OLD | NEW |
---|---|
1 /* | 1 /* |
2 * SSL3 Protocol | 2 * SSL3 Protocol |
3 * | 3 * |
4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
7 | 7 |
8 /* TLS extension code moved here from ssl3ecc.c */ | 8 /* TLS extension code moved here from ssl3ecc.c */ |
9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */ | 9 /* $Id: ssl3ext.c,v 1.28 2012/09/21 00:28:05 wtc%google.com Exp $ */ |
10 | 10 |
(...skipping 715 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
726 * client side. See RFC 4366 section 3.6. */ | 726 * client side. See RFC 4366 section 3.6. */ |
727 PRInt32 | 727 PRInt32 |
728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, | 728 ssl3_ClientSendStatusRequestXtn(sslSocket * ss, PRBool append, |
729 PRUint32 maxBytes) | 729 PRUint32 maxBytes) |
730 { | 730 { |
731 PRInt32 extension_length; | 731 PRInt32 extension_length; |
732 | 732 |
733 if (!ss->opt.enableOCSPStapling) | 733 if (!ss->opt.enableOCSPStapling) |
734 return 0; | 734 return 0; |
735 | 735 |
736 ss->ssl3.hs.may_get_cert_status = PR_FALSE; | |
agl
2013/02/21 14:57:02
Is ssl3_HandleHelloRequest a better place for this
| |
737 if (ss->ssl3.hs.cert_status.data) { | |
738 SECITEM_FreeItem(&ss->ssl3.hs.cert_status, PR_FALSE); | |
739 } | |
740 | |
736 /* extension_type (2-bytes) + | 741 /* extension_type (2-bytes) + |
737 * length(extension_data) (2-bytes) + | 742 * length(extension_data) (2-bytes) + |
738 * status_type (1) + | 743 * status_type (1) + |
739 * responder_id_list length (2) + | 744 * responder_id_list length (2) + |
740 * request_extensions length (2) | 745 * request_extensions length (2) |
741 */ | 746 */ |
742 extension_length = 9; | 747 extension_length = 9; |
743 | 748 |
744 if (append && maxBytes >= extension_length) { | 749 if (append && maxBytes >= extension_length) { |
745 SECStatus rv; | 750 SECStatus rv; |
(...skipping 1239 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1985 return SECSuccess; | 1990 return SECSuccess; |
1986 } | 1991 } |
1987 | 1992 |
1988 /* OK, we have a valid cipher and we've selected it */ | 1993 /* OK, we have a valid cipher and we've selected it */ |
1989 ss->ssl3.dtlsSRTPCipherSuite = cipher; | 1994 ss->ssl3.dtlsSRTPCipherSuite = cipher; |
1990 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; | 1995 ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ssl_use_srtp_xtn; |
1991 | 1996 |
1992 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, | 1997 return ssl3_RegisterServerHelloExtensionSender(ss, ssl_use_srtp_xtn, |
1993 ssl3_SendUseSRTPXtn); | 1998 ssl3_SendUseSRTPXtn); |
1994 } | 1999 } |
OLD | NEW |