OLD | NEW |
1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived | 5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived |
6 // from AuthCertificateCallback() in | 6 // from AuthCertificateCallback() in |
7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp. | 7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp. |
8 | 8 |
9 /* ***** BEGIN LICENSE BLOCK ***** | 9 /* ***** BEGIN LICENSE BLOCK ***** |
10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
(...skipping 294 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
305 if (rv != SECSuccess) | 305 if (rv != SECSuccess) |
306 LOG(INFO) << "SSL_ENABLE_SESSION_TICKETS failed. Old system nss?"; | 306 LOG(INFO) << "SSL_ENABLE_SESSION_TICKETS failed. Old system nss?"; |
307 #else | 307 #else |
308 #error "You need to install NSS-3.12 or later to build chromium" | 308 #error "You need to install NSS-3.12 or later to build chromium" |
309 #endif | 309 #endif |
310 | 310 |
311 #ifdef SSL_ENABLE_DEFLATE | 311 #ifdef SSL_ENABLE_DEFLATE |
312 rv = SSL_OptionSet(nss_fd_, SSL_ENABLE_DEFLATE, PR_TRUE); | 312 rv = SSL_OptionSet(nss_fd_, SSL_ENABLE_DEFLATE, PR_TRUE); |
313 if (rv != SECSuccess) | 313 if (rv != SECSuccess) |
314 LOG(INFO) << "SSL_ENABLE_DEFLATE failed. Old system nss?"; | 314 LOG(INFO) << "SSL_ENABLE_DEFLATE failed. Old system nss?"; |
| 315 #else |
| 316 #error This is a temporary hack to check that the builders are using the correct
header files. It will be removed once a build has finished. |
315 #endif | 317 #endif |
316 | 318 |
317 #ifdef SSL_NEXT_PROTO_NEGOTIATED | 319 #ifdef SSL_NEXT_PROTO_NEGOTIATED |
318 if (!ssl_config_.next_protos.empty()) { | 320 if (!ssl_config_.next_protos.empty()) { |
319 rv = SSL_SetNextProtoNego( | 321 rv = SSL_SetNextProtoNego( |
320 nss_fd_, | 322 nss_fd_, |
321 reinterpret_cast<const unsigned char *>(ssl_config_.next_protos.data()), | 323 reinterpret_cast<const unsigned char *>(ssl_config_.next_protos.data()), |
322 ssl_config_.next_protos.size()); | 324 ssl_config_.next_protos.size()); |
323 if (rv != SECSuccess) | 325 if (rv != SECSuccess) |
324 LOG(INFO) << "SSL_SetNextProtoNego failed."; | 326 LOG(INFO) << "SSL_SetNextProtoNego failed."; |
(...skipping 831 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1156 } | 1158 } |
1157 PRErrorCode prerr = PR_GetError(); | 1159 PRErrorCode prerr = PR_GetError(); |
1158 if (prerr == PR_WOULD_BLOCK_ERROR) { | 1160 if (prerr == PR_WOULD_BLOCK_ERROR) { |
1159 return ERR_IO_PENDING; | 1161 return ERR_IO_PENDING; |
1160 } | 1162 } |
1161 LeaveFunction(""); | 1163 LeaveFunction(""); |
1162 return NetErrorFromNSPRError(prerr); | 1164 return NetErrorFromNSPRError(prerr); |
1163 } | 1165 } |
1164 | 1166 |
1165 } // namespace net | 1167 } // namespace net |
OLD | NEW |