| Index: net/third_party/nss/ssl/derive.c
|
| diff --git a/net/third_party/nss/ssl/derive.c b/net/third_party/nss/ssl/derive.c
|
| index 35cfe25122f9150e15051f500a2c09cb29d494ef..b7c38c30ba32cd7f226c7eee0184f4becf2c59c8 100644
|
| --- a/net/third_party/nss/ssl/derive.c
|
| +++ b/net/third_party/nss/ssl/derive.c
|
| @@ -617,7 +617,7 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| PRBool testrsa_export = PR_FALSE;
|
| PRBool testecdh = PR_FALSE;
|
| PRBool testecdhe = PR_FALSE;
|
| -#ifdef NSS_ENABLE_ECC
|
| +#ifndef NSS_DISABLE_ECC
|
| SECKEYECParams ecParams = { siBuffer, NULL, 0 };
|
| #endif
|
|
|
| @@ -634,7 +634,7 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| rv = SECFailure;
|
|
|
| /* determine which KEAs to test */
|
| - /* 0 (SSL_NULL_WITH_NULL_NULL) is used as a list terminator because
|
| + /* 0 (TLS_NULL_WITH_NULL_NULL) is used as a list terminator because
|
| * SSL3 and TLS specs forbid negotiating that cipher suite number.
|
| */
|
| for (i=0; i < nsuites && (suite = *ciphersuites++) != 0; i++) {
|
| @@ -647,8 +647,8 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| switch (csdef.cipherSuite) {
|
| case TLS_RSA_EXPORT1024_WITH_RC4_56_SHA:
|
| case TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA:
|
| - case SSL_RSA_EXPORT_WITH_RC4_40_MD5:
|
| - case SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5:
|
| + case TLS_RSA_EXPORT_WITH_RC4_40_MD5:
|
| + case TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5:
|
| testrsa_export = PR_TRUE;
|
| }
|
| if (!testrsa_export)
|
| @@ -755,7 +755,7 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| if (enc_pms.data != NULL) {
|
| SECITEM_FreeItem(&enc_pms, PR_FALSE);
|
| }
|
| -#ifdef NSS_ENABLE_ECC
|
| +#ifndef NSS_DISABLE_ECC
|
| for (; (privKeytype == ecKey && ( testecdh || testecdhe)) ||
|
| (privKeytype == rsaKey && testecdhe); ) {
|
| CK_MECHANISM_TYPE target;
|
| @@ -859,7 +859,7 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| PORT_Free(ecParams.data);
|
| ecParams.data = NULL;
|
| }
|
| -#endif /* NSS_ENABLE_ECC */
|
| +#endif /* NSS_DISABLE_ECC */
|
| if (pms)
|
| PK11_FreeSymKey(pms);
|
| }
|
| @@ -877,12 +877,12 @@ SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
|
| if (enc_pms.data != NULL) {
|
| SECITEM_FreeItem(&enc_pms, PR_FALSE);
|
| }
|
| -#ifdef NSS_ENABLE_ECC
|
| +#ifndef NSS_DISABLE_ECC
|
| if (ecParams.data != NULL) {
|
| PORT_Free(ecParams.data);
|
| ecParams.data = NULL;
|
| }
|
| -#endif /* NSS_ENABLE_ECC */
|
| +#endif /* NSS_DISABLE_ECC */
|
|
|
| if (srvPubkey) {
|
| SECKEY_DestroyPublicKey(srvPubkey);
|
|
|