OLD | NEW |
1 /* | 1 /* |
2 * SSL3 Protocol | 2 * SSL3 Protocol |
3 * | 3 * |
4 * ***** BEGIN LICENSE BLOCK ***** | 4 * ***** BEGIN LICENSE BLOCK ***** |
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
6 * | 6 * |
7 * The contents of this file are subject to the Mozilla Public License Version | 7 * The contents of this file are subject to the Mozilla Public License Version |
8 * 1.1 (the "License"); you may not use this file except in compliance with | 8 * 1.1 (the "License"); you may not use this file except in compliance with |
9 * the License. You may obtain a copy of the License at | 9 * the License. You may obtain a copy of the License at |
10 * http://www.mozilla.org/MPL/ | 10 * http://www.mozilla.org/MPL/ |
(...skipping 2350 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2361 * chance to get some cycles while the writer thread is in | 2361 * chance to get some cycles while the writer thread is in |
2362 * the middle of a large application data write. (See | 2362 * the middle of a large application data write. (See |
2363 * Bugzilla bug 127740, comment #1.) | 2363 * Bugzilla bug 127740, comment #1.) |
2364 */ | 2364 */ |
2365 ssl_ReleaseXmitBufLock(ss); | 2365 ssl_ReleaseXmitBufLock(ss); |
2366 PR_Sleep(PR_INTERVAL_NO_WAIT); /* PR_Yield(); */ | 2366 PR_Sleep(PR_INTERVAL_NO_WAIT); /* PR_Yield(); */ |
2367 ssl_GetXmitBufLock(ss); | 2367 ssl_GetXmitBufLock(ss); |
2368 } | 2368 } |
2369 toSend = PR_MIN(len - totalSent, MAX_FRAGMENT_LENGTH); | 2369 toSend = PR_MIN(len - totalSent, MAX_FRAGMENT_LENGTH); |
2370 if (isBlockCipher && | 2370 if (isBlockCipher && |
2371 ss->opt.enableFalseStart && | |
2372 ss->ssl3.cwSpec->version <= SSL_LIBRARY_VERSION_3_1_TLS) { | 2371 ss->ssl3.cwSpec->version <= SSL_LIBRARY_VERSION_3_1_TLS) { |
2373 /* | 2372 /* |
2374 * We assume that block ciphers are used in CBC mode and send | 2373 * We assume that block ciphers are used in CBC mode and send |
2375 * only one byte in the first record. This effectively | 2374 * only one byte in the first record. This effectively |
2376 * randomizes the IV in a backward compatible way. | 2375 * randomizes the IV in a backward compatible way. |
2377 * | 2376 * |
2378 * We get back to the MAX_FRAGMENT_LENGTH record boundary in | 2377 * We get back to the MAX_FRAGMENT_LENGTH record boundary in |
2379 * the second record. So for a large amount of data, we send | 2378 * the second record. So for a large amount of data, we send |
2380 * 1 | 2379 * 1 |
2381 * MAX_FRAGMENT_LENGTH - 1 | 2380 * MAX_FRAGMENT_LENGTH - 1 |
(...skipping 7600 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
9982 | 9981 |
9983 ss->ssl3.initialized = PR_FALSE; | 9982 ss->ssl3.initialized = PR_FALSE; |
9984 | 9983 |
9985 if (ss->ssl3.nextProto.data) { | 9984 if (ss->ssl3.nextProto.data) { |
9986 PORT_Free(ss->ssl3.nextProto.data); | 9985 PORT_Free(ss->ssl3.nextProto.data); |
9987 ss->ssl3.nextProto.data = NULL; | 9986 ss->ssl3.nextProto.data = NULL; |
9988 } | 9987 } |
9989 } | 9988 } |
9990 | 9989 |
9991 /* End of ssl3con.c */ | 9990 /* End of ssl3con.c */ |
OLD | NEW |