| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Key Derivation that doesn't use PKCS11 | 2 * Key Derivation that doesn't use PKCS11 |
| 3 * | 3 * |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 7 | 7 |
| 8 #include "ssl.h" /* prereq to sslimpl.h */ | 8 #include "ssl.h" /* prereq to sslimpl.h */ |
| 9 #include "certt.h" /* prereq to sslimpl.h */ | 9 #include "certt.h" /* prereq to sslimpl.h */ |
| 10 #include "keythi.h" /* prereq to sslimpl.h */ | 10 #include "keythi.h" /* prereq to sslimpl.h */ |
| (...skipping 413 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 424 | 424 |
| 425 return rv; | 425 return rv; |
| 426 } | 426 } |
| 427 | 427 |
| 428 | 428 |
| 429 /* derive the Master Secret from the PMS */ | 429 /* derive the Master Secret from the PMS */ |
| 430 /* Presently, this is only done wtih RSA PMS, and only on the server side, | 430 /* Presently, this is only done wtih RSA PMS, and only on the server side, |
| 431 * so isRSA is always true. | 431 * so isRSA is always true. |
| 432 */ | 432 */ |
| 433 SECStatus | 433 SECStatus |
| 434 ssl3_MasterKeyDeriveBypass( | 434 ssl3_MasterSecretDeriveBypass( |
| 435 ssl3CipherSpec * pwSpec, | 435 ssl3CipherSpec * pwSpec, |
| 436 const unsigned char * cr, | 436 const unsigned char * cr, |
| 437 const unsigned char * sr, | 437 const unsigned char * sr, |
| 438 const SECItem * pms, | 438 const SECItem * pms, |
| 439 PRBool isTLS, | 439 PRBool isTLS, |
| 440 PRBool isRSA) | 440 PRBool isRSA) |
| 441 { | 441 { |
| 442 unsigned char * key_block = pwSpec->key_block; | 442 unsigned char * key_block = pwSpec->key_block; |
| 443 SECStatus rv = SECSuccess; | 443 SECStatus rv = SECSuccess; |
| 444 PRBool isFIPS = PR_FALSE; | 444 PRBool isFIPS = PR_FALSE; |
| (...skipping 442 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 887 if (srvPubkey) { | 887 if (srvPubkey) { |
| 888 SECKEY_DestroyPublicKey(srvPubkey); | 888 SECKEY_DestroyPublicKey(srvPubkey); |
| 889 srvPubkey = NULL; | 889 srvPubkey = NULL; |
| 890 } | 890 } |
| 891 | 891 |
| 892 | 892 |
| 893 return rv; | 893 return rv; |
| 894 #endif /* NO_PKCS11_BYPASS */ | 894 #endif /* NO_PKCS11_BYPASS */ |
| 895 } | 895 } |
| 896 | 896 |
| OLD | NEW |