Index: net/third_party/nss/ssl/ssl3con.c |
=================================================================== |
--- net/third_party/nss/ssl/ssl3con.c (revision 243686) |
+++ net/third_party/nss/ssl/ssl3con.c (working copy) |
@@ -5211,7 +5211,7 @@ |
* the lock across the calls to ssl3_CallHelloExtensionSenders. |
*/ |
if (sid->u.ssl3.lock) { |
- PR_RWLock_Rlock(sid->u.ssl3.lock); |
+ NSSRWLock_LockRead(sid->u.ssl3.lock); |
} |
if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { |
@@ -5220,7 +5220,7 @@ |
extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); |
if (extLen < 0) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return SECFailure; |
} |
maxBytes -= extLen; |
@@ -5248,7 +5248,7 @@ |
/* how many suites are permitted by policy and user preference? */ |
num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); |
if (!num_suites) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return SECFailure; /* count_cipher_suites has set error code. */ |
} |
@@ -5293,7 +5293,7 @@ |
rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
@@ -5312,21 +5312,21 @@ |
rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); |
} |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ |
rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by GetNewRandom. */ |
} |
} |
rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, |
SSL3_RANDOM_LENGTH); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
@@ -5336,7 +5336,7 @@ |
else |
rv = ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
@@ -5344,14 +5344,14 @@ |
rv = ssl3_AppendHandshakeVariable( |
ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
} |
rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
@@ -5360,7 +5360,7 @@ |
rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, |
sizeof(ssl3CipherSuite)); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
actual_count++; |
@@ -5369,7 +5369,7 @@ |
rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, |
sizeof(ssl3CipherSuite)); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
actual_count++; |
@@ -5379,7 +5379,7 @@ |
if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) { |
actual_count++; |
if (actual_count > num_suites) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
/* set error card removal/insertion error */ |
PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); |
return SECFailure; |
@@ -5387,7 +5387,7 @@ |
rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, |
sizeof(ssl3CipherSuite)); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
} |
@@ -5398,14 +5398,14 @@ |
* the server.. */ |
if (actual_count != num_suites) { |
/* Card removal/insertion error */ |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); |
return SECFailure; |
} |
rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
for (i = 0; i < compressionMethodsCount; i++) { |
@@ -5413,7 +5413,7 @@ |
continue; |
rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by ssl3_AppendHandshake* */ |
} |
} |
@@ -5424,20 +5424,20 @@ |
rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); |
if (rv != SECSuccess) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return rv; /* err set by AppendHandshake. */ |
} |
extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); |
if (extLen < 0) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return SECFailure; |
} |
maxBytes -= extLen; |
extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); |
if (extLen < 0) { |
- if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } |
+ if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } |
return SECFailure; |
} |
maxBytes -= extLen; |
@@ -5446,7 +5446,7 @@ |
} |
if (sid->u.ssl3.lock) { |
- PR_RWLock_Unlock(sid->u.ssl3.lock); |
+ NSSRWLock_UnlockRead(sid->u.ssl3.lock); |
} |
if (ss->xtnData.sentSessionTicketInClientHello) { |