OLD | NEW |
1 /* | 1 /* |
2 * Key Derivation that doesn't use PKCS11 | 2 * Key Derivation that doesn't use PKCS11 |
3 * | 3 * |
4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
7 | 7 |
8 #include "ssl.h" /* prereq to sslimpl.h */ | 8 #include "ssl.h" /* prereq to sslimpl.h */ |
9 #include "certt.h" /* prereq to sslimpl.h */ | 9 #include "certt.h" /* prereq to sslimpl.h */ |
10 #include "keythi.h" /* prereq to sslimpl.h */ | 10 #include "keythi.h" /* prereq to sslimpl.h */ |
(...skipping 413 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
424 | 424 |
425 return rv; | 425 return rv; |
426 } | 426 } |
427 | 427 |
428 | 428 |
429 /* derive the Master Secret from the PMS */ | 429 /* derive the Master Secret from the PMS */ |
430 /* Presently, this is only done wtih RSA PMS, and only on the server side, | 430 /* Presently, this is only done wtih RSA PMS, and only on the server side, |
431 * so isRSA is always true. | 431 * so isRSA is always true. |
432 */ | 432 */ |
433 SECStatus | 433 SECStatus |
434 ssl3_MasterKeyDeriveBypass( | 434 ssl3_MasterSecretDeriveBypass( |
435 ssl3CipherSpec * pwSpec, | 435 ssl3CipherSpec * pwSpec, |
436 const unsigned char * cr, | 436 const unsigned char * cr, |
437 const unsigned char * sr, | 437 const unsigned char * sr, |
438 const SECItem * pms, | 438 const SECItem * pms, |
439 PRBool isTLS, | 439 PRBool isTLS, |
440 PRBool isRSA) | 440 PRBool isRSA) |
441 { | 441 { |
442 unsigned char * key_block = pwSpec->key_block; | 442 unsigned char * key_block = pwSpec->key_block; |
443 SECStatus rv = SECSuccess; | 443 SECStatus rv = SECSuccess; |
444 PRBool isFIPS = PR_FALSE; | 444 PRBool isFIPS = PR_FALSE; |
(...skipping 442 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
887 if (srvPubkey) { | 887 if (srvPubkey) { |
888 SECKEY_DestroyPublicKey(srvPubkey); | 888 SECKEY_DestroyPublicKey(srvPubkey); |
889 srvPubkey = NULL; | 889 srvPubkey = NULL; |
890 } | 890 } |
891 | 891 |
892 | 892 |
893 return rv; | 893 return rv; |
894 #endif /* NO_PKCS11_BYPASS */ | 894 #endif /* NO_PKCS11_BYPASS */ |
895 } | 895 } |
896 | 896 |
OLD | NEW |