+
+#ifndef OPENSSL_SYS_UNIX
+CRYPTO_RWLOCK *CRYPTO_THREAD_glock_new(const char *name)
+{
+ return CRYPTO_THREAD_lock_new();
+}
+#else
+
+
+/*
+ * Create a new global lock, return NULL on error.
+ */
+CRYPTO_RWLOCK *CRYPTO_THREAD_glock_new(const char *name)
+{
+ GLOBAL_LOCK *newlock;
+
+ if (name == NULL
+ || glock_lock == NULL
+ || (newlock = malloc(sizeof(*newlock))) == NULL)
+ return CRYPTO_THREAD_lock_new();
+ CRYPTO_THREAD_write_lock(glock_lock);
+ newlock->name = name;
+ newlock->lock = CRYPTO_THREAD_lock_new();
+ newlock->next = global_locks;
+ global_locks = newlock->next;
+ CRYPTO_THREAD_unlock(glock_lock);
+ return newlock->lock;
+}
+
+/*
+ * Unlock all global locks.
+ */
+static void unlock_all(void)
+{
+ GLOBAL_LOCK *lp;
+
+ CRYPTO_THREAD_write_lock(init_lock);
+ for (lp = global_locks; lp != NULL; lp = lp->next)
+ CRYPTO_THREAD_unlock(lp->lock);
+ CRYPTO_THREAD_unlock(init_lock);
+}
+
+/*
+ * The following three functions are for OpenSSL developers. This is
+ * where we set/reset state across fork (called via pthread_atfork when
+ * it exists, or manually by the application when it doesn't).
+ *
+ * WARNING! If you put code in either OPENSSL_fork_parent or
+ * OPENSSL_fork_child, you MUST MAKE SURE that they are async-signal-
+ * safe. See this link, for example:
+ * http://man7.org/linux/man-pages/man7/signal-safety.7.html
+ */
+
+void OPENSSL_fork_prepare(void)
+{
+ GLOBAL_LOCK *lp;
+
+ CRYPTO_THREAD_write_lock(init_lock);
+ for (lp = global_locks; lp != NULL; lp = lp->next)
+ CRYPTO_THREAD_write_lock(lp->lock);
+ CRYPTO_THREAD_unlock(init_lock);
+}
+
+void OPENSSL_fork_parent(void)
+{
+ unlock_all();
+}
+
+void OPENSSL_fork_child(void)
+{
+ unlock_all();
+ rand_fork();
+}
+#endif