Index: net/third_party/nss/ssl/sslmutex.c |
diff --git a/net/third_party/nss/ssl/sslmutex.c b/net/third_party/nss/ssl/sslmutex.c |
deleted file mode 100644 |
index 0e2edc9f0e577271f3686d8b416ff610015def6d..0000000000000000000000000000000000000000 |
--- a/net/third_party/nss/ssl/sslmutex.c |
+++ /dev/null |
@@ -1,647 +0,0 @@ |
-/* This Source Code Form is subject to the terms of the Mozilla Public |
- * License, v. 2.0. If a copy of the MPL was not distributed with this |
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
- |
-#include "seccomon.h" |
-/* This ifdef should match the one in sslsnce.c */ |
-#if defined(XP_UNIX) || defined(XP_WIN32) || defined(XP_OS2) || defined(XP_BEOS) |
- |
-#include "sslmutex.h" |
-#include "prerr.h" |
- |
-static SECStatus |
-single_process_sslMutex_Init(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex != 0 && pMutex->u.sslLock == 0); |
- |
- pMutex->u.sslLock = PR_NewLock(); |
- if (!pMutex->u.sslLock) { |
- return SECFailure; |
- } |
- return SECSuccess; |
-} |
- |
-static SECStatus |
-single_process_sslMutex_Destroy(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex != 0); |
- PR_ASSERT(pMutex->u.sslLock != 0); |
- if (!pMutex->u.sslLock) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- PR_DestroyLock(pMutex->u.sslLock); |
- return SECSuccess; |
-} |
- |
-static SECStatus |
-single_process_sslMutex_Unlock(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex != 0); |
- PR_ASSERT(pMutex->u.sslLock != 0); |
- if (!pMutex->u.sslLock) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- PR_Unlock(pMutex->u.sslLock); |
- return SECSuccess; |
-} |
- |
-static SECStatus |
-single_process_sslMutex_Lock(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex != 0); |
- PR_ASSERT(pMutex->u.sslLock != 0); |
- if (!pMutex->u.sslLock) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- PR_Lock(pMutex->u.sslLock); |
- return SECSuccess; |
-} |
- |
-#if defined(LINUX) || defined(AIX) || defined(BEOS) || defined(BSDI) || (defined(NETBSD) && __NetBSD_Version__ < 500000000) || defined(OPENBSD) |
- |
-#include <unistd.h> |
-#include <fcntl.h> |
-#include <string.h> |
-#include <errno.h> |
-#include "unix_err.h" |
-#include "pratom.h" |
- |
-#define SSL_MUTEX_MAGIC 0xfeedfd |
-#define NONBLOCKING_POSTS 1 /* maybe this is faster */ |
- |
-#if NONBLOCKING_POSTS |
- |
-#ifndef FNONBLOCK |
-#define FNONBLOCK O_NONBLOCK |
-#endif |
- |
-static int |
-setNonBlocking(int fd, int nonBlocking) |
-{ |
- int flags; |
- int err; |
- |
- flags = fcntl(fd, F_GETFL, 0); |
- if (0 > flags) |
- return flags; |
- if (nonBlocking) |
- flags |= FNONBLOCK; |
- else |
- flags &= ~FNONBLOCK; |
- err = fcntl(fd, F_SETFL, flags); |
- return err; |
-} |
-#endif |
- |
-SECStatus |
-sslMutex_Init(sslMutex* pMutex, int shared) |
-{ |
- int err; |
- PR_ASSERT(pMutex); |
- pMutex->isMultiProcess = (PRBool)(shared != 0); |
- if (!shared) { |
- return single_process_sslMutex_Init(pMutex); |
- } |
- pMutex->u.pipeStr.mPipes[0] = -1; |
- pMutex->u.pipeStr.mPipes[1] = -1; |
- pMutex->u.pipeStr.mPipes[2] = -1; |
- pMutex->u.pipeStr.nWaiters = 0; |
- |
- err = pipe(pMutex->u.pipeStr.mPipes); |
- if (err) { |
- nss_MD_unix_map_default_error(errno); |
- return err; |
- } |
