| Index: net/third_party/nss/ssl/sslreveal.c
|
| diff --git a/net/third_party/nss/ssl/sslreveal.c b/net/third_party/nss/ssl/sslreveal.c
|
| deleted file mode 100644
|
| index 4c124a1dc0c60ee2e2d553fdf352a388deec99ed..0000000000000000000000000000000000000000
|
| --- a/net/third_party/nss/ssl/sslreveal.c
|
| +++ /dev/null
|
| @@ -1,110 +0,0 @@
|
| -/*
|
| - * Accessor functions for SSLSocket private members.
|
| - *
|
| - * This Source Code Form is subject to the terms of the Mozilla Public
|
| - * License, v. 2.0. If a copy of the MPL was not distributed with this
|
| - * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
| -
|
| -#include "cert.h"
|
| -#include "ssl.h"
|
| -#include "certt.h"
|
| -#include "sslimpl.h"
|
| -
|
| -/* given PRFileDesc, returns a copy of certificate associated with the socket
|
| - * the caller should delete the cert when done with SSL_DestroyCertificate
|
| - */
|
| -CERTCertificate *
|
| -SSL_RevealCert(PRFileDesc *fd)
|
| -{
|
| - CERTCertificate *cert = NULL;
|
| - sslSocket *sslsocket = NULL;
|
| -
|
| - sslsocket = ssl_FindSocket(fd);
|
| -
|
| - /* CERT_DupCertificate increases reference count and returns pointer to
|
| - * the same cert
|
| - */
|
| - if (sslsocket && sslsocket->sec.peerCert)
|
| - cert = CERT_DupCertificate(sslsocket->sec.peerCert);
|
| -
|
| - return cert;
|
| -}
|
| -
|
| -/* given PRFileDesc, returns a pointer to PinArg associated with the socket
|
| - */
|
| -void *
|
| -SSL_RevealPinArg(PRFileDesc *fd)
|
| -{
|
| - sslSocket *sslsocket = NULL;
|
| - void *PinArg = NULL;
|
| -
|
| - sslsocket = ssl_FindSocket(fd);
|
| -
|
| - /* is pkcs11PinArg part of the sslSocket or sslSecurityInfo ? */
|
| - if (sslsocket)
|
| - PinArg = sslsocket->pkcs11PinArg;
|
| -
|
| - return PinArg;
|
| -}
|
| -
|
| -/* given PRFileDesc, returns a pointer to the URL associated with the socket
|
| - * the caller should free url when done
|
| - */
|
| -char *
|
| -SSL_RevealURL(PRFileDesc *fd)
|
| -{
|
| - sslSocket *sslsocket = NULL;
|
| - char *url = NULL;
|
| -
|
| - sslsocket = ssl_FindSocket(fd);
|
| -
|
| - if (sslsocket && sslsocket->url)
|
| - url = PL_strdup(sslsocket->url);
|
| -
|
| - return url;
|
| -}
|
| -
|
| -/* given PRFileDesc, returns status information related to extensions
|
| - * negotiated with peer during the handshake.
|
| - */
|
| -
|
| -SECStatus
|
| -SSL_HandshakeNegotiatedExtension(PRFileDesc *socket,
|
| - SSLExtensionType extId,
|
| - PRBool *pYes)
|
| -{
|
| - /* some decisions derived from SSL_GetChannelInfo */
|
| - sslSocket *sslsocket = NULL;
|
| -
|
| - if (!pYes) {
|
| - PORT_SetError(SEC_ERROR_INVALID_ARGS);
|
| - return SECFailure;
|
| - }
|
| -
|
| - sslsocket = ssl_FindSocket(socket);
|
| - if (!sslsocket) {
|
| - SSL_DBG(("%d: SSL[%d]: bad socket in HandshakeNegotiatedExtension",
|
| - SSL_GETPID(), socket));
|
| - return SECFailure;
|
| - }
|
| -
|
| - *pYes = PR_FALSE;
|
| -
|
| - /* according to public API SSL_GetChannelInfo, this doesn't need a lock */
|
| - if (sslsocket->opt.useSecurity) {
|
| - if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
|
| - /* now we know this socket went through ssl3_InitState() and
|
| - * ss->xtnData got initialized, which is the only member accessed by
|
| - * ssl3_ExtensionNegotiated();
|
| - * Member xtnData appears to get accessed in functions that handle
|
| - * the handshake (hello messages and extension sending),
|
| - * therefore the handshake lock should be sufficient.
|
| - */
|
| - ssl_GetSSL3HandshakeLock(sslsocket);
|
| - *pYes = ssl3_ExtensionNegotiated(sslsocket, extId);
|
| - ssl_ReleaseSSL3HandshakeLock(sslsocket);
|
| - }
|
| - }
|
| -
|
| - return SECSuccess;
|
| -}
|
|
|