Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(215)

Side by Side Diff: net/third_party/nss/patches/nssrwlock.patch

Issue 1053903002: Update libssl to NSS 3.18 RTM (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix typo Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 diff -pu a/nss/lib/ssl/ssl3con.c b/nss/lib/ssl/ssl3con.c 1 diff --git a/ssl/ssl3con.c b/ssl/ssl3con.c
2 --- a/nss/lib/ssl/ssl3con.c» 2014-01-17 19:01:58.104487211 -0800 2 index 17c368e..424c1fb 100644
3 +++ b/nss/lib/ssl/ssl3con.c» 2014-01-17 19:02:38.965159506 -0800 3 --- a/ssl/ssl3con.c
4 @@ -5211,7 +5211,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 4 +++ b/ssl/ssl3con.c
5 @@ -5246,7 +5246,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
5 * the lock across the calls to ssl3_CallHelloExtensionSenders. 6 * the lock across the calls to ssl3_CallHelloExtensionSenders.
6 */ 7 */
7 if (sid->u.ssl3.lock) { 8 if (sid->u.ssl3.lock) {
8 - PR_RWLock_Rlock(sid->u.ssl3.lock); 9 - PR_RWLock_Rlock(sid->u.ssl3.lock);
9 + NSSRWLock_LockRead(sid->u.ssl3.lock); 10 + NSSRWLock_LockRead(sid->u.ssl3.lock);
10 } 11 }
11 12
12 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { 13 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) {
13 @@ -5220,7 +5220,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 14 @@ -5255,7 +5255,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
14 15
15 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); 16 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL);
16 if (extLen < 0) { 17 if (extLen < 0) {
17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 18 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 19 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
19 return SECFailure; 20 return SECFailure;
20 } 21 }
21 » maxBytes -= extLen; 22 » total_exten_len += extLen;
22 @@ -5248,7 +5248,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 23 @@ -5282,7 +5282,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
23 /* how many suites are permitted by policy and user preference? */ 24 /* how many suites are permitted by policy and user preference? */
24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); 25 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE);
25 if (!num_suites) { 26 if (!num_suites) {
26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 27 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
27 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 28 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
28 return SECFailure; /* count_cipher_suites has set error code. */ 29 return SECFailure; /* count_cipher_suites has set error code. */
29 } 30 }
30 31
31 @@ -5293,7 +5293,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 32 @@ -5327,7 +5327,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
32 33
33 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); 34 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length);
34 if (rv != SECSuccess) { 35 if (rv != SECSuccess) {
35 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 36 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
36 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 37 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
37 return rv; /* err set by ssl3_AppendHandshake* */ 38 return rv; /* err set by ssl3_AppendHandshake* */
38 } 39 }
39 40
40 @@ -5312,21 +5312,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 41 @@ -5346,21 +5346,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
41 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); 42 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2);
42 } 43 }
43 if (rv != SECSuccess) { 44 if (rv != SECSuccess) {
44 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 45 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
45 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 46 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
46 return rv; /* err set by ssl3_AppendHandshake* */ 47 return rv; /* err set by ssl3_AppendHandshake* */
47 } 48 }
48 49
49 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ 50 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */
50 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); 51 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random);
51 if (rv != SECSuccess) { 52 if (rv != SECSuccess) {
52 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 53 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
53 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 54 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
54 return rv; /* err set by GetNewRandom. */ 55 return rv; /* err set by GetNewRandom. */
55 } 56 }
56 } 57 }
57 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, 58 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random,
58 SSL3_RANDOM_LENGTH); 59 SSL3_RANDOM_LENGTH);
59 if (rv != SECSuccess) { 60 if (rv != SECSuccess) {
60 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 61 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
61 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 62 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
62 return rv; /* err set by ssl3_AppendHandshake* */ 63 return rv; /* err set by ssl3_AppendHandshake* */
63 } 64 }
64 65
65 @@ -5336,7 +5336,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 66 @@ -5370,7 +5370,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
66 else 67 else
67 » rv = ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); 68 » rv = ssl3_AppendHandshakeNumber(ss, 0, 1);
68 if (rv != SECSuccess) { 69 if (rv != SECSuccess) {
69 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 70 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
70 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 71 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
71 return rv; /* err set by ssl3_AppendHandshake* */ 72 return rv; /* err set by ssl3_AppendHandshake* */
72 } 73 }
73 74
74 @@ -5344,14 +5344,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 75 @@ -5378,14 +5378,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
75 rv = ssl3_AppendHandshakeVariable( 76 rv = ssl3_AppendHandshakeVariable(
76 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); 77 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1);
