| OLD | NEW |
| 1 diff -up a/src/net/third_party/nss/ssl/ssl.h b/src/net/third_party/nss/ssl/ssl.h | 1 diff -pu -r a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3co
n.c |
| 2 --- a/src/net/third_party/nss/ssl/ssl.h»2012-02-29 17:49:08.431530583 -0800 | 2 --- a/net/third_party/nss/ssl/ssl3con.c»2012-11-09 15:48:41.260860199 -0800 |
| 3 +++ b/src/net/third_party/nss/ssl/ssl.h»2012-02-29 19:07:19.298439815 -0800 | 3 +++ b/net/third_party/nss/ssl/ssl3con.c»2012-11-09 15:49:25.751511020 -0800 |
| 4 @@ -306,6 +306,11 @@ SSL_IMPORT SECStatus SSL_ForceHandshake( | 4 @@ -6148,6 +6148,85 @@ done: |
| 5 SSL_IMPORT SECStatus SSL_ForceHandshakeWithTimeout(PRFileDesc *fd, | |
| 6 PRIntervalTime timeout); | |
| 7 | |
| 8 +SSL_IMPORT SECStatus SSL_RestartHandshakeAfterCertReq(PRFileDesc *fd, | |
| 9 +» » » » » CERTCertificate *cert, | |
| 10 +» » » » » SECKEYPrivateKey *key, | |
| 11 +» » » » » CERTCertificateList *certChain); | |
| 12 + | |
| 13 /* | |
| 14 ** Query security status of socket. *on is set to one if security is | |
| 15 ** enabled. *keySize will contain the stream key size used. *issuer will | |
| 16 diff -up a/src/net/third_party/nss/ssl/ssl3con.c b/src/net/third_party/nss/ssl/s
sl3con.c | |
| 17 --- a/src/net/third_party/nss/ssl/ssl3con.c» 2012-02-29 17:49:08.431530583 -0
800 | |
| 18 +++ b/src/net/third_party/nss/ssl/ssl3con.c» 2012-02-29 18:55:27.038466043 -0
800 | |
| 19 @@ -5769,6 +5769,85 @@ done: | |
| 20 return rv; | 5 return rv; |
| 21 } | 6 } |
| 22 | 7 |
| 23 +/* | 8 +/* |
| 24 + * attempt to restart the handshake after asynchronously handling | 9 + * attempt to restart the handshake after asynchronously handling |
| 25 + * a request for the client's certificate. | 10 + * a request for the client's certificate. |
| 26 + * | 11 + * |
| 27 + * inputs: | 12 + * inputs: |
| 28 + * cert Client cert chosen by application. | 13 + * cert Client cert chosen by application. |
| 29 + * Note: ssl takes this reference, and does not bump the | 14 + * Note: ssl takes this reference, and does not bump the |
| (...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 95 + } | 80 + } |
| 96 + PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | 81 + PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
| 97 + rv = SECFailure; | 82 + rv = SECFailure; |
| 98 + } | 83 + } |
| 99 + return rv; | 84 + return rv; |
| 100 +} | 85 +} |
| 101 + | 86 + |
| 102 PRBool | 87 PRBool |
| 103 ssl3_CanFalseStart(sslSocket *ss) { | 88 ssl3_CanFalseStart(sslSocket *ss) { |
| 104 PRBool rv; | 89 PRBool rv; |
| 105 diff -up a/src/net/third_party/nss/ssl/sslimpl.h b/src/net/third_party/nss/ssl/s
slimpl.h | 90 diff -pu -r a/net/third_party/nss/ssl/ssl.h b/net/third_party/nss/ssl/ssl.h |
| 106 --- a/src/net/third_party/nss/ssl/sslimpl.h» 2012-02-29 17:49:08.431530583 -0
800 | 91 --- a/net/third_party/nss/ssl/ssl.h» 2012-11-09 15:48:41.260860199 -0800 |
| 107 +++ b/src/net/third_party/nss/ssl/sslimpl.h» 2012-02-29 19:05:27.766882356 -0
800 | 92 +++ b/net/third_party/nss/ssl/ssl.h» 2012-11-09 15:49:25.751511020 -0800 |
| 108 @@ -1392,15 +1392,16 @@ extern SECStatus ssl3_MasterKeyDeriveBy | 93 @@ -367,6 +367,11 @@ SSL_IMPORT SECStatus SSL_ForceHandshake( |
| 94 SSL_IMPORT SECStatus SSL_ForceHandshakeWithTimeout(PRFileDesc *fd, |
| 95 PRIntervalTime timeout); |
| 96 |
| 97 +SSL_IMPORT SECStatus SSL_RestartHandshakeAfterCertReq(PRFileDesc *fd, |
| 98 +» » » » » CERTCertificate *cert, |
| 99 +» » » » » SECKEYPrivateKey *key, |
| 100 +» » » » » CERTCertificateList *certChain); |
| 101 + |
| 102 /* |
| 103 ** Query security status of socket. *on is set to one if security is |
| 104 ** enabled. *keySize will contain the stream key size used. *issuer will |
| 105 diff -pu -r a/net/third_party/nss/ssl/sslimpl.h b/net/third_party/nss/ssl/sslimp
l.h |
| 106 --- a/net/third_party/nss/ssl/sslimpl.h»2012-11-09 15:48:41.260860199 -0800 |
| 107 +++ b/net/third_party/nss/ssl/sslimpl.h»2012-11-09 15:51:26.623278555 -0800 |
| 108 @@ -1484,16 +1484,17 @@ extern SECStatus ssl3_MasterKeyDeriveBy |
