| OLD | NEW |
| (Empty) |
| 1 diff --git a/lib/ssl/ssl3con.c b/lib/ssl/ssl3con.c | |
| 2 index afab931..e5e620f 100644 | |
| 3 --- a/lib/ssl/ssl3con.c | |
| 4 +++ b/lib/ssl/ssl3con.c | |
| 5 @@ -5436,7 +5436,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 6 * the lock across the calls to ssl3_CallHelloExtensionSenders. | |
| 7 */ | |
| 8 if (sid->u.ssl3.lock) { | |
| 9 - PR_RWLock_Rlock(sid->u.ssl3.lock); | |
| 10 + NSSRWLock_LockRead(sid->u.ssl3.lock); | |
| 11 } | |
| 12 | |
| 13 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { | |
| 14 @@ -5445,7 +5445,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 15 | |
| 16 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); | |
| 17 if (extLen < 0) { | |
| 18 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 19 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 20 return SECFailure; | |
| 21 } | |
| 22 total_exten_len += extLen; | |
| 23 @@ -5472,7 +5472,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 24 /* how many suites are permitted by policy and user preference? */ | |
| 25 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); | |
| 26 if (!num_suites) { | |
| 27 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 28 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 29 return SECFailure; /* count_cipher_suites has set error code. */ | |
| 30 } | |
| 31 | |
| 32 @@ -5517,7 +5517,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 33 | |
| 34 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); | |
| 35 if (rv != SECSuccess) { | |
| 36 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 37 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 38 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 39 } | |
| 40 | |
| 41 @@ -5536,21 +5536,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 42 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); | |
| 43 } | |
| 44 if (rv != SECSuccess) { | |
| 45 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 46 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 47 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 48 } | |
| 49 | |
| 50 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ | |
| 51 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); | |
| 52 if (rv != SECSuccess) { | |
| 53 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 54 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 55 return rv; /* err set by GetNewRandom. */ | |
| 56 } | |
| 57 } | |
| 58 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, | |
| 59 SSL3_RANDOM_LENGTH); | |
| 60 if (rv != SECSuccess) { | |
| 61 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 62 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 63 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 64 } | |
| 65 | |
| 66 @@ -5560,7 +5560,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 67 else | |
| 68 rv = ssl3_AppendHandshakeNumber(ss, 0, 1); | |
| 69 if (rv != SECSuccess) { | |
| 70 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 71 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 72 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 73 } | |
| 74 | |
| 75 @@ -5568,14 +5568,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 76 rv = ssl3_AppendHandshakeVariable( | |
| 77 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); | |
| 78 if (rv != SECSuccess) { | |
| 79 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 80 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 81 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 82 } | |
| 83 } | |
| 84 | |
| 85 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); | |
| 86 if (rv != SECSuccess) { | |
| 87 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 88 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 89 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 90 } | |
| 91 | |
| 92 @@ -5584,7 +5584,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 93 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, | |
| 94 sizeof(ssl3CipherSuite)); | |
| 95 if (rv != SECSuccess) { | |
| 96 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 97 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 98 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 99 } | |
| 100 actual_count++; | |
| 101 @@ -5593,7 +5593,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 102 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, | |
| 103 sizeof(ssl3CipherSuite)); | |
| 104 if (rv != SECSuccess) { | |
| 105 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 106 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 107 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 108 } | |
| 109 actual_count++; | |
| 110 @@ -5603,7 +5603,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 111 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange, ss)) { | |
| 112 actual_count++; | |
| 113 if (actual_count > num_suites) { | |
| 114 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 115 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | |
| 116 /* set error card removal/insertion error */ | |
