Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(219)

Side by Side Diff: net/third_party/nss/ssl/sslsock.c

Issue 8400075: Fix the "certificate is not yet valid" error for server certificates (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * vtables (and methods that call through them) for the 4 types of 2 * vtables (and methods that call through them) for the 4 types of
3 * SSLSockets supported. Only one type is still supported. 3 * SSLSockets supported. Only one type is still supported.
4 * Various other functions. 4 * Various other functions.
5 * 5 *
6 * ***** BEGIN LICENSE BLOCK ***** 6 * ***** BEGIN LICENSE BLOCK *****
7 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 7 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
8 * 8 *
9 * The contents of this file are subject to the Mozilla Public License Version 9 * The contents of this file are subject to the Mozilla Public License Version
10 * 1.1 (the "License"); you may not use this file except in compliance with 10 * 1.1 (the "License"); you may not use this file except in compliance with
(...skipping 1308 matching lines...) Expand 10 before | Expand all | Expand 10 after
1319 if (!ss) { 1319 if (!ss) {
1320 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego", SSL_GETPID() , 1320 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego", SSL_GETPID() ,
1321 fd)); 1321 fd));
1322 return SECFailure; 1322 return SECFailure;
1323 } 1323 }
1324 1324
1325 ssl_GetSSL3HandshakeLock(ss); 1325 ssl_GetSSL3HandshakeLock(ss);
1326 ss->nextProtoCallback = callback; 1326 ss->nextProtoCallback = callback;
1327 ss->nextProtoArg = arg; 1327 ss->nextProtoArg = arg;
1328 ssl_ReleaseSSL3HandshakeLock(ss); 1328 ssl_ReleaseSSL3HandshakeLock(ss);
1329 return SECSuccess;
Ryan Sleevi 2011/10/28 22:47:01 Leaked from agl's CL?
1329 } 1330 }
1330 1331
1331 /* NextProtoStandardCallback is set as an NPN callback for the case when the 1332 /* NextProtoStandardCallback is set as an NPN callback for the case when the
1332 * user of the sockets wants the standard selection algorithm. */ 1333 * user of the sockets wants the standard selection algorithm. */
1333 static SECStatus 1334 static SECStatus
1334 NextProtoStandardCallback(void *arg, 1335 NextProtoStandardCallback(void *arg,
1335 PRFileDesc *fd, 1336 PRFileDesc *fd,
1336 const unsigned char *protos, 1337 const unsigned char *protos,
1337 unsigned int protos_len, 1338 unsigned int protos_len,
1338 unsigned char *protoOut, 1339 unsigned char *protoOut,
(...skipping 1278 matching lines...) Expand 10 before | Expand all | Expand 10 after
2617 loser: 2618 loser:
2618 ssl_DestroySocketContents(ss); 2619 ssl_DestroySocketContents(ss);
2619 ssl_DestroyLocks(ss); 2620 ssl_DestroyLocks(ss);
2620 PORT_Free(ss); 2621 PORT_Free(ss);
2621 ss = NULL; 2622 ss = NULL;
2622 } 2623 }
2623 } 2624 }
2624 return ss; 2625 return ss;
2625 } 2626 }
2626 2627
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698