OLD | NEW |
1 diff -pu a/nss/lib/ssl/ssl3con.c b/nss/lib/ssl/ssl3con.c | 1 diff --git a/ssl/ssl3con.c b/ssl/ssl3con.c |
2 --- a/nss/lib/ssl/ssl3con.c» 2014-01-17 19:01:58.104487211 -0800 | 2 index 17c368e..424c1fb 100644 |
3 +++ b/nss/lib/ssl/ssl3con.c» 2014-01-17 19:02:38.965159506 -0800 | 3 --- a/ssl/ssl3con.c |
4 @@ -5211,7 +5211,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 4 +++ b/ssl/ssl3con.c |
| 5 @@ -5246,7 +5246,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
5 * the lock across the calls to ssl3_CallHelloExtensionSenders. | 6 * the lock across the calls to ssl3_CallHelloExtensionSenders. |
6 */ | 7 */ |
7 if (sid->u.ssl3.lock) { | 8 if (sid->u.ssl3.lock) { |
8 - PR_RWLock_Rlock(sid->u.ssl3.lock); | 9 - PR_RWLock_Rlock(sid->u.ssl3.lock); |
9 + NSSRWLock_LockRead(sid->u.ssl3.lock); | 10 + NSSRWLock_LockRead(sid->u.ssl3.lock); |
10 } | 11 } |
11 | 12 |
12 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { | 13 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { |
13 @@ -5220,7 +5220,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 14 @@ -5255,7 +5255,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
14 | 15 |
15 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); | 16 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); |
16 if (extLen < 0) { | 17 if (extLen < 0) { |
17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 18 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 19 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
19 return SECFailure; | 20 return SECFailure; |
20 } | 21 } |
21 » maxBytes -= extLen; | 22 » total_exten_len += extLen; |
22 @@ -5248,7 +5248,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 23 @@ -5282,7 +5282,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
23 /* how many suites are permitted by policy and user preference? */ | 24 /* how many suites are permitted by policy and user preference? */ |
24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); | 25 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); |
25 if (!num_suites) { | 26 if (!num_suites) { |
26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 27 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
27 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 28 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
28 return SECFailure; /* count_cipher_suites has set error code. */ | 29 return SECFailure; /* count_cipher_suites has set error code. */ |
29 } | 30 } |
30 | 31 |
31 @@ -5293,7 +5293,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 32 @@ -5327,7 +5327,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
32 | 33 |
33 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); | 34 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); |
34 if (rv != SECSuccess) { | 35 if (rv != SECSuccess) { |
35 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 36 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
36 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 37 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
37 return rv; /* err set by ssl3_AppendHandshake* */ | 38 return rv; /* err set by ssl3_AppendHandshake* */ |
38 } | 39 } |
39 | 40 |
40 @@ -5312,21 +5312,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 41 @@ -5346,21 +5346,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
41 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); | 42 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); |
42 } | 43 } |
43 if (rv != SECSuccess) { | 44 if (rv != SECSuccess) { |
44 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 45 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
45 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 46 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
46 return rv; /* err set by ssl3_AppendHandshake* */ | 47 return rv; /* err set by ssl3_AppendHandshake* */ |
47 } | 48 } |
48 | 49 |
49 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ | 50 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ |
50 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); | 51 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); |
51 if (rv != SECSuccess) { | 52 if (rv != SECSuccess) { |
52 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 53 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
53 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 54 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
54 return rv; /* err set by GetNewRandom. */ | 55 return rv; /* err set by GetNewRandom. */ |
55 } | 56 } |
56 } | 57 } |
57 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, | 58 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, |
58 SSL3_RANDOM_LENGTH); | 59 SSL3_RANDOM_LENGTH); |
59 if (rv != SECSuccess) { | 60 if (rv != SECSuccess) { |
60 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 61 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
61 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 62 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
62 return rv; /* err set by ssl3_AppendHandshake* */ | 63 return rv; /* err set by ssl3_AppendHandshake* */ |
63 } | 64 } |
64 | 65 |
65 @@ -5336,7 +5336,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 66 @@ -5370,7 +5370,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
66 else | 67 else |
67 » rv = ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); | 68 » rv = ssl3_AppendHandshakeNumber(ss, 0, 1); |
68 if (rv != SECSuccess) { | 69 if (rv != SECSuccess) { |
69 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 70 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
70 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 71 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
71 return rv; /* err set by ssl3_AppendHandshake* */ | 72 return rv; /* err set by ssl3_AppendHandshake* */ |
72 } | 73 } |
73 | 74 |
74 @@ -5344,14 +5344,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 75 @@ -5378,14 +5378,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
75 rv = ssl3_AppendHandshakeVariable( | 76 rv = ssl3_AppendHandshakeVariable( |
76 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); | 77 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); |
77 if (rv != SECSuccess) { | 78 if (rv != SECSuccess) { |
