CRYPTO_THREAD_RUN_ONCE - Online Linux Manual PageSection : 3
Updated : 2021-03-26
Source : 1.1.1k
Note : OpenSSL

NAMECRYPTO_THREAD_run_once, CRYPTO_THREAD_lock_new, CRYPTO_THREAD_read_lock, CRYPTO_THREAD_write_lock, CRYPTO_THREAD_unlock, CRYPTO_THREAD_lock_free, CRYPTO_atomic_add − OpenSSL thread support

SYNOPSIS​ #include <openssl/crypto.h> ​ ​ CRYPTO_ONCE CRYPTO_ONCE_STATIC_INIT; ​ int CRYPTO_THREAD_run_once(CRYPTO_ONCE *once, void (*init)(void)); ​ ​ CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void); ​ int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *lock); ​ int CRYPTO_THREAD_write_lock(CRYPTO_RWLOCK *lock); ​ int CRYPTO_THREAD_unlock(CRYPTO_RWLOCK *lock); ​ void CRYPTO_THREAD_lock_free(CRYPTO_RWLOCK *lock); ​ ​ int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock);

DESCRIPTIONOpenSSL can be safely used in multi-threaded applications provided that support for the underlying OS threading API is built-in. Currently, OpenSSL supports the pthread and Windows APIs. OpenSSL can also be built without any multi-threading support, for example on platforms that don't provide any threading support or that provide a threading API that is not yet supported by OpenSSL. The following multi-threading function are provided: • CRYPTO_THREAD_run_once() can be used to perform one-time initialization. The once argument must be a pointer to a static object of type ​CRYPTO_ONCE that was statically initialized to the value ​CRYPTO_ONCE_STATIC_INIT. The init argument is a pointer to a function that performs the desired exactly once initialization. In particular, this can be used to allocate locks in a thread-safe manner, which can then be used with the locking functions below. • CRYPTO_THREAD_lock_new() allocates, initializes and returns a new read/write lock. • CRYPTO_THREAD_read_lock() locks the provided lock for reading. • CRYPTO_THREAD_write_lock() locks the provided lock for writing. • CRYPTO_THREAD_unlock() unlocks the previously locked lock. • CRYPTO_THREAD_lock_free() frees the provided lock. • CRYPTO_atomic_add() atomically adds amount to val and returns the result of the operation in ret. lock will be locked, unless atomic operations are supported on the specific platform. Because of this, if a variable is modified by CRYPTO_atomic_add() then CRYPTO_atomic_add() must be the only way that the variable is modified.

RETURN VALUESCRYPTO_THREAD_run_once() returns 1 on success, or 0 on error. CRYPTO_THREAD_lock_new() returns the allocated lock, or NULL on error. CRYPTO_THREAD_lock_free() returns no value. The other functions return 1 on success, or 0 on error.

NOTESOn Windows platforms the CRYPTO_THREAD_* types and functions in the openssl/crypto.h header are dependent on some of the types customarily made available by including windows.h. The application developer is likely to require control over when the latter is included, commonly as one of the first included headers. Therefore, it is defined as an application developer's responsibility to include windows.h prior to crypto.h where use of CRYPTO_THREAD_* types and functions is required.

EXAMPLESThis example safely initializes and uses a lock. ​ #ifdef _WIN32 ​ # include <windows.h> ​ #endif ​ #include <openssl/crypto.h> ​ ​ static CRYPTO_ONCE once = CRYPTO_ONCE_STATIC_INIT; ​ static CRYPTO_RWLOCK *lock; ​ ​ static void myinit(void){ ​ lock = CRYPTO_THREAD_lock_new(); ​ } ​ ​ static int mylock(void){ ​ if (!CRYPTO_THREAD_run_once(&once, void init) || lock == NULL) ​ return 0; ​ return CRYPTO_THREAD_write_lock(lock); ​ } ​ ​ static int myunlock(void){ ​ return CRYPTO_THREAD_unlock(lock); ​ } ​ ​ int serialized(void){ ​ int ret = 0; ​ ​ if (mylock()) { ​ /* Your code here, do not return without releasing the lock! */ ​ ret = ... ; ​ } ​ myunlock(); ​ return ret; ​ } Finalization of locks is an advanced topic, not covered in this example. This can only be done at process exit or when a dynamically loaded library is no longer in use and is unloaded. The simplest solution is to just leak the lock in applications and not repeatedly load/unload shared libraries that allocate locks.

NOTESYou can find out if OpenSSL was configured with thread support: ​ #include <openssl/opensslconf.h> ​ #if defined(OPENSSL_THREADS) ​ /* thread support enabled */ ​ #else ​ /* no thread support */ ​ #endif

SEE ALSOcrypto(7)

COPYRIGHTCopyright 2000−2020 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the License). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
0
Johanes Gumabo
Data Size   :   15,211 byte
man-C___RYPTO_atomic_add.3sslBuild   :   2024-12-05, 20:55   :  
Visitor Screen   :   x
Visitor Counter ( page / site )   :   3 / 171,486
Visitor ID   :     :  
Visitor IP   :   18.223.108.134   :  
Visitor Provider   :   AMAZON-02   :  
Provider Position ( lat x lon )   :   39.962500 x -83.006100   :   x
Provider Accuracy Radius ( km )   :   1000   :  
Provider City   :   Columbus   :  
Provider Province   :   Ohio ,   :   ,
Provider Country   :   United States   :  
Provider Continent   :   North America   :  
Visitor Recorder   :   Version   :  
Visitor Recorder   :   Library   :  
Online Linux Manual Page   :   Version   :   Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page   :   Library   :   lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page   :   Library   :   lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base   :   Version   :   Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base   :   Library   :   lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36

Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.

ERROR : Need New Coding :         (parse_manual_page_|249|C___RYPTO_atomic_add.3ssl|36/37|el══─{─══.|.el══─{─══. ds -- \|\(em\| )         (htmlprn|149|C___RYPTO_atomic_add.3ssl|36/37|.el══─{─══. ds --  —  |.el══─{─══. ds -- \|\(em\| )         (parse_manual_page_|249|C___RYPTO_atomic_add.3ssl|43|br══─}─══|'br══─}─══ )         (htmlprn|149|C___RYPTO_atomic_add.3ssl|43|'br══─}─══ |'br══─}─══ )