Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * SSL3 Protocol | 2 * SSL3 Protocol |
| 3 * | 3 * |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 7 | 7 |
| 8 /* TLS extension code moved here from ssl3ecc.c */ | 8 /* TLS extension code moved here from ssl3ecc.c */ |
| 9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */ | 9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */ |
| 10 | 10 |
| (...skipping 715 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 726 * client side. See RFC 4366 section 3.6. */ | 726 * client side. See RFC 4366 section 3.6. */ |
| 727 PRInt32 | 727 PRInt32 |
| 728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, | 728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, |
| 729 PRUint32 maxBytes) | 729 PRUint32 maxBytes) |
| 730 { | 730 { |
| 731 PRInt32 extension_length; | 731 PRInt32 extension_length; |
| 732 | 732 |
| 733 if (!ss->opt.enableOCSPStapling) | 733 if (!ss->opt.enableOCSPStapling) |
| 734 return 0; | 734 return 0; |
| 735 | 735 |
| 736 ss->ssl3.hs.may_get_cert_status = PR_FALSE; | |
|
agl
2013/02/21 14:57:02
Is ssl3_HandleHelloRequest a better place for this
| |
| 737 if (ss->ssl3.hs.cert_status.data) { | |
| 738 SECITEM_FreeItem(&ss->ssl3.hs.cert_status, PR_FALSE); | |
| 739 } | |
| 740 | |
| 736 /* extension_type (2-bytes) + | 741 /* extension_type (2-bytes) + |
| 737 * length(extension_data) (2-bytes) + | 742 * length(extension_data) (2-bytes) + |
| 738 * status_type (1) + | 743 * status_type (1) + |
| 739 * responder_id_list length (2) + | 744 * responder_id_list length (2) + |
| 740 * request_extensions length (2) | 745 * request_extensions length (2) |
| 741 */ | 746 */ |
| 742 extension_length = 9; | 747 extension_length = 9; |
| 743 | 748 |
| 744 if (append && maxBytes >= extension_length) { | 749 if (append && maxBytes >= extension_length) { |
| 745 SECStatus rv; | 750 SECStatus rv; |
| (...skipping 1239 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1985 return SECSuccess; | 1990 return SECSuccess; |
| 1986 } | 1991 } |
| 1987 | 1992 |
| 1988 /* OK, we have a valid cipher and we've selected it */ | 1993 /* OK, we have a valid cipher and we've selected it */ |
| 1989 ss->ssl3.dtlsSRTPCipherSuite = cipher; | 1994 ss->ssl3.dtlsSRTPCipherSuite = cipher; |
| 1990 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; | 1995 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; |
| 1991 | 1996 |
| 1992 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, | 1997 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, |
| 1993 ssl3_SendUseSRTPXtn); | 1998 ssl3_SendUseSRTPXtn); |
| 1994 } | 1999 } |
| OLD | NEW |