77 if (rv != SECSuccess) { 78 if (rv != SECSuccess) {
78 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 79 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
79 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 80 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
80 return rv; /* err set by ssl3_AppendHandshake* */ 81 return rv; /* err set by ssl3_AppendHandshake* */
81 } 82 }
82 } 83 }
83 84
84 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); 85 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2);
85 if (rv != SECSuccess) { 86 if (rv != SECSuccess) {
86 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 87 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
87 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 88 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
88 return rv; /* err set by ssl3_AppendHandshake* */ 89 return rv; /* err set by ssl3_AppendHandshake* */
89 } 90 }
90 91
91 @@ -5360,7 +5360,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 92 @@ -5394,7 +5394,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
92 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, 93 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
93 sizeof(ssl3CipherSuite)); 94 sizeof(ssl3CipherSuite));
94 if (rv != SECSuccess) { 95 if (rv != SECSuccess) {
95 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 96 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
96 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 97 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
97 return rv; /* err set by ssl3_AppendHandshake* */ 98 return rv; /* err set by ssl3_AppendHandshake* */
98 } 99 }
99 actual_count++; 100 actual_count++;
100 @@ -5369,7 +5369,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 101 @@ -5403,7 +5403,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
101 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, 102 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV,
102 sizeof(ssl3CipherSuite)); 103 sizeof(ssl3CipherSuite));
103 if (rv != SECSuccess) { 104 if (rv != SECSuccess) {
104 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 105 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
105 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 106 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
106 return rv; /* err set by ssl3_AppendHandshake* */ 107 return rv; /* err set by ssl3_AppendHandshake* */
107 } 108 }
108 actual_count++; 109 actual_count++;
109 @@ -5379,7 +5379,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 110 @@ -5413,7 +5413,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
110 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) { 111 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
111 actual_count++; 112 actual_count++;
112 if (actual_count > num_suites) { 113 if (actual_count > num_suites) {
113 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 114 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
114 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 115 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
115 /* set error card removal/insertion error */ 116 /* set error card removal/insertion error */
116 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); 117 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL);
117 return SECFailure; 118 return SECFailure;
118 @@ -5387,7 +5387,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 119 @@ -5421,7 +5421,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
119 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, 120 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite,
120 sizeof(ssl3CipherSuite)); 121 sizeof(ssl3CipherSuite));
121 if (rv != SECSuccess) { 122 if (rv != SECSuccess) {
122 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 123 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
123 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 124 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
124 return rv; /* err set by ssl3_AppendHandshake* */ 125 return rv; /* err set by ssl3_AppendHandshake* */
125 } 126 }
126 } 127 }
127 @@ -5398,14 +5398,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 128 @@ -5432,14 +5432,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
128 * the server.. */ 129 * the server.. */
129 if (actual_count != num_suites) { 130 if (actual_count != num_suites) {
130 /* Card removal/insertion error */ 131 /* Card removal/insertion error */
131 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 132 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
132 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 133 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
133 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); 134 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL);
134 return SECFailure; 135 return SECFailure;
135 } 136 }
136 137
137 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); 138 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1);
138 if (rv != SECSuccess) { 139 if (rv != SECSuccess) {
139 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 140 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
140 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 141 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
141 return rv; /* err set by ssl3_AppendHandshake* */ 142 return rv; /* err set by ssl3_AppendHandshake* */
142 } 143 }
143 for (i = 0; i < compressionMethodsCount; i++) { 144 for (i = 0; i < compressionMethodsCount; i++) {
144 @@ -5413,7 +5413,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 145 @@ -5447,7 +5447,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
145 continue; 146 continue;
146 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); 147 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1);
147 if (rv != SECSuccess) { 148 if (rv != SECSuccess) {
148 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 149 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
149 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 150 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
150 return rv; /* err set by ssl3_AppendHandshake* */ 151 return rv; /* err set by ssl3_AppendHandshake* */
