| Index: net/third_party/nss/patches/nssrwlock.patch
|
| diff --git a/net/third_party/nss/patches/nssrwlock.patch b/net/third_party/nss/patches/nssrwlock.patch
|
| index d56dbfbf75736f26ef68465ca67bc12444df6b66..ed0e9109ef41b52390a7563b3ff6ee0a1bd63771 100644
|
| --- a/net/third_party/nss/patches/nssrwlock.patch
|
| +++ b/net/third_party/nss/patches/nssrwlock.patch
|
| @@ -1,8 +1,8 @@
|
| -diff --git a/ssl/ssl3con.c b/ssl/ssl3con.c
|
| -index 0ac85da..f5afab7 100644
|
| ---- a/ssl/ssl3con.c
|
| -+++ b/ssl/ssl3con.c
|
| -@@ -5261,7 +5261,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +diff --git a/lib/ssl/ssl3con.c b/lib/ssl/ssl3con.c
|
| +index afab931..e5e620f 100644
|
| +--- a/lib/ssl/ssl3con.c
|
| ++++ b/lib/ssl/ssl3con.c
|
| +@@ -5436,7 +5436,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| * the lock across the calls to ssl3_CallHelloExtensionSenders.
|
| */
|
| if (sid->u.ssl3.lock) {
|
| @@ -11,7 +11,7 @@ index 0ac85da..f5afab7 100644
|
| }
|
|
|
| if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) {
|
| -@@ -5270,7 +5270,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5445,7 +5445,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
|
|
| extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL);
|
| if (extLen < 0) {
|
| @@ -20,7 +20,7 @@ index 0ac85da..f5afab7 100644
|
| return SECFailure;
|
| }
|
| total_exten_len += extLen;
|
| -@@ -5297,7 +5297,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5472,7 +5472,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| /* how many suites are permitted by policy and user preference? */
|
| num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE);
|
| if (!num_suites) {
|
| @@ -29,7 +29,7 @@ index 0ac85da..f5afab7 100644
|
| return SECFailure; /* count_cipher_suites has set error code. */
|
| }
|
|
|
| -@@ -5342,7 +5342,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5517,7 +5517,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
|
|
| rv = ssl3_AppendHandshakeHeader(ss, client_hello, length);
|
| if (rv != SECSuccess) {
|
| @@ -38,7 +38,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| -@@ -5361,21 +5361,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5536,21 +5536,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2);
|
| }
|
| if (rv != SECSuccess) {
|
| @@ -63,7 +63,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| -@@ -5385,7 +5385,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5560,7 +5560,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| else
|
| rv = ssl3_AppendHandshakeNumber(ss, 0, 1);
|
| if (rv != SECSuccess) {
|
| @@ -72,7 +72,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| -@@ -5393,14 +5393,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5568,14 +5568,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| rv = ssl3_AppendHandshakeVariable(
|
| ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1);
|
| if (rv != SECSuccess) {
|
| @@ -89,7 +89,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
|
|
| -@@ -5409,7 +5409,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5584,7 +5584,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| @@ -98,7 +98,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| actual_count++;
|
| -@@ -5418,7 +5418,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5593,7 +5593,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| @@ -107,8 +107,8 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| actual_count++;
|
| -@@ -5428,7 +5428,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| - if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) {
|
| +@@ -5603,7 +5603,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| + if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange, ss)) {
|
| actual_count++;
|
| if (actual_count > num_suites) {
|
| - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); }
|
| @@ -116,7 +116,7 @@ index 0ac85da..f5afab7 100644
|
| /* set error card removal/insertion error */
|
| PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL);
|
| return SECFailure;
|
| -@@ -5436,7 +5436,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5611,7 +5611,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite,
|
| sizeof(ssl3CipherSuite));
|
| if (rv != SECSuccess) {
|
| @@ -125,7 +125,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| }
|
| -@@ -5447,14 +5447,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5622,14 +5622,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| * the server.. */
|
| if (actual_count != num_suites) {
|
| /* Card removal/insertion error */
|
| @@ -142,7 +142,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| for (i = 0; i < compressionMethodsCount; i++) {
|
| -@@ -5462,7 +5462,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5637,7 +5637,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| continue;
|
| rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1);
|
| if (rv != SECSuccess) {
|
| @@ -151,7 +151,7 @@ index 0ac85da..f5afab7 100644
|
| return rv; /* err set by ssl3_AppendHandshake* */
|
| }
|
| }
|
| -@@ -5473,20 +5473,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5648,20 +5648,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
|
|
| rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2);
|
| if (rv != SECSuccess) {
|
| @@ -175,7 +175,7 @@ index 0ac85da..f5afab7 100644
|
| return SECFailure;
|
| }
|
| maxBytes -= extLen;
|
| -@@ -5495,7 +5495,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| +@@ -5670,7 +5670,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending)
|
| }
|
|
|
| if (sid->u.ssl3.lock) {
|
| @@ -184,11 +184,11 @@ index 0ac85da..f5afab7 100644
|
| }
|
|
|
| if (ss->xtnData.sentSessionTicketInClientHello) {
|
| -diff --git a/ssl/sslimpl.h b/ssl/sslimpl.h
|
| -index d12228e..efcbf9f 100644
|
| ---- a/ssl/sslimpl.h
|
| -+++ b/ssl/sslimpl.h
|
| -@@ -731,7 +731,7 @@ struct sslSessionIDStr {
|
| +diff --git a/lib/ssl/sslimpl.h b/lib/ssl/sslimpl.h
|
| +index 3403091..874e59c 100644
|
| +--- a/lib/ssl/sslimpl.h
|
| ++++ b/lib/ssl/sslimpl.h
|
| +@@ -742,7 +742,7 @@ struct sslSessionIDStr {
|
| * cached. Before then, there is no need to lock anything because
|
| * the sid isn't being shared by anything.
|
| */
|
| @@ -197,10 +197,10 @@ index d12228e..efcbf9f 100644
|
|
|
| /* The lock must be held while reading or writing these members
|
| * because they change while the sid is cached.
|
| -diff --git a/ssl/sslnonce.c b/ssl/sslnonce.c
|
| +diff --git a/lib/ssl/sslnonce.c b/lib/ssl/sslnonce.c
|
| index cefdda6..28ad364 100644
|
| ---- a/ssl/sslnonce.c
|
| -+++ b/ssl/sslnonce.c
|
| +--- a/lib/ssl/sslnonce.c
|
| ++++ b/lib/ssl/sslnonce.c
|
| @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid)
|
| }
|
|
|
|
|