-#if NONBLOCKING_POSTS |
- err = setNonBlocking(pMutex->u.pipeStr.mPipes[1], 1); |
- if (err) |
- goto loser; |
-#endif |
- |
- pMutex->u.pipeStr.mPipes[2] = SSL_MUTEX_MAGIC; |
- |
-#if defined(LINUX) && defined(i386) |
- /* Pipe starts out empty */ |
- return SECSuccess; |
-#else |
- /* Pipe starts with one byte. */ |
- return sslMutex_Unlock(pMutex); |
-#endif |
- |
-loser: |
- nss_MD_unix_map_default_error(errno); |
- close(pMutex->u.pipeStr.mPipes[0]); |
- close(pMutex->u.pipeStr.mPipes[1]); |
- return SECFailure; |
-} |
- |
-SECStatus |
-sslMutex_Destroy(sslMutex* pMutex, PRBool processLocal) |
-{ |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Destroy(pMutex); |
- } |
- if (pMutex->u.pipeStr.mPipes[2] != SSL_MUTEX_MAGIC) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- close(pMutex->u.pipeStr.mPipes[0]); |
- close(pMutex->u.pipeStr.mPipes[1]); |
- |
- if (processLocal) { |
- return SECSuccess; |
- } |
- |
- pMutex->u.pipeStr.mPipes[0] = -1; |
- pMutex->u.pipeStr.mPipes[1] = -1; |
- pMutex->u.pipeStr.mPipes[2] = -1; |
- pMutex->u.pipeStr.nWaiters = 0; |
- |
- return SECSuccess; |
-} |
- |
-#if defined(LINUX) && defined(i386) |
-/* No memory barrier needed for this platform */ |
- |
-/* nWaiters includes the holder of the lock (if any) and the number |
-** threads waiting for it. After incrementing nWaiters, if the count |
-** is exactly 1, then you have the lock and may proceed. If the |
-** count is greater than 1, then you must wait on the pipe. |
-*/ |
- |
-SECStatus |
-sslMutex_Unlock(sslMutex* pMutex) |
-{ |
- PRInt32 newValue; |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Unlock(pMutex); |
- } |
- |
- if (pMutex->u.pipeStr.mPipes[2] != SSL_MUTEX_MAGIC) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- /* Do Memory Barrier here. */ |
- newValue = PR_ATOMIC_DECREMENT(&pMutex->u.pipeStr.nWaiters); |
- if (newValue > 0) { |
- int cc; |
- char c = 1; |
- do { |
- cc = write(pMutex->u.pipeStr.mPipes[1], &c, 1); |
- } while (cc < 0 && (errno == EINTR || errno == EAGAIN)); |
- if (cc != 1) { |
- if (cc < 0) |
- nss_MD_unix_map_default_error(errno); |
- else |
- PORT_SetError(PR_UNKNOWN_ERROR); |
- return SECFailure; |
- } |
- } |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Lock(sslMutex* pMutex) |
-{ |
- PRInt32 newValue; |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Lock(pMutex); |
- } |
- |
- if (pMutex->u.pipeStr.mPipes[2] != SSL_MUTEX_MAGIC) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- newValue = PR_ATOMIC_INCREMENT(&pMutex->u.pipeStr.nWaiters); |
- /* Do Memory Barrier here. */ |
- if (newValue > 1) { |
- int cc; |
- char c; |
- do { |
- cc = read(pMutex->u.pipeStr.mPipes[0], &c, 1); |
- } while (cc < 0 && errno == EINTR); |
- if (cc != 1) { |
- if (cc < 0) |
- nss_MD_unix_map_default_error(errno); |
- else |
- PORT_SetError(PR_UNKNOWN_ERROR); |
- return SECFailure; |
- } |
- } |
- return SECSuccess; |
-} |
- |
-#else |
- |
-/* Using Atomic operations requires the use of a memory barrier instruction |
-** on PowerPC, Sparc, and Alpha. NSPR's PR_Atomic functions do not perform |
-** them, and NSPR does not provide a function that does them (e.g. PR_Barrier). |
-** So, we don't use them on those platforms. |
-*/ |
- |
-SECStatus |