78 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 79 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
79 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 80 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
80 return rv; /* err set by ssl3_AppendHandshake* */ | 81 return rv; /* err set by ssl3_AppendHandshake* */ |
81 } | 82 } |
82 } | 83 } |
83 | 84 |
84 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); | 85 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); |
85 if (rv != SECSuccess) { | 86 if (rv != SECSuccess) { |
86 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 87 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
87 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 88 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
88 return rv; /* err set by ssl3_AppendHandshake* */ | 89 return rv; /* err set by ssl3_AppendHandshake* */ |
89 } | 90 } |
90 | 91 |
91 @@ -5360,7 +5360,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 92 @@ -5394,7 +5394,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
92 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, | 93 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, |
93 sizeof(ssl3CipherSuite)); | 94 sizeof(ssl3CipherSuite)); |
94 if (rv != SECSuccess) { | 95 if (rv != SECSuccess) { |
95 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 96 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
96 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 97 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
97 return rv; /* err set by ssl3_AppendHandshake* */ | 98 return rv; /* err set by ssl3_AppendHandshake* */ |
98 } | 99 } |
99 actual_count++; | 100 actual_count++; |
100 @@ -5369,7 +5369,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 101 @@ -5403,7 +5403,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
101 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, | 102 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, |
102 sizeof(ssl3CipherSuite)); | 103 sizeof(ssl3CipherSuite)); |
103 if (rv != SECSuccess) { | 104 if (rv != SECSuccess) { |
104 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 105 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
105 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 106 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
106 return rv; /* err set by ssl3_AppendHandshake* */ | 107 return rv; /* err set by ssl3_AppendHandshake* */ |
107 } | 108 } |
108 actual_count++; | 109 actual_count++; |
109 @@ -5379,7 +5379,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 110 @@ -5413,7 +5413,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
110 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) { | 111 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) { |
111 actual_count++; | 112 actual_count++; |
112 if (actual_count > num_suites) { | 113 if (actual_count > num_suites) { |
113 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 114 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
114 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | 115 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} |
115 /* set error card removal/insertion error */ | 116 /* set error card removal/insertion error */ |
116 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | 117 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); |
117 return SECFailure; | 118 return SECFailure; |
118 @@ -5387,7 +5387,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 119 @@ -5421,7 +5421,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
119 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, | 120 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, |
120 sizeof(ssl3CipherSuite)); | 121 sizeof(ssl3CipherSuite)); |
121 if (rv != SECSuccess) { | 122 if (rv != SECSuccess) { |
122 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 123 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
123 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | 124 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} |
124 return rv; /* err set by ssl3_AppendHandshake* */ | 125 return rv; /* err set by ssl3_AppendHandshake* */ |
125 } | 126 } |
126 } | 127 } |
127 @@ -5398,14 +5398,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 128 @@ -5432,14 +5432,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
128 * the server.. */ | 129 * the server.. */ |
129 if (actual_count != num_suites) { | 130 if (actual_count != num_suites) { |
130 /* Card removal/insertion error */ | 131 /* Card removal/insertion error */ |
131 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 132 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
132 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 133 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
133 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | 134 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); |
134 return SECFailure; | 135 return SECFailure; |
135 } | 136 } |
136 | 137 |
137 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); | 138 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); |
138 if (rv != SECSuccess) { | 139 if (rv != SECSuccess) { |
139 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 140 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
140 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 141 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
141 return rv; /* err set by ssl3_AppendHandshake* */ | 142 return rv; /* err set by ssl3_AppendHandshake* */ |
142 } | 143 } |
143 for (i = 0; i < compressionMethodsCount; i++) { | 144 for (i = 0; i < compressionMethodsCount; i++) { |
144 @@ -5413,7 +5413,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 145 @@ -5447,7 +5447,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
145 continue; | 146 continue; |
146 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); | 147 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); |
147 if (rv != SECSuccess) { | 148 if (rv != SECSuccess) { |
148 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 149 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
149 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 150 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
150 return rv; /* err set by ssl3_AppendHandshake* */ | 151 return rv; /* err set by ssl3_AppendHandshake* */ |
