| OLD | NEW |
| 1 /* ***** BEGIN LICENSE BLOCK ***** | 1 /* ***** BEGIN LICENSE BLOCK ***** |
| 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
| 3 * | 3 * |
| 4 * The contents of this file are subject to the Mozilla Public License Version | 4 * The contents of this file are subject to the Mozilla Public License Version |
| 5 * 1.1 (the "License"); you may not use this file except in compliance with | 5 * 1.1 (the "License"); you may not use this file except in compliance with |
| 6 * the License. You may obtain a copy of the License at | 6 * the License. You may obtain a copy of the License at |
| 7 * http://www.mozilla.org/MPL/ | 7 * http://www.mozilla.org/MPL/ |
| 8 * | 8 * |
| 9 * Software distributed under the License is distributed on an "AS IS" basis, | 9 * Software distributed under the License is distributed on an "AS IS" basis, |
| 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License | 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License |
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 47 return "NULL"; | 47 return "NULL"; |
| 48 #ifdef NSS_ENABLE_ZLIB | 48 #ifdef NSS_ENABLE_ZLIB |
| 49 case ssl_compression_deflate: | 49 case ssl_compression_deflate: |
| 50 return "DEFLATE"; | 50 return "DEFLATE"; |
| 51 #endif | 51 #endif |
| 52 default: | 52 default: |
| 53 return "???"; | 53 return "???"; |
| 54 } | 54 } |
| 55 } | 55 } |
| 56 | 56 |
| 57 SECStatus |
| 58 SSL_GetChannelUsername(PRFileDesc *fd, SECItem *user) |
| 59 { |
| 60 SECItem * username; |
| 61 sslSocket * ss; |
| 62 |
| 63 ss = ssl_FindSocket(fd); |
| 64 if (!ss) { |
| 65 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelUsername", |
| 66 SSL_GETPID(), fd)); |
| 67 return SECFailure; |
| 68 } |
| 69 |
| 70 if (ss->sec.userName == NULL) { |
| 71 PORT_SetError(SEC_ERROR_INVALID_ARGS); |
| 72 return SECFailure; |
| 73 } |
| 74 |
| 75 return SECITEM_CopyItem(NULL, user, ss->sec.userName); |
| 76 } |
| 77 |
| 57 SECStatus | 78 SECStatus |
| 58 SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, PRUintn len) | 79 SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, PRUintn len) |
| 59 { | 80 { |
| 60 sslSocket * ss; | 81 sslSocket * ss; |
| 61 SSLChannelInfo inf; | 82 SSLChannelInfo inf; |
| 62 sslSessionID * sid; | 83 sslSessionID * sid; |
| 63 PRBool enoughFirstHsDone = PR_FALSE; | 84 PRBool enoughFirstHsDone = PR_FALSE; |
| 64 | 85 |
| 65 if (!info || len < sizeof inf.length) { | 86 if (!info || len < sizeof inf.length) { |
| 66 PORT_SetError(SEC_ERROR_INVALID_ARGS); | 87 PORT_SetError(SEC_ERROR_INVALID_ARGS); |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 134 #define S_DSA "DSA", ssl_auth_dsa | 155 #define S_DSA "DSA", ssl_auth_dsa |
| 135 #define S_RSA "RSA", ssl_auth_rsa | 156 #define S_RSA "RSA", ssl_auth_rsa |
| 136 #define S_KEA "KEA", ssl_auth_kea | 157 #define S_KEA "KEA", ssl_auth_kea |
| 137 #define S_ECDSA "ECDSA", ssl_auth_ecdsa | 158 #define S_ECDSA "ECDSA", ssl_auth_ecdsa |
| 138 | 159 |
| 139 #define K_DHE "DHE", kt_dh | 160 #define K_DHE "DHE", kt_dh |