-sslMutex_Unlock(sslMutex* pMutex) |
-{ |
- int cc; |
- char c = 1; |
- |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Unlock(pMutex); |
- } |
- |
- if (pMutex->u.pipeStr.mPipes[2] != SSL_MUTEX_MAGIC) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- do { |
- cc = write(pMutex->u.pipeStr.mPipes[1], &c, 1); |
- } while (cc < 0 && (errno == EINTR || errno == EAGAIN)); |
- if (cc != 1) { |
- if (cc < 0) |
- nss_MD_unix_map_default_error(errno); |
- else |
- PORT_SetError(PR_UNKNOWN_ERROR); |
- return SECFailure; |
- } |
- |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Lock(sslMutex* pMutex) |
-{ |
- int cc; |
- char c; |
- |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Lock(pMutex); |
- } |
- |
- if (pMutex->u.pipeStr.mPipes[2] != SSL_MUTEX_MAGIC) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- |
- do { |
- cc = read(pMutex->u.pipeStr.mPipes[0], &c, 1); |
- } while (cc < 0 && errno == EINTR); |
- if (cc != 1) { |
- if (cc < 0) |
- nss_MD_unix_map_default_error(errno); |
- else |
- PORT_SetError(PR_UNKNOWN_ERROR); |
- return SECFailure; |
- } |
- |
- return SECSuccess; |
-} |
- |
-#endif |
- |
-#elif defined(WIN32) |
- |
-#include "win32err.h" |
- |
-/* on Windows, we need to find the optimal type of locking mechanism to use |
- for the sslMutex. |
- |
- There are 3 cases : |
- 1) single-process, use a PRLock, as for all other platforms |
- 2) Win95 multi-process, use a Win32 mutex |
- 3) on WINNT multi-process, use a PRLock + a Win32 mutex |
- |
-*/ |
- |
-#ifdef WINNT |
- |
-SECStatus |
-sslMutex_2LevelInit(sslMutex *sem) |
-{ |
- /* the following adds a PRLock to sslMutex . This is done in each |
- process of a multi-process server and is only needed on WINNT, if |
- using fibers. We can't tell if native threads or fibers are used, so |
- we always do it on WINNT |
- */ |
- PR_ASSERT(sem); |
- if (sem) { |
- /* we need to reset the sslLock in the children or the single_process init |
- function below will assert */ |
- sem->u.sslLock = NULL; |
- } |
- return single_process_sslMutex_Init(sem); |
-} |
- |
-static SECStatus |
-sslMutex_2LevelDestroy(sslMutex *sem) |
-{ |
- return single_process_sslMutex_Destroy(sem); |
-} |
- |
-#endif |
- |
-SECStatus |
-sslMutex_Init(sslMutex *pMutex, int shared) |
-{ |
-#ifdef WINNT |
- SECStatus retvalue; |
-#endif |
- HANDLE hMutex; |
- SECURITY_ATTRIBUTES attributes = |
- { sizeof(SECURITY_ATTRIBUTES), NULL, TRUE }; |
- |
- PR_ASSERT(pMutex != 0 && (pMutex->u.sslMutx == 0 || |
- pMutex->u.sslMutx == |
- INVALID_HANDLE_VALUE)); |
- |
- pMutex->isMultiProcess = (PRBool)(shared != 0); |
- |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Init(pMutex); |
- } |
- |
-#ifdef WINNT |
- /* we need a lock on WINNT for fibers in the parent process */ |
- retvalue = sslMutex_2LevelInit(pMutex); |
- if (SECSuccess != retvalue) |
- return SECFailure; |
-#endif |
- |
- if (!pMutex || ((hMutex = pMutex->u.sslMutx) != 0 && |
- hMutex != |
- INVALID_HANDLE_VALUE)) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- attributes.bInheritHandle = (shared ? TRUE : FALSE); |
- hMutex = CreateMutex(&attributes, FALSE, NULL); |
- if (hMutex == NULL) { |
- hMutex = INVALID_HANDLE_VALUE; |
- nss_MD_win32_map_default_error(GetLastError()); |
