking fashion.
 | 
						|
 | 
						|
Supporting blocking API calls reliably with multi-threaded usage requires the
 | 
						|
creation of additional OS resources such as internal file descriptors to allow
 | 
						|
threads to be woken when necessary. This creation of internal OS resources is
 | 
						|
optional and may need to be explicitly requested by an application depending on
 | 
						|
the chosen concurrency model. If this functionality is disabled, depending on
 | 
						|
the chosen concurrency model, blocking API calls may not be available and calls
 | 
						|
to L<SSL_set_blocking_mode(3)> attempting to enable blocking mode may fail,
 | 
						|
notwithstanding the following section.
 | 
						|
 | 
						|
=head2 Legacy Blocking Support Compatibility
 | 
						|
 | 
						|
OpenSSL 3.2 and 3.3 contained a buggy implementation of blocking QUIC I/O calls
 | 
						|
which is only reliable under single-threaded usage. This functionality is always
 | 
						|
available in the Single-Threaded Concurrency Model (SCM), where it works
 | 
						|
reliably.
 | 
						|
 | 
						|
For compatibility reasons, this functionality is also available under the
 | 
						|
default concurrency model if the application does not explicitly specify a
 | 
						|
concurrency model or disable it. This is known as Legacy Blocking Compatibility
 | 
						|
Mode, and its usage is not recommended for multi-threaded applications.
 | 
						|
 | 
						|
=head1 RECOMMENDED USAGE
 | 
						|
 | 
						|
New applications are advised to choose a concurrency model as follows:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
A purely single-threaded application, or an application which wishes to use
 | 
						|
OpenSSL QUIC as a state machine and manage synchronisation itself, should
 | 
						|
explicitly select the SCM concurrency model.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
An application which wants to engage in multi-threaded usage of different QUIC
 | 
						|
connections or streams in the same QUIC domain should a) select the CCM or TACM
 | 
						|
concurrency model and b) explicitly opt in or out of blocking I/O support
 | 
						|
(depending on whether the application wishes to make blocking I/O calls),
 | 
						|
disabling Legacy Blocking Compatibility Mode.
 | 
						|
 | 
						|
An application should select the CCM concurrency model if the application can
 | 
						|
guarantee that a QUIC domain will be serviced regularly (for example, because
 | 
						|
the application can guarantee that the timeout returned by
 | 
						|
L<SSL_get_event_timeout(3)> will be handled). If an application is unable to do
 | 
						|
this, it should select the TACM concurrency model.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
Applications should explicitly configure a concurrency model during
 | 
						|
initialisation.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
=head1 CONFIGURING A CONCURRENCY MODEL
 | 
						|
 | 
						|
If using an explicit QUIC domain, a concurrency model is chosen when calling
 | 
						|
L<SSL_new_domain(3)> by specifying zero or more of the following flags:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item B<SSL_DOMAIN_FLAG_SINGLE_THREAD>
 | 
						|
 | 
						|
Specifying this flag configures the Single-Threaded Concurrency Model (SCM).
 | 
						|
 | 
						|
=item B<SSL_DOMAIN_FLAG_MULTI_THREAD>
 | 
						|
 | 
						|
Speciyfing this flag configures the Contentive Concurrency Model (CCM) (unless
 | 
						|
B<SSL_DOMAIN_FLAG_THREAD_ASSISTED> is also specified).
 | 
						|
 | 
						|
=item B<SSL_DOMAIN_FLAG_THREAD_ASSISTED>
 | 
						|
 | 
						|
Specifying this flag configures the Thread-Assisted Concurrency Model (TACM).
 | 
						|
It implies B<SSL_DOMAIN_FLAG_MULTI_THREAD>.
 | 
						|
 | 
						|
=item B<SSL_DOMAIN_FLAG_BLOCKING>
 | 
						|
 | 
						|
Enable reliable support for blocking I/O calls, allocating whatever OS resources
 | 
						|
are necessary to realise this. If this flag is specified,
 | 
						|
B<SSL_DOMAIN_FLAG_LEGACY_BLOCKING> is ignored.
 | 
						|
 | 
						|
Details on the allocated OS resources can be found under L</CONSUMPTION OF OS
 | 
						|
RESOURCES> below.
 | 
						|
 | 
						|
=item B<SSL_DOMAIN_FLAG_LEGACY_BLOCKING>
 | 
						|
 | 
						|
Enables legacy blocking compatibility mode. See L</Legacy Blocking Support
 | 
						|
Compatibility>.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
Mutually exclusive flag combinations result in an error (for example, combining
 | 
						|
B<SSL_DOMAIN_FLAG_SINGLE_THREAD> and B<SSL_DOMAIN_FLAG_MULTI_THREADED>).
 | 
						|
 | 
						|
The concurrency model for a domain cannot be changed after the domain is
 | 
						|
created.
 | 
						|
 | 
						|
=head2 Default Behaviour
 | 
						|
 | 
						|
If none of B<SSL_DOMAIN_FLAG_SINGLE_THREAD>, B<SSL_DOMAIN_FLAG_MULTI_THREAD> or
 | 
						|
B<SSL_DOMAIN_FLAG_THREAD_ASSISTED> are provided to L<SSL_new_domain(3)> or
 | 
						|
another constructor function which can accept the above flags, the default
 | 
						|
concurrency model set on the B<SSL_CTX> is used. This default can be set and get
 | 
						|
using L<SSL_CTX_set_domain_flags(3)> and L<SSL_CTX_get_domain_flags(3)>. Any
 | 
						|
additional flags provided (for example, B<SSL_DOMAIN_FLAG_BLOCCKING>) are added
 | 
						|
to the set of inherited flags.