| 109 /* These functions are called from secnav, even though they're "private". */ | 109 /* These functions are called from secnav, even though they're "private". */ |
| 110 | 110 |
| 111 extern int ssl2_SendErrorMessage(struct sslSocketStr *ss, int error); | 111 extern int ssl2_SendErrorMessage(struct sslSocketStr *ss, int error); |
| 112 -extern int SSL_RestartHandshakeAfterCertReq(struct sslSocketStr *ss, | 112 -extern int SSL_RestartHandshakeAfterCertReq(struct sslSocketStr *ss, |
| 113 - CERTCertificate *cert, | 113 - CERTCertificate *cert, |
| 114 - SECKEYPrivateKey *key, | 114 - SECKEYPrivateKey *key, |
| 115 - CERTCertificateList *certChain); | 115 - CERTCertificateList *certChain); |
| 116 extern sslSocket *ssl_FindSocket(PRFileDesc *fd); | 116 extern sslSocket *ssl_FindSocket(PRFileDesc *fd); |
| 117 extern void ssl_FreeSocket(struct sslSocketStr *ssl); | 117 extern void ssl_FreeSocket(struct sslSocketStr *ssl); |
| 118 extern SECStatus SSL3_SendAlert(sslSocket *ss, SSL3AlertLevel level, | 118 extern SECStatus SSL3_SendAlert(sslSocket *ss, SSL3AlertLevel level, |
| 119 SSL3AlertDescription desc); | 119 SSL3AlertDescription desc); |
| 120 extern SECStatus ssl3_DecodeError(sslSocket *ss); |
| 120 | 121 |
| 121 +extern SECStatus ssl3_RestartHandshakeAfterCertReq(sslSocket * ss, | 122 +extern SECStatus ssl3_RestartHandshakeAfterCertReq(sslSocket * ss, |
| 122 + CERTCertificate * cert, | 123 + CERTCertificate * cert, |
| 123 + SECKEYPrivateKey * key, | 124 + SECKEYPrivateKey * key, |
| 124 + CERTCertificateList *certChain); | 125 + CERTCertificateList *certChain); |
| 125 + | 126 + |
| 126 extern SECStatus ssl3_AuthCertificateComplete(sslSocket *ss, PRErrorCode error)
; | 127 extern SECStatus ssl3_AuthCertificateComplete(sslSocket *ss, PRErrorCode error)
; |
| 127 | 128 |
| 128 /* | 129 /* |
| 129 diff -up a/src/net/third_party/nss/ssl/sslsecur.c b/src/net/third_party/nss/ssl/
sslsecur.c | 130 diff -pu -r a/net/third_party/nss/ssl/sslsecur.c b/net/third_party/nss/ssl/sslse
cur.c |
| 130 --- a/src/net/third_party/nss/ssl/sslsecur.c» 2012-02-28 16:15:34.790321976 -0
800 | 131 --- a/net/third_party/nss/ssl/sslsecur.c» 2012-11-09 15:17:00.432983977 -0
800 |
| 131 +++ b/src/net/third_party/nss/ssl/sslsecur.c» 2012-02-29 19:01:32.303586125 -0
800 | 132 +++ b/net/third_party/nss/ssl/sslsecur.c» 2012-11-09 15:49:25.751511020 -0
800 |
| 132 @@ -1468,17 +1468,70 @@ SSL_CertDBHandleSet(PRFileDesc *fd, CERT | 133 @@ -1437,17 +1437,70 @@ SSL_CertDBHandleSet(PRFileDesc *fd, CERT |
| 133 return SECSuccess; | 134 return SECSuccess; |
| 134 } | 135 } |
| 135 | 136 |
| 136 -/* DO NOT USE. This function was exported in ssl.def with the wrong signature; | 137 -/* DO NOT USE. This function was exported in ssl.def with the wrong signature; |
| 137 - * this implementation exists to maintain link-time compatibility. | 138 - * this implementation exists to maintain link-time compatibility. |
| 138 +/* | 139 +/* |
| 139 + * attempt to restart the handshake after asynchronously handling | 140 + * attempt to restart the handshake after asynchronously handling |
| 140 + * a request for the client's certificate. | 141 + * a request for the client's certificate. |
| 141 + * | 142 + * |
| 142 + * inputs: | 143 + * inputs: |
| (...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 199 + } | 200 + } |
| 200 + PORT_SetError(SSL_ERROR_FEATURE_NOT_SUPPORTED_FOR_SSL2); | 201 + PORT_SetError(SSL_ERROR_FEATURE_NOT_SUPPORTED_FOR_SSL2); |
| 201 + ret = SECFailure; | 202 + ret = SECFailure; |
| 202 + } | 203 + } |
| 203 + | 204 + |
| 204 + ssl_Release1stHandshakeLock(ss); /************************************/ | 205 + ssl_Release1stHandshakeLock(ss); /************************************/ |
| 205 + return ret; | 206 + return ret; |
| 206 } | 207 } |
| 207 | 208 |
| 208 /* DO NOT USE. This function was exported in ssl.def with the wrong signature; | 209 /* DO NOT USE. This function was exported in ssl.def with the wrong signature; |
| OLD | NEW |