RetroZilla/security/nss/lib/ssl/sslmutex.h
roytam1 44b7f056d9 cherry-picked mozilla NSS upstream changes (to rev bad5fd065fa1, which is on par with 3.20):
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2018-07-14 21:22:32 +08:00

131 lines
3.3 KiB
C

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef __SSLMUTEX_H_
#define __SSLMUTEX_H_ 1
/* What SSL really wants is portable process-shared unnamed mutexes in
* shared memory, that have the property that if the process that holds
* them dies, they are released automatically, and that (unlike fcntl
* record locking) lock to the thread, not to the process.
* NSPR doesn't provide that.
* Windows has mutexes that meet that description, but they're not portable.
* POSIX mutexes are not automatically released when the holder dies,
* and other processes/threads cannot release the mutex on behalf of the
* dead holder.
* POSIX semaphores can be used to accomplish this on systems that implement
* process-shared unnamed POSIX semaphores, because a watchdog thread can
* discover and release semaphores that were held by a dead process.
* On systems that do not support process-shared POSIX unnamed semaphores,
* they can be emulated using pipes.
* The performance cost of doing that is not yet measured.
*
* So, this API looks a lot like POSIX pthread mutexes.
*/
#include "prtypes.h"
#include "prlock.h"
#if defined(NETBSD)
#include <sys/param.h> /* for __NetBSD_Version__ */
#endif
#if defined(WIN32)
#include <wtypes.h>
typedef struct
{
PRBool isMultiProcess;
#ifdef WINNT
/* on WINNT we need both the PRLock and the Win32 mutex for fibers */
struct {
#else
union {
#endif
PRLock* sslLock;
HANDLE sslMutx;
} u;
} sslMutex;
typedef int sslPID;
#elif defined(LINUX) || defined(AIX) || defined(BEOS) || defined(BSDI) || (defined(NETBSD) && __NetBSD_Version__ < 500000000) || defined(OPENBSD)
#include <sys/types.h>
#include "prtypes.h"
typedef struct {
PRBool isMultiProcess;
union {
PRLock* sslLock;
struct {
int mPipes[3];
PRInt32 nWaiters;
} pipeStr;
} u;
} sslMutex;
typedef pid_t sslPID;
/* other types of unix, except OS X */
#elif defined(XP_UNIX) && !defined(DARWIN)
#include <sys/types.h> /* for pid_t */
#include <semaphore.h> /* for sem_t, and sem_* functions */
typedef struct
{
PRBool isMultiProcess;
union {
PRLock* sslLock;
sem_t sem;
} u;
} sslMutex;
typedef pid_t sslPID;
#else /* no support for cross-process locking */
/* what platform is this ?? */
typedef struct {
PRBool isMultiProcess;
union {
PRLock* sslLock;
/* include cross-process locking mechanism here */
} u;
} sslMutex;
#ifdef DARWIN
typedef pid_t sslPID;
#else
typedef int sslPID;
#endif
#endif
#include "seccomon.h"
SEC_BEGIN_PROTOS
extern SECStatus sslMutex_Init(sslMutex *sem, int shared);
/* If processLocal is set to true, then just free resources which are *only* associated
* with the current process. Leave any shared resources (including the state of
* shared memory) intact. */
extern SECStatus sslMutex_Destroy(sslMutex *sem, PRBool processLocal);
extern SECStatus sslMutex_Unlock(sslMutex *sem);
extern SECStatus sslMutex_Lock(sslMutex *sem);
#ifdef WINNT
extern SECStatus sslMutex_2LevelInit(sslMutex *sem);
#endif
SEC_END_PROTOS
#endif