| 140 #define K_RSA "RSA", kt_rsa | 161 #define K_RSA "RSA", kt_rsa |
| 141 #define K_KEA "KEA", kt_kea | 162 #define K_KEA "KEA", kt_kea |
| 142 #define K_ECDH "ECDH", kt_ecdh | 163 #define K_ECDH "ECDH", kt_ecdh |
| 143 #define K_ECDHE "ECDHE", kt_ecdh | 164 #define K_ECDHE "ECDHE", kt_ecdh |
| 165 #define K_SRP "SRP", ssl_kea_srp |
| 166 #define K_SRP_RSA "SRP_RSA", ssl_kea_srp_rsa |
| 167 #define K_SRP_DSS "SRP_DSS", ssl_kea_srp_dss |
| 144 | 168 |
| 145 #define C_SEED "SEED", calg_seed | 169 #define C_SEED "SEED", calg_seed |
| 146 #define C_CAMELLIA "CAMELLIA", calg_camellia | 170 #define C_CAMELLIA "CAMELLIA", calg_camellia |
| 147 #define C_AES "AES", calg_aes | 171 #define C_AES "AES", calg_aes |
| 148 #define C_RC4 "RC4", calg_rc4 | 172 #define C_RC4 "RC4", calg_rc4 |
| 149 #define C_RC2 "RC2", calg_rc2 | 173 #define C_RC2 "RC2", calg_rc2 |
| 150 #define C_DES "DES", calg_des | 174 #define C_DES "DES", calg_des |
| 151 #define C_3DES "3DES", calg_3des | 175 #define C_3DES "3DES", calg_3des |
| 152 #define C_NULL "NULL", calg_null | 176 #define C_NULL "NULL", calg_null |
| 153 #define C_SJ "SKIPJACK", calg_sj | 177 #define C_SJ "SKIPJACK", calg_sj |
| (...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 194 {0,CS(SSL_RSA_FIPS_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 0, 1, }, | 218 {0,CS(SSL_RSA_FIPS_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 0, 1, }, |
| 195 {0,CS(SSL_RSA_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 0, 0, }, | 219 {0,CS(SSL_RSA_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 0, 0, }, |
| 196 | 220 |
| 197 {0,CS(TLS_RSA_EXPORT1024_WITH_RC4_56_SHA), S_RSA, K_RSA, C_RC4, B_56, M_SHA,
0, 1, 0, }, | 221 {0,CS(TLS_RSA_EXPORT1024_WITH_RC4_56_SHA), S_RSA, K_RSA, C_RC4, B_56, M_SHA,
0, 1, 0, }, |
| 198 {0,CS(TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 1, 0, }, | 222 {0,CS(TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA), S_RSA, K_RSA, C_DES, B_DES, M_SHA,
0, 1, 0, }, |
| 199 {0,CS(SSL_RSA_EXPORT_WITH_RC4_40_MD5), S_RSA, K_RSA, C_RC4, B_40, M_MD5,
0, 1, 0, }, | 223 {0,CS(SSL_RSA_EXPORT_WITH_RC4_40_MD5), S_RSA, K_RSA, C_RC4, B_40, M_MD5,
0, 1, 0, }, |
| 200 {0,CS(SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5), S_RSA, K_RSA, C_RC2, B_40, M_MD5,
0, 1, 0, }, | 224 {0,CS(SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5), S_RSA, K_RSA, C_RC2, B_40, M_MD5,
0, 1, 0, }, |
| 201 {0,CS(SSL_RSA_WITH_NULL_SHA), S_RSA, K_RSA, C_NULL,B_0, M_SHA,
0, 1, 0, }, | 225 {0,CS(SSL_RSA_WITH_NULL_SHA), S_RSA, K_RSA, C_NULL,B_0, M_SHA,
0, 1, 0, }, |
| 202 {0,CS(SSL_RSA_WITH_NULL_MD5), S_RSA, K_RSA, C_NULL,B_0, M_MD5,
0, 1, 0, }, | 226 {0,CS(SSL_RSA_WITH_NULL_MD5), S_RSA, K_RSA, C_NULL,B_0, M_MD5,
0, 1, 0, }, |
| 203 | 227 |
| 228 /* SRP cipher suites */ |
| 229 {0,CS(TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA), S_KEA, K_SRP, C_3DES,B_3DES,M_SHA,
0, 0, 0, }, |
| 230 {0,CS(TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA), S_KEA, K_SRP_RSA, C_3DES,B_3DES,M_