 | 
						|
 | 
						|
The default concurrency model set on a newly created B<SSL_CTX> is determined as
 | 
						|
follows:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
If an B<SSL_METHOD> of L<OSSL_QUIC_client_thread_method(3)> is used, the
 | 
						|
Thread-Assisted Concurrency Model (TACM) is used with the
 | 
						|
B<SSL_DOMAIN_FLAG_BLOCKING> flag. This provides reliable blocking functionality.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
Otherwise, if OpenSSL was built without threading support, the Single-Threaded
 | 
						|
Concurrency Model (SCM) is used, with the B<SSL_DOMAIN_FLAG_LEGACY_BLOCKING>
 | 
						|
flag.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
Otherwise, if an B<SSL_METHOD> of L<OSSL_QUIC_client_method(3)> is used, the
 | 
						|
Contentive Concurrency Model (CCM) is used with the
 | 
						|
B<SSL_DOMAIN_FLAG_LEGACY_BLOCKING> flag.
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
Otherwise, the Contentive Concurrency Model (CCM) is used.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
The default concurrency model may vary between releases of OpenSSL. An
 | 
						|
application may specify one or more of the domain flags above to ensure
 | 
						|
consistent usage of a specific concurrency model between releases.
 | 
						|
 | 
						|
=head2 Configuration of Concurrency Models with Implicit QUIC Domains
 | 
						|
 | 
						|
If an explicit QUIC domain is not explicitly created using L<SSL_new_domain(3)>,
 | 
						|
an implicit QUIC domain is created when calling L<SSL_new_listener(3)> or
 | 
						|
L<SSL_new(3)>. Such a domain will use the default domain flags configured on the
 | 
						|
B<SSL_CTX> as described above.
 | 
						|
 | 
						|
=head1 CONSUMPTION OF OS RESOURCES
 | 
						|
 | 
						|
If full blocking I/O support is selected using B<SSL_DOMAIN_FLAG_BLOCKING>, at
 | 
						|
least one socket, socket-like OS handle or file descriptor must be allocated to
 | 
						|
allow one thread to wake other threads which may be blocking in calls to OS
 | 
						|
socket polling interfaces such as select(2) or poll(2). This is allocated
 | 
						|
automatically internally by OpenSSL.
 | 
						|
 | 
						|
If the Thread-Assisted Concurrency Model (TACM) is selected, a background thread
 | 
						|
is spawned. This also implies B<SSL_DOMAIN_FLAG_BLOCKING> and the above.
 | 
						|
 | 
						|
The internal consumption by OpenSSL of mutexes, condition variables, spin locks
 | 
						|
or other similar thread synchronisation primitives is unspecified under all
 | 
						|
concurrency models.
 | 
						|
 | 
						|
The internal consumption by OpenSSL of threads is unspecified under the
 | 
						|
Thread-Assisted Concurrency Model.
 | 
						|
 | 
						|
The internal consumption by OpenSSL of sockets, socket-like OS handles or file
 | 
						|
descriptors, or other resources as needed to support inter-thread notification,
 | 
						|
is unspecified under the Thread-Assisted Concurrency Model or when using
 | 
						|
B<SSL_DOMAIN_FLAG_BLOCKING>.
 | 
						|
 | 
						|
=head1 BEHAVIOUR OF SSL OBJECTS
 | 
						|
 | 
						|
A QUIC SSL object has blocking mode enabled by default where B<all> of the
 | 
						|
following criteria are met:
 | 
						|
 | 
						|
=over 4
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
B<SSL_DOMAIN_FLAG_BLOCKING> or B<SSL_DOMAIN_FLAG_LEGACY_BLOCKING> is enabled;
 | 
						|
and
 | 
						|
 | 
						|
=item *
 | 
						|
 | 
						|
The QUIC connection is being used with network read and write BIOs which expose
 | 
						|
supported poll descriptors. See L<openssl-quic(7)> for details.
 | 
						|
 | 
						|
=back
 | 
						|
 | 
						|
In all other cases, a QUIC SSL object has blocking mode disabled by default. The
 | 
						|
blocking mode can be changed explicitly using L<SSL_set_blocking_mode(3)>.
 | 
						|
 | 
						|
=head1 SEE ALSO
 | 
						|
 | 
						|
L<openssl-quic(7)>, L<SSL_handle_events(3)>, L<SSL_get_event_timeout(3)>,
 | 
						|
L<OSSL_QUIC_client_thread_method(3)>, L<SSL_CTX_set_domain_flags(3)>,
 | 
						|
L<SSL_new_domain(3)>
 | 
						|
 | 
						|
=head1 COPYRIGHT
 | 
						|
 | 
						|
Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
 | 
						|
Licensed under the Apache License 2.0 (the "License").  You may not use
 | 
						|
this file except in compliance with the License.  You can obtain a copy
 | 
						|
in the file LICENSE in the source distribution or at
 | 
						|
L<https://www.openssl.org/source/license.html>.
 | 
						|
 | 
						|
=cut
 |