- return SECFailure; |
- } |
- pMutex->u.sslMutx = hMutex; |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Destroy(sslMutex *pMutex, PRBool processLocal) |
-{ |
- HANDLE hMutex; |
- int rv; |
- int retvalue = SECSuccess; |
- |
- PR_ASSERT(pMutex != 0); |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Destroy(pMutex); |
- } |
- |
-/* multi-process mode */ |
-#ifdef WINNT |
- /* on NT, get rid of the PRLock used for fibers within a process */ |
- retvalue = sslMutex_2LevelDestroy(pMutex); |
-#endif |
- |
- PR_ASSERT(pMutex->u.sslMutx != 0 && |
- pMutex->u.sslMutx != INVALID_HANDLE_VALUE); |
- if (!pMutex || (hMutex = pMutex->u.sslMutx) == 0 || |
- hMutex == INVALID_HANDLE_VALUE) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- |
- rv = CloseHandle(hMutex); /* ignore error */ |
- if (!processLocal && rv) { |
- pMutex->u.sslMutx = hMutex = INVALID_HANDLE_VALUE; |
- } |
- if (!rv) { |
- nss_MD_win32_map_default_error(GetLastError()); |
- retvalue = SECFailure; |
- } |
- return retvalue; |
-} |
- |
-int |
-sslMutex_Unlock(sslMutex *pMutex) |
-{ |
- BOOL success = FALSE; |
- HANDLE hMutex; |
- |
- PR_ASSERT(pMutex != 0); |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Unlock(pMutex); |
- } |
- |
- PR_ASSERT(pMutex->u.sslMutx != 0 && |
- pMutex->u.sslMutx != INVALID_HANDLE_VALUE); |
- if (!pMutex || (hMutex = pMutex->u.sslMutx) == 0 || |
- hMutex == INVALID_HANDLE_VALUE) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; |
- } |
- success = ReleaseMutex(hMutex); |
- if (!success) { |
- nss_MD_win32_map_default_error(GetLastError()); |
- return SECFailure; |
- } |
-#ifdef WINNT |
- return single_process_sslMutex_Unlock(pMutex); |
- /* release PRLock for other fibers in the process */ |
-#else |
- return SECSuccess; |
-#endif |
-} |
- |
-int |
-sslMutex_Lock(sslMutex *pMutex) |
-{ |
- HANDLE hMutex; |
- DWORD event; |
- DWORD lastError; |
- SECStatus rv; |
- SECStatus retvalue = SECSuccess; |
- PR_ASSERT(pMutex != 0); |
- |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Lock(pMutex); |
- } |
-#ifdef WINNT |
- /* lock first to preserve from other threads/fibers |
- in the same process */ |
- retvalue = single_process_sslMutex_Lock(pMutex); |
-#endif |
- PR_ASSERT(pMutex->u.sslMutx != 0 && |
- pMutex->u.sslMutx != INVALID_HANDLE_VALUE); |
- if (!pMutex || (hMutex = pMutex->u.sslMutx) == 0 || |
- hMutex == INVALID_HANDLE_VALUE) { |
- PORT_SetError(PR_INVALID_ARGUMENT_ERROR); |
- return SECFailure; /* what else ? */ |
- } |
- /* acquire the mutex to be the only owner accross all other processes */ |
- event = WaitForSingleObject(hMutex, INFINITE); |
- switch (event) { |
- case WAIT_OBJECT_0: |
- case WAIT_ABANDONED: |
- rv = SECSuccess; |
- break; |
- |
- case WAIT_TIMEOUT: |
-#if defined(WAIT_IO_COMPLETION) |
- case WAIT_IO_COMPLETION: |
-#endif |
- default: /* should never happen. nothing we can do. */ |
- PR_ASSERT(!("WaitForSingleObject returned invalid value.")); |
- PORT_SetError(PR_UNKNOWN_ERROR); |
- rv = SECFailure; |
- break; |
- |
- case WAIT_FAILED: /* failure returns this */ |
- rv = SECFailure; |
- lastError = GetLastError(); /* for debugging */ |
- nss_MD_win32_map_default_error(lastError); |
- break; |
- } |
- |
- if (!(SECSuccess == retvalue && SECSuccess == rv)) { |