151 } | 152 } |
152 } | 153 } |
153 @@ -5424,20 +5424,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 154 @@ -5458,20 +5458,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
154 | 155 |
155 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); | 156 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); |
156 if (rv != SECSuccess) { | 157 if (rv != SECSuccess) { |
157 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 158 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
158 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 159 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
159 return rv; /* err set by AppendHandshake. */ | 160 return rv; /* err set by AppendHandshake. */ |
160 } | 161 } |
161 | 162 |
162 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); | 163 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); |
163 if (extLen < 0) { | 164 if (extLen < 0) { |
164 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 165 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
165 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 166 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
166 return SECFailure; | 167 return SECFailure; |
167 } | 168 } |
168 maxBytes -= extLen; | 169 maxBytes -= extLen; |
169 | 170 |
170 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); | 171 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); |
171 if (extLen < 0) { | 172 if (extLen < 0) { |
172 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | 173 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
173 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | 174 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
174 return SECFailure; | 175 return SECFailure; |
175 } | 176 } |
176 maxBytes -= extLen; | 177 maxBytes -= extLen; |
177 @@ -5446,7 +5446,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | 178 @@ -5480,7 +5480,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) |
178 } | 179 } |
179 | 180 |
180 if (sid->u.ssl3.lock) { | 181 if (sid->u.ssl3.lock) { |
181 - PR_RWLock_Unlock(sid->u.ssl3.lock); | 182 - PR_RWLock_Unlock(sid->u.ssl3.lock); |
182 + NSSRWLock_UnlockRead(sid->u.ssl3.lock); | 183 + NSSRWLock_UnlockRead(sid->u.ssl3.lock); |
183 } | 184 } |
184 | 185 |
185 if (ss->xtnData.sentSessionTicketInClientHello) { | 186 if (ss->xtnData.sentSessionTicketInClientHello) { |
186 diff -pu a/nss/lib/ssl/sslimpl.h b/nss/lib/ssl/sslimpl.h | 187 diff --git a/ssl/sslimpl.h b/ssl/sslimpl.h |
187 --- a/nss/lib/ssl/sslimpl.h» 2014-01-17 19:00:52.843413560 -0800 | 188 index f796a14..a809616 100644 |
188 +++ b/nss/lib/ssl/sslimpl.h» 2014-01-17 19:02:38.965159506 -0800 | 189 --- a/ssl/sslimpl.h |
189 @@ -730,7 +730,7 @@ struct sslSessionIDStr { | 190 +++ b/ssl/sslimpl.h |
| 191 @@ -731,7 +731,7 @@ struct sslSessionIDStr { |
190 * cached. Before then, there is no need to lock anything because | 192 * cached. Before then, there is no need to lock anything because |
191 * the sid isn't being shared by anything. | 193 * the sid isn't being shared by anything. |
192 */ | 194 */ |
193 - PRRWLock *lock; | 195 - PRRWLock *lock; |
194 + NSSRWLock *lock; | 196 + NSSRWLock *lock; |
195 | 197 |
196 /* The lock must be held while reading or writing these members | 198 /* The lock must be held while reading or writing these members |
197 * because they change while the sid is cached. | 199 * because they change while the sid is cached. |
198 diff -pu a/nss/lib/ssl/sslnonce.c b/nss/lib/ssl/sslnonce.c | 200 diff --git a/ssl/sslnonce.c b/ssl/sslnonce.c |
199 --- a/nss/lib/ssl/sslnonce.c» 2014-01-17 19:02:25.844943628 -0800 | 201 index cefdda6..28ad364 100644 |
200 +++ b/nss/lib/ssl/sslnonce.c» 2014-01-17 19:02:38.965159506 -0800 | 202 --- a/ssl/sslnonce.c |
| 203 +++ b/ssl/sslnonce.c |
201 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid) | 204 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid) |
202 } | 205 } |
203 | 206 |
204 if (sid->u.ssl3.lock) { | 207 if (sid->u.ssl3.lock) { |
205 - PR_DestroyRWLock(sid->u.ssl3.lock); | 208 - PR_DestroyRWLock(sid->u.ssl3.lock); |
206 + NSSRWLock_Destroy(sid->u.ssl3.lock); | 209 + NSSRWLock_Destroy(sid->u.ssl3.lock); |
207 } | 210 } |
208 } | 211 } |
209 | 212 |
210 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid) | 213 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid) |
211 PRINT_BUF(8, (0, "sessionID:", | 214 PRINT_BUF(8, (0, "sessionID:", |
212 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); | 215 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); |
213 | 216 |
214 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL); | 217 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL); |
215 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL); | 218 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL); |
216 if (!sid->u.ssl3.lock) { | 219 if (!sid->u.ssl3.lock) { |
217 return; | 220 return; |
218 } | 221 } |
219 @@ -448,7 +448,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *s | 222 @@ -450,7 +450,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid, |
220 * yet, so no locking is needed. | 223 * yet, so no locking is needed. |
221 */ | 224 */ |
222 if (sid->u.ssl3.lock) { | 225 if (sid->u.ssl3.lock) { |
223 - PR_RWLock_Wlock(sid->u.ssl3.lock); | 226 - PR_RWLock_Wlock(sid->u.ssl3.lock); |
224 + NSSRWLock_LockWrite(sid->u.ssl3.lock); | 227 + NSSRWLock_LockWrite(sid->u.ssl3.lock); |
225 | 228 » if (sid->u.ssl3.locked.sessionTicket.ticket.data) { |
226 » /* A server might have sent us an empty ticket, which has the | 229 » SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, |
227 » * effect of clearing the previously known ticket. | 230 » » » PR_FALSE); |
228 @@ -467,6 +467,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *s | 231 @@ -465,6 +465,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid, |
229 newSessionTicket->ticket.len = 0; | 232 newSessionTicket->ticket.len = 0; |
230 | 233 |
231 if (sid->u.ssl3.lock) { | 234 if (sid->u.ssl3.lock) { |
232 - PR_RWLock_Unlock(sid->u.ssl3.lock); | 235 - PR_RWLock_Unlock(sid->u.ssl3.lock); |
233 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock); | 236 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock); |
234 } | 237 } |
235 } | 238 } |
OLD | NEW |