151 } 152 }
152 } 153 }
153 @@ -5424,20 +5424,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 154 @@ -5458,20 +5458,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
154 155
155 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); 156 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2);
156 if (rv != SECSuccess) { 157 if (rv != SECSuccess) {
157 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 158 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
158 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 159 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
159 return rv; /* err set by AppendHandshake. */ 160 return rv; /* err set by AppendHandshake. */
160 } 161 }
161 162
162 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); 163 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL);
163 if (extLen < 0) { 164 if (extLen < 0) {
164 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 165 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
165 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 166 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
166 return SECFailure; 167 return SECFailure;
167 } 168 }
168 maxBytes -= extLen; 169 maxBytes -= extLen;
169 170
170 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); 171 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes);
171 if (extLen < 0) { 172 if (extLen < 0) {
172 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } 173 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
173 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } 174 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
174 return SECFailure; 175 return SECFailure;
175 } 176 }
176 maxBytes -= extLen; 177 maxBytes -= extLen;
177 @@ -5446,7 +5446,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo 178 @@ -5480,7 +5480,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
178 } 179 }
179 180
180 if (sid->u.ssl3.lock) { 181 if (sid->u.ssl3.lock) {
181 - PR_RWLock_Unlock(sid->u.ssl3.lock); 182 - PR_RWLock_Unlock(sid->u.ssl3.lock);
182 + NSSRWLock_UnlockRead(sid->u.ssl3.lock); 183 + NSSRWLock_UnlockRead(sid->u.ssl3.lock);
183 } 184 }
184 185
185 if (ss->xtnData.sentSessionTicketInClientHello) { 186 if (ss->xtnData.sentSessionTicketInClientHello) {
186 diff -pu a/nss/lib/ssl/sslimpl.h b/nss/lib/ssl/sslimpl.h 187 diff --git a/ssl/sslimpl.h b/ssl/sslimpl.h
187 --- a/nss/lib/ssl/sslimpl.h» 2014-01-17 19:00:52.843413560 -0800 188 index f796a14..a809616 100644
188 +++ b/nss/lib/ssl/sslimpl.h» 2014-01-17 19:02:38.965159506 -0800 189 --- a/ssl/sslimpl.h
189 @@ -730,7 +730,7 @@ struct sslSessionIDStr { 190 +++ b/ssl/sslimpl.h
191 @@ -731,7 +731,7 @@ struct sslSessionIDStr {
190 * cached. Before then, there is no need to lock anything because 192 * cached. Before then, there is no need to lock anything because
191 * the sid isn't being shared by anything. 193 * the sid isn't being shared by anything.
192 */ 194 */
193 - PRRWLock *lock; 195 - PRRWLock *lock;
194 + NSSRWLock *lock; 196 + NSSRWLock *lock;
195 197
196 /* The lock must be held while reading or writing these members 198 /* The lock must be held while reading or writing these members
197 * because they change while the sid is cached. 199 * because they change while the sid is cached.
198 diff -pu a/nss/lib/ssl/sslnonce.c b/nss/lib/ssl/sslnonce.c 200 diff --git a/ssl/sslnonce.c b/ssl/sslnonce.c
199 --- a/nss/lib/ssl/sslnonce.c» 2014-01-17 19:02:25.844943628 -0800 201 index cefdda6..28ad364 100644
200 +++ b/nss/lib/ssl/sslnonce.c» 2014-01-17 19:02:38.965159506 -0800 202 --- a/ssl/sslnonce.c
203 +++ b/ssl/sslnonce.c
201 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid) 204 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid)
202 } 205 }
203 206
204 if (sid->u.ssl3.lock) { 207 if (sid->u.ssl3.lock) {
205 - PR_DestroyRWLock(sid->u.ssl3.lock); 208 - PR_DestroyRWLock(sid->u.ssl3.lock);
206 + NSSRWLock_Destroy(sid->u.ssl3.lock); 209 + NSSRWLock_Destroy(sid->u.ssl3.lock);
207 } 210 }
208 } 211 }
209 212
210 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid) 213 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid)
211 PRINT_BUF(8, (0, "sessionID:", 214 PRINT_BUF(8, (0, "sessionID:",
212 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); 215 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength));
213 216
214 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL); 217 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL);
215 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL); 218 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL);
216 if (!sid->u.ssl3.lock) { 219 if (!sid->u.ssl3.lock) {
217 return; 220 return;
218 } 221 }
219 @@ -448,7 +448,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *s 222 @@ -450,7 +450,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid,
220 * yet, so no locking is needed. 223 * yet, so no locking is needed.
221 */ 224 */
222 if (sid->u.ssl3.lock) { 225 if (sid->u.ssl3.lock) {
223 - PR_RWLock_Wlock(sid->u.ssl3.lock); 226 - PR_RWLock_Wlock(sid->u.ssl3.lock);
224 + NSSRWLock_LockWrite(sid->u.ssl3.lock); 227 + NSSRWLock_LockWrite(sid->u.ssl3.lock);
225 228 » if (sid->u.ssl3.locked.sessionTicket.ticket.data) {
226 » /* A server might have sent us an empty ticket, which has the 229 » SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket,
227 » * effect of clearing the previously known ticket. 230 » » » PR_FALSE);
228 @@ -467,6 +467,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *s 231 @@ -465,6 +465,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid,
229 newSessionTicket->ticket.len = 0; 232 newSessionTicket->ticket.len = 0;
230 233
231 if (sid->u.ssl3.lock) { 234 if (sid->u.ssl3.lock) {
232 - PR_RWLock_Unlock(sid->u.ssl3.lock); 235 - PR_RWLock_Unlock(sid->u.ssl3.lock);
233 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock); 236 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock);
234 } 237 }
235 } 238 }
OLDNEW
« no previous file with comments | « net/third_party/nss/patches/getrequestedclientcerttypes.patch ('k') | net/third_party/nss/patches/paddingextvalue.patch » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698