- return SECFailure; |
- } |
- |
- return SECSuccess; |
-} |
- |
-#elif defined(XP_UNIX) && !defined(DARWIN) |
- |
-#include <errno.h> |
-#include "unix_err.h" |
- |
-SECStatus |
-sslMutex_Init(sslMutex* pMutex, int shared) |
-{ |
- int rv; |
- PR_ASSERT(pMutex); |
- pMutex->isMultiProcess = (PRBool)(shared != 0); |
- if (!shared) { |
- return single_process_sslMutex_Init(pMutex); |
- } |
- do { |
- rv = sem_init(&pMutex->u.sem, shared, 1); |
- } while (rv < 0 && errno == EINTR); |
- if (rv < 0) { |
- nss_MD_unix_map_default_error(errno); |
- return SECFailure; |
- } |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Destroy(sslMutex* pMutex, PRBool processLocal) |
-{ |
- int rv; |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Destroy(pMutex); |
- } |
- |
- /* semaphores are global resources. See SEM_DESTROY(3) man page */ |
- if (processLocal) { |
- return SECSuccess; |
- } |
- do { |
- rv = sem_destroy(&pMutex->u.sem); |
- } while (rv < 0 && errno == EINTR); |
- if (rv < 0) { |
- nss_MD_unix_map_default_error(errno); |
- return SECFailure; |
- } |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Unlock(sslMutex* pMutex) |
-{ |
- int rv; |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Unlock(pMutex); |
- } |
- do { |
- rv = sem_post(&pMutex->u.sem); |
- } while (rv < 0 && errno == EINTR); |
- if (rv < 0) { |
- nss_MD_unix_map_default_error(errno); |
- return SECFailure; |
- } |
- return SECSuccess; |
-} |
- |
-SECStatus |
-sslMutex_Lock(sslMutex* pMutex) |
-{ |
- int rv; |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Lock(pMutex); |
- } |
- do { |
- rv = sem_wait(&pMutex->u.sem); |
- } while (rv < 0 && errno == EINTR); |
- if (rv < 0) { |
- nss_MD_unix_map_default_error(errno); |
- return SECFailure; |
- } |
- return SECSuccess; |
-} |
- |
-#else |
- |
-SECStatus |
-sslMutex_Init(sslMutex* pMutex, int shared) |
-{ |
- PR_ASSERT(pMutex); |
- pMutex->isMultiProcess = (PRBool)(shared != 0); |
- if (!shared) { |
- return single_process_sslMutex_Init(pMutex); |
- } |
- PORT_Assert(!("sslMutex_Init not implemented for multi-process applications !")); |
- PORT_SetError(PR_NOT_IMPLEMENTED_ERROR); |
- return SECFailure; |
-} |
- |
-SECStatus |
-sslMutex_Destroy(sslMutex* pMutex, PRBool processLocal) |
-{ |
- PR_ASSERT(pMutex); |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Destroy(pMutex); |
- } |
- PORT_Assert(!("sslMutex_Destroy not implemented for multi-process applications !")); |
- PORT_SetError(PR_NOT_IMPLEMENTED_ERROR); |
- return SECFailure; |
-} |
- |
-SECStatus |
-sslMutex_Unlock(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex); |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Unlock(pMutex); |
- } |
- PORT_Assert(!("sslMutex_Unlock not implemented for multi-process applications !")); |
- PORT_SetError(PR_NOT_IMPLEMENTED_ERROR); |
- return SECFailure; |
-} |
- |
-SECStatus |
-sslMutex_Lock(sslMutex* pMutex) |
-{ |
- PR_ASSERT(pMutex); |
- if (PR_FALSE == pMutex->isMultiProcess) { |
- return single_process_sslMutex_Lock(pMutex); |
- } |
- PORT_Assert(!("sslMutex_Lock not implemented for multi-process applications !")); |
- PORT_SetError(PR_NOT_IMPLEMENTED_ERROR); |
- return SECFailure; |
-} |
- |
-#endif |
- |
-#endif |