[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
Rich Salz
rsalz at openssl.org
Thu Jan 25 18:20:30 UTC 2018
The branch OpenSSL_1_0_2-stable has been updated
via fe8199badfce9ffccd0e1d9c245c4cdd8d412ef1 (commit)
from d3736a65baadb369b2570bf85d7f966bc567e7ff (commit)
- Log -----------------------------------------------------------------
commit fe8199badfce9ffccd0e1d9c245c4cdd8d412ef1
Author: Rich Salz <rsalz at openssl.org>
Date: Wed Jan 24 17:28:45 2018 -0500
Add warnings to thread doc.
Thanks to Yun Jiang for pointing this out.
Reviewed-by: Richard Levitte <levitte at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5164)
-----------------------------------------------------------------------
Summary of changes:
doc/crypto/threads.pod | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/doc/crypto/threads.pod b/doc/crypto/threads.pod
index dc0e939..30c19b8 100644
--- a/doc/crypto/threads.pod
+++ b/doc/crypto/threads.pod
@@ -63,9 +63,13 @@ CRYPTO_destroy_dynlockid, CRYPTO_lock - OpenSSL thread support
=head1 DESCRIPTION
-OpenSSL can safely be used in multi-threaded applications provided
-that at least two callback functions are set, locking_function and
+OpenSSL can generally be used safely in multi-threaded applications provided
+that at least two callback functions are set, the locking_function and
threadid_func.
+Note that OpenSSL is not completely thread-safe, and unfortunately not all
+global resources have the necessary locks.
+Further, the thread-safety does not extend to things like multiple threads
+using the same B<SSL> object at the same time.
locking_function(int mode, int n, const char *file, int line) is
needed to perform locking on shared data structures.
More information about the openssl-commits
mailing list