| Index: net/third_party/nss/ssl/ssl3con.c
|
| ===================================================================
|
| --- net/third_party/nss/ssl/ssl3con.c (revision 243686)
|
| +++ net/third_party/nss/ssl/ssl3con.c (working copy)
|
| @@ -5211,7 +5211,7 @@
|
| * the lock across the calls to ssl3_CallHelloExtensionSenders.
|
| */
|
| if (sid->u.ssl3.lock) {
|
| - PR_RWLock_Rlock(sid->u.ssl3.lock);
|
| + NSSRWLock_LockRead(sid->u.ssl3.lock);
|
| }
|
|
|
| if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) {
|
| @@ -5220,7 +5220,7 @@
|
|
|
| extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL);
|
| if (extLen < 0) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return SECFailure;
|
| }
|
| maxBytes -= extLen;
|
| @@ -5248,7 +5248,7 @@
|
| /* how many suites are permitted by policy and user preference? */
|
| num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE);
|
| if (!num_suites) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return SECFailure; /* count_cipher_suites has set error code. */
|
| }
|
|
|
| @@ -5293,7 +5293,7 @@
|
|
|
| rv = ssl3_AppendHandshakeHeader(ss, client_hello, length);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| @@ -5312,21 +5312,21 @@
|
| rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2);
|
| }
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */
|
| rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by GetNewRandom. */
|
| }
|
| }
|
| rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random,
|
| SSL3_RANDOM_LENGTH);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| @@ -5336,7 +5336,7 @@
|
| else
|
| rv = ssl3_AppendHandshakeVariable(ss, NULL, 0, 1);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| @@ -5344,14 +5344,14 @@
|
| rv = ssl3_AppendHandshakeVariable(
|
| ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| }
|
|
|
| rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| @@ -5360,7 +5360,7 @@
|
| rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| actual_count++;
|
| @@ -5369,7 +5369,7 @@
|
| rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| actual_count++;
|
| @@ -5379,7 +5379,7 @@
|
| if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
|
| actual_count++;
|
| if (actual_count > num_suites) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| /* set error card removal/insertion error */
|
| PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL);
|
| return SECFailure;
|
| @@ -5387,7 +5387,7 @@
|
| rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| }
|
| @@ -5398,14 +5398,14 @@
|
| * the server.. */
|
| if (actual_count != num_suites) {
|
| /* Card removal/insertion error */
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL);
|
| return SECFailure;
|
| }
|
|
|
| rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| for (i = 0; i < compressionMethodsCount; i++) {
|
| @@ -5413,7 +5413,7 @@
|
| continue;
|
| rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| }
|
| @@ -5424,20 +5424,20 @@
|
|
|
| rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2);
|
| if (rv != SECSuccess) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return rv; /* err set by AppendHandshake. */
|
| }
|
|
|
| extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL);
|
| if (extLen < 0) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return SECFailure;
|
| }
|
| maxBytes -= extLen;
|
|
|
| extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes);
|
| if (extLen < 0) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); }
|
| return SECFailure;
|
| }
|
| maxBytes -= extLen;
|
| @@ -5446,7 +5446,7 @@
|
| }
|
|
|
| if (sid->u.ssl3.lock) {
|
| - PR_RWLock_Unlock(sid->u.ssl3.lock);
|
| + NSSRWLock_UnlockRead(sid->u.ssl3.lock);
|
| }
|
|
|
| if (ss->xtnData.sentSessionTicketInClientHello) {
|
|
|