| 117 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | |
| 118 return SECFailure; | |
| 119 @@ -5611,7 +5611,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 120 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, | |
| 121 sizeof(ssl3CipherSuite)); | |
| 122 if (rv != SECSuccess) { | |
| 123 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 124 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | |
| 125 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 126 } | |
| 127 } | |
| 128 @@ -5622,14 +5622,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 129 * the server.. */ | |
| 130 if (actual_count != num_suites) { | |
| 131 /* Card removal/insertion error */ | |
| 132 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 133 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 134 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | |
| 135 return SECFailure; | |
| 136 } | |
| 137 | |
| 138 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); | |
| 139 if (rv != SECSuccess) { | |
| 140 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 141 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 142 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 143 } | |
| 144 for (i = 0; i < compressionMethodsCount; i++) { | |
| 145 @@ -5637,7 +5637,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 146 continue; | |
| 147 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); | |
| 148 if (rv != SECSuccess) { | |
| 149 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 150 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 151 return rv; /* err set by ssl3_AppendHandshake* */ | |
| 152 } | |
| 153 } | |
| 154 @@ -5648,20 +5648,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 155 | |
| 156 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); | |
| 157 if (rv != SECSuccess) { | |
| 158 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 159 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 160 return rv; /* err set by AppendHandshake. */ | |
| 161 } | |
| 162 | |
| 163 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); | |
| 164 if (extLen < 0) { | |
| 165 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 166 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 167 return SECFailure; | |
| 168 } | |
| 169 maxBytes -= extLen; | |
| 170 | |
| 171 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); | |
| 172 if (extLen < 0) { | |
| 173 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
| 174 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
| 175 return SECFailure; | |
| 176 } | |
| 177 maxBytes -= extLen; | |
| 178 @@ -5670,7 +5670,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBool resending) | |
| 179 } | |
| 180 | |
| 181 if (sid->u.ssl3.lock) { | |
| 182 - PR_RWLock_Unlock(sid->u.ssl3.lock); | |
| 183 + NSSRWLock_UnlockRead(sid->u.ssl3.lock); | |
| 184 } | |
| 185 | |
| 186 if (ss->xtnData.sentSessionTicketInClientHello) { | |
| 187 diff --git a/lib/ssl/sslimpl.h b/lib/ssl/sslimpl.h | |
| 188 index 3403091..874e59c 100644 | |
| 189 --- a/lib/ssl/sslimpl.h | |
| 190 +++ b/lib/ssl/sslimpl.h | |
| 191 @@ -742,7 +742,7 @@ struct sslSessionIDStr { | |
| 192 * cached. Before then, there is no need to lock anything because | |
| 193 * the sid isn't being shared by anything. | |
| 194 */ | |
| 195 - PRRWLock *lock; | |
| 196 + NSSRWLock *lock; | |
| 197 | |
| 198 /* The lock must be held while reading or writing these members | |
| 199 * because they change while the sid is cached. | |
| 200 diff --git a/lib/ssl/sslnonce.c b/lib/ssl/sslnonce.c | |
| 201 index cefdda6..28ad364 100644 | |
| 202 --- a/lib/ssl/sslnonce.c | |
| 203 +++ b/lib/ssl/sslnonce.c | |
| 204 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid) | |
| 205 } | |
| 206 | |
| 207 if (sid->u.ssl3.lock) { | |
| 208 - PR_DestroyRWLock(sid->u.ssl3.lock); | |
| 209 + NSSRWLock_Destroy(sid->u.ssl3.lock); | |
| 210 } | |
| 211 } | |
| 212 | |
| 213 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid) | |
| 214 PRINT_BUF(8, (0, "sessionID:", | |
| 215 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); | |
| 216 | |
| 217 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL); | |
| 218 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL); | |
| 219 if (!sid->u.ssl3.lock) { | |
| 220 return; | |
| 221 } | |
| 222 @@ -450,7 +450,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid, | |
| 223 * yet, so no locking is needed. | |
| 224 */ | |
| 225 if (sid->u.ssl3.lock) { | |
| 226 - PR_RWLock_Wlock(sid->u.ssl3.lock); | |
| 227 + NSSRWLock_LockWrite(sid->u.ssl3.lock); | |
| 228 if (sid->u.ssl3.locked.sessionTicket.ticket.data) { | |
| 229 SECITEM_FreeItem(&sid->u.ssl3.locked.sessionTicket.ticket, | |
| 230 PR_FALSE); | |
| 231 @@ -465,6 +465,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *sid, | |
| 232 newSessionTicket->ticket.len = 0; | |
| 233 | |
| 234 if (sid->u.ssl3.lock) { | |
| 235 - PR_RWLock_Unlock(sid->u.ssl3.lock); | |
| 236 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock); | |
| 237 } | |
| 238 } | |
| OLD | NEW |