Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(261)

Side by Side Diff: net/third_party/nss/ssl/ssl3ext.c

Issue 12327032: When performing an SSL renegotiation and requesting a certificate status, clear any existing certif… (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * SSL3 Protocol 2 * SSL3 Protocol
3 * 3 *
4 * This Source Code Form is subject to the terms of the Mozilla Public 4 * This Source Code Form is subject to the terms of the Mozilla Public
5 * License, v. 2.0. If a copy of the MPL was not distributed with this 5 * License, v. 2.0. If a copy of the MPL was not distributed with this
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 7
8 /* TLS extension code moved here from ssl3ecc.c */ 8 /* TLS extension code moved here from ssl3ecc.c */
9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */ 9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */
10 10
(...skipping 715 matching lines...) Expand 10 before | Expand all | Expand 10 after
726 * client side. See RFC 4366 section 3.6. */ 726 * client side. See RFC 4366 section 3.6. */
727 PRInt32 727 PRInt32
728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, 728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append,
729 PRUint32 maxBytes) 729 PRUint32 maxBytes)
730 { 730 {
731 PRInt32 extension_length; 731 PRInt32 extension_length;
732 732
733 if (!ss->opt.enableOCSPStapling) 733 if (!ss->opt.enableOCSPStapling)
734 return 0; 734 return 0;
735 735
736 ss->ssl3.hs.may_get_cert_status = PR_FALSE;
agl 2013/02/21 14:57:02 Is ssl3_HandleHelloRequest a better place for this
737 if (ss->ssl3.hs.cert_status.data) {
738 SECITEM_FreeItem(&ss->ssl3.hs.cert_status, PR_FALSE);
739 }
740
736 /* extension_type (2-bytes) + 741 /* extension_type (2-bytes) +
737 * length(extension_data) (2-bytes) + 742 * length(extension_data) (2-bytes) +
738 * status_type (1) + 743 * status_type (1) +
739 * responder_id_list length (2) + 744 * responder_id_list length (2) +
740 * request_extensions length (2) 745 * request_extensions length (2)
741 */ 746 */
742 extension_length = 9; 747 extension_length = 9;
743 748
744 if (append && maxBytes >= extension_length) { 749 if (append && maxBytes >= extension_length) {
745 SECStatus rv; 750 SECStatus rv;
(...skipping 1239 matching lines...) Expand 10 before | Expand all | Expand 10 after
1985 return SECSuccess; 1990 return SECSuccess;
1986 } 1991 }
1987 1992
1988 /* OK, we have a valid cipher and we've selected it */ 1993 /* OK, we have a valid cipher and we've selected it */
1989 ss->ssl3.dtlsSRTPCipherSuite = cipher; 1994 ss->ssl3.dtlsSRTPCipherSuite = cipher;
1990 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; 1995 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn;
1991 1996
1992 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, 1997 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn,
1993 ssl3_SendUseSRTPXtn); 1998 ssl3_SendUseSRTPXtn);
1994 } 1999 }
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698