186 lines
5.1 KiB
C++
186 lines
5.1 KiB
C++
|
/*
|
||
|
* Copyright (c) Facebook, Inc. and its affiliates.
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
#include <folly/ssl/detail/OpenSSLThreading.h>
|
||
|
|
||
|
#include <memory>
|
||
|
#include <mutex>
|
||
|
|
||
|
#include <folly/Portability.h>
|
||
|
#include <folly/SharedMutex.h>
|
||
|
#include <folly/SpinLock.h>
|
||
|
|
||
|
#include <glog/logging.h>
|
||
|
|
||
|
// We cannot directly use portability/openssl because it also depends on us.
|
||
|
// Therefore we directly use openssl includes. Order of includes is important
|
||
|
// here. See portability/openssl.h.
|
||
|
#include <folly/portability/Windows.h>
|
||
|
#include <openssl/crypto.h>
|
||
|
|
||
|
#if !defined(OPENSSL_IS_BORINGSSL)
|
||
|
#define FOLLY_SSL_DETAIL_OPENSSL_IS_110 (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
||
|
#else
|
||
|
#define FOLLY_SSL_DETAIL_OPENSSL_IS_110 (false)
|
||
|
#endif
|
||
|
|
||
|
// OpenSSL requires us to provide the implementation of CRYPTO_dynlock_value
|
||
|
// so it must be done in the global namespace.
|
||
|
struct CRYPTO_dynlock_value {
|
||
|
std::mutex mutex;
|
||
|
};
|
||
|
|
||
|
namespace folly {
|
||
|
namespace ssl {
|
||
|
namespace detail {
|
||
|
|
||
|
static std::map<int, LockType>& lockTypes() {
|
||
|
static auto lockTypesInst = new std::map<int, LockType>();
|
||
|
return *lockTypesInst;
|
||
|
}
|
||
|
|
||
|
void setLockTypes(std::map<int, LockType> inLockTypes) {
|
||
|
#if FOLLY_SSL_DETAIL_OPENSSL_IS_110
|
||
|
VLOG(3) << "setLockTypes() is unsupported on OpenSSL >= 1.1.0. "
|
||
|
<< "OpenSSL now uses platform native mutexes";
|
||
|
#endif
|
||
|
|
||
|
lockTypes() = inLockTypes;
|
||
|
}
|
||
|
|
||
|
bool isSSLLockDisabled(int lockId) {
|
||
|
const auto& sslLocks = lockTypes();
|
||
|
const auto it = sslLocks.find(lockId);
|
||
|
return it != sslLocks.end() && it->second == LockType::NONE;
|
||
|
}
|
||
|
|
||
|
namespace {
|
||
|
struct SSLLock {
|
||
|
explicit SSLLock(LockType inLockType = LockType::MUTEX)
|
||
|
: lockType(inLockType) {}
|
||
|
|
||
|
void lock(bool read) {
|
||
|
if (lockType == LockType::MUTEX) {
|
||
|
mutex.lock();
|
||
|
} else if (lockType == LockType::SPINLOCK) {
|
||
|
spinLock.lock();
|
||
|
} else if (lockType == LockType::SHAREDMUTEX) {
|
||
|
if (read) {
|
||
|
sharedMutex.lock_shared();
|
||
|
} else {
|
||
|
sharedMutex.lock();
|
||
|
}
|
||
|
}
|
||
|
// lockType == LOCK_NONE, no-op
|
||
|
}
|
||
|
|
||
|
void unlock(bool read) {
|
||
|
if (lockType == LockType::MUTEX) {
|
||
|
mutex.unlock();
|
||
|
} else if (lockType == LockType::SPINLOCK) {
|
||
|
spinLock.unlock();
|
||
|
} else if (lockType == LockType::SHAREDMUTEX) {
|
||
|
if (read) {
|
||
|
sharedMutex.unlock_shared();
|
||
|
} else {
|
||
|
sharedMutex.unlock();
|
||
|
}
|
||
|
}
|
||
|
// lockType == LOCK_NONE, no-op
|
||
|
}
|
||
|
|
||
|
LockType lockType;
|
||
|
folly::SpinLock spinLock{};
|
||
|
std::mutex mutex;
|
||
|
SharedMutex sharedMutex;
|
||
|
};
|
||
|
} // namespace
|
||
|
|
||
|
// Statics are unsafe in environments that call exit().
|
||
|
// If one thread calls exit() while another thread is
|
||
|
// references a member of SSLContext, bad things can happen.
|
||
|
// SSLContext runs in such environments.
|
||
|
// Instead of declaring a static member we "new" the static
|
||
|
// member so that it won't be destructed on exit().
|
||
|
#if !FOLLY_SSL_DETAIL_OPENSSL_IS_110
|
||
|
static std::unique_ptr<SSLLock[]>& locks() {
|
||
|
static auto locksInst = new std::unique_ptr<SSLLock[]>();
|
||
|
return *locksInst;
|
||
|
}
|
||
|
|
||
|
static void callbackLocking(int mode, int n, const char*, int) {
|
||
|
if (mode & CRYPTO_LOCK) {
|
||
|
locks()[size_t(n)].lock(mode & CRYPTO_READ);
|
||
|
} else {
|
||
|
locks()[size_t(n)].unlock(mode & CRYPTO_READ);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
static void callbackThreadID(CRYPTO_THREADID* id) {
|
||
|
return CRYPTO_THREADID_set_numeric(id, folly::getCurrentThreadID());
|
||
|
}
|
||
|
|
||
|
static CRYPTO_dynlock_value* dyn_create(const char*, int) {
|
||
|
return new CRYPTO_dynlock_value;
|
||
|
}
|
||
|
|
||
|
static void
|
||
|
dyn_lock(int mode, struct CRYPTO_dynlock_value* lock, const char*, int) {
|
||
|
if (lock != nullptr) {
|
||
|
if (mode & CRYPTO_LOCK) {
|
||
|
lock->mutex.lock();
|
||
|
} else {
|
||
|
lock->mutex.unlock();
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
static void dyn_destroy(struct CRYPTO_dynlock_value* lock, const char*, int) {
|
||
|
delete lock;
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
void installThreadingLocks() {
|
||
|
#if !FOLLY_SSL_DETAIL_OPENSSL_IS_110
|
||
|
// static locking
|
||
|
locks() = std::make_unique<SSLLock[]>(size_t(CRYPTO_num_locks()));
|
||
|
for (auto it : lockTypes()) {
|
||
|
locks()[size_t(it.first)].lockType = it.second;
|
||
|
}
|
||
|
CRYPTO_THREADID_set_callback(callbackThreadID);
|
||
|
CRYPTO_set_locking_callback(callbackLocking);
|
||
|
// dynamic locking
|
||
|
CRYPTO_set_dynlock_create_callback(dyn_create);
|
||
|
CRYPTO_set_dynlock_lock_callback(dyn_lock);
|
||
|
CRYPTO_set_dynlock_destroy_callback(dyn_destroy);
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
void cleanupThreadingLocks() {
|
||
|
#if !FOLLY_SSL_DETAIL_OPENSSL_IS_110
|
||
|
CRYPTO_THREADID_set_callback(nullptr);
|
||
|
CRYPTO_set_locking_callback(nullptr);
|
||
|
CRYPTO_set_dynlock_create_callback(nullptr);
|
||
|
CRYPTO_set_dynlock_lock_callback(nullptr);
|
||
|
CRYPTO_set_dynlock_destroy_callback(nullptr);
|
||
|
locks().reset();
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
} // namespace detail
|
||
|
} // namespace ssl
|
||
|
} // namespace folly
|