LEFT | RIGHT |
(no file at all) | |
1 /* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ | 1 /* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ |
2 /* | 2 /* |
3 * SSL3 Protocol | 3 * SSL3 Protocol |
4 * | 4 * |
5 * This Source Code Form is subject to the terms of the Mozilla Public | 5 * This Source Code Form is subject to the terms of the Mozilla Public |
6 * License, v. 2.0. If a copy of the MPL was not distributed with this | 6 * License, v. 2.0. If a copy of the MPL was not distributed with this |
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 7 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
8 | 8 |
9 /* TODO(ekr): Implement HelloVerifyRequest on server side. OK for now. */ | 9 /* TODO(ekr): Implement HelloVerifyRequest on server side. OK for now. */ |
10 | 10 |
(...skipping 10907 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
10918 PORT_Assert(rv != SECSuccess || retLen == outLen); | 10918 PORT_Assert(rv != SECSuccess || retLen == outLen); |
10919 | 10919 |
10920 PK11_DestroyContext(prf_context, PR_TRUE); | 10920 PK11_DestroyContext(prf_context, PR_TRUE); |
10921 } else { | 10921 } else { |
10922 /* bypass PKCS11 */ | 10922 /* bypass PKCS11 */ |
10923 #ifdef NO_PKCS11_BYPASS | 10923 #ifdef NO_PKCS11_BYPASS |
10924 PORT_Assert(spec->master_secret); | 10924 PORT_Assert(spec->master_secret); |
10925 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | 10925 PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
10926 rv = SECFailure; | 10926 rv = SECFailure; |
10927 #else | 10927 #else |
10928 » SECItem inData = { siBuffer, }; | 10928 » SECItem inData = { siBuffer }; |
10929 » SECItem outData = { siBuffer, }; | 10929 » SECItem outData = { siBuffer }; |
10930 PRBool isFIPS = PR_FALSE; | 10930 PRBool isFIPS = PR_FALSE; |
10931 | 10931 |
10932 inData.data = (unsigned char *) val; | 10932 inData.data = (unsigned char *) val; |
10933 inData.len = valLen; | 10933 inData.len = valLen; |
10934 outData.data = out; | 10934 outData.data = out; |
10935 outData.len = outLen; | 10935 outData.len = outLen; |
10936 if (spec->version >= SSL_LIBRARY_VERSION_TLS_1_2) { | 10936 if (spec->version >= SSL_LIBRARY_VERSION_TLS_1_2) { |
10937 rv = TLS_P_hash(HASH_AlgSHA256, &spec->msItem, label, &inData, | 10937 rv = TLS_P_hash(HASH_AlgSHA256, &spec->msItem, label, &inData, |
10938 &outData, isFIPS); | 10938 &outData, isFIPS); |
10939 } else { | 10939 } else { |
(...skipping 1984 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
12924 if (ss->ssl3.dheGroups) { | 12924 if (ss->ssl3.dheGroups) { |
12925 PORT_Free(ss->ssl3.dheGroups); | 12925 PORT_Free(ss->ssl3.dheGroups); |
12926 } | 12926 } |
12927 | 12927 |
12928 ss->ssl3.initialized = PR_FALSE; | 12928 ss->ssl3.initialized = PR_FALSE; |
12929 | 12929 |
12930 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); | 12930 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); |
12931 } | 12931 } |
12932 | 12932 |
12933 /* End of ssl3con.c */ | 12933 /* End of ssl3con.c */ |
LEFT | RIGHT |