SHA, 0, 0, 0, }, |
| 231 {0,CS(TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA), S_KEA, K_SRP_DSS, C_3DES,B_3DES,M_
SHA, 0, 0, 0, }, |
| 232 {0,CS(TLS_SRP_SHA_WITH_AES_128_CBC_SHA), S_KEA, K_SRP, C_AES, B_128, M_SHA,
0, 0, 0, }, |
| 233 {0,CS(TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA), S_KEA, K_SRP_RSA, C_AES, B_128, M_
SHA, 0, 0, 0, }, |
| 234 {0,CS(TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA), S_KEA, K_SRP_DSS, C_AES, B_128, M_
SHA, 0, 0, 0, }, |
| 235 {0,CS(TLS_SRP_SHA_WITH_AES_256_CBC_SHA), S_KEA, K_SRP, C_AES, B_256, M_SHA,
0, 0, 0, }, |
| 236 {0,CS(TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA), S_KEA, K_SRP_RSA, C_AES, B_256, M_
SHA, 0, 0, 0, }, |
| 237 {0,CS(TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA), S_KEA, K_SRP_DSS, C_AES, B_256, M_
SHA, 0, 0, 0, }, |
| 238 |
| 204 #ifdef NSS_ENABLE_ECC | 239 #ifdef NSS_ENABLE_ECC |
| 205 /* ECC cipher suites */ | 240 /* ECC cipher suites */ |
| 206 {0,CS(TLS_ECDH_ECDSA_WITH_NULL_SHA), S_ECDSA, K_ECDH, C_NULL, B_0, M_SH
A, 0, 0, 0, }, | 241 {0,CS(TLS_ECDH_ECDSA_WITH_NULL_SHA), S_ECDSA, K_ECDH, C_NULL, B_0, M_SH
A, 0, 0, 0, }, |
| 207 {0,CS(TLS_ECDH_ECDSA_WITH_RC4_128_SHA), S_ECDSA, K_ECDH, C_RC4, B_128, M_S
HA, 0, 0, 0, }, | 242 {0,CS(TLS_ECDH_ECDSA_WITH_RC4_128_SHA), S_ECDSA, K_ECDH, C_RC4, B_128, M_S
HA, 0, 0, 0, }, |
| 208 {0,CS(TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA), S_ECDSA, K_ECDH, C_3DES, B_3DES, M
_SHA, 1, 0, 0, }, | 243 {0,CS(TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA), S_ECDSA, K_ECDH, C_3DES, B_3DES, M
_SHA, 1, 0, 0, }, |
| 209 {0,CS(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA), S_ECDSA, K_ECDH, C_AES, B_128, M_S
HA, 1, 0, 0, }, | 244 {0,CS(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA), S_ECDSA, K_ECDH, C_AES, B_128, M_S
HA, 1, 0, 0, }, |
| 210 {0,CS(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA), S_ECDSA, K_ECDH, C_AES, B_256, M_S
HA, 1, 0, 0, }, | 245 {0,CS(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA), S_ECDSA, K_ECDH, C_AES, B_256, M_S
HA, 1, 0, 0, }, |
| 211 | 246 |
| 212 {0,CS(TLS_ECDHE_ECDSA_WITH_NULL_SHA), S_ECDSA, K_ECDHE, C_NULL, B_0, M_S
HA, 0, 0, 0, }, | 247 {0,CS(TLS_ECDHE_ECDSA_WITH_NULL_SHA), S_ECDSA, K_ECDHE, C_NULL, B_0, M_S
HA, 0, 0, 0, }, |
| 213 {0,CS(TLS_ECDHE_ECDSA_WITH_RC4_128_SHA), S_ECDSA, K_ECDHE, C_RC4, B_128, M_
SHA, 0, 0, 0, }, | 248 {0,CS(TLS_ECDHE_ECDSA_WITH_RC4_128_SHA), S_ECDSA, K_ECDHE, C_RC4, B_128, M_
SHA, 0, 0, 0, }, |
| (...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 348 sniName = PORT_ZNew(SECItem); | 383 sniName = PORT_ZNew(SECItem); |
| 349 if (!sniName) { | 384 if (!sniName) { |
| 350 PORT_Free(name); | 385 PORT_Free(name); |
| 351 return NULL; | 386 return NULL; |
| 352 } | 387 } |
| 353 sniName->data = (void*)name; | 388 sniName->data = (void*)name; |
| 354 sniName->len = PORT_Strlen(name); | 389 sniName->len = PORT_Strlen(name); |
| 355 } | 390 } |
| 356 return sniName; | 391 return sniName; |
| 357 } | 392 } |
| OLD | NEW |