OLD | NEW |
1 /* | 1 /* |
2 * vtables (and methods that call through them) for the 4 types of | 2 * vtables (and methods that call through them) for the 4 types of |
3 * SSLSockets supported. Only one type is still supported. | 3 * SSLSockets supported. Only one type is still supported. |
4 * Various other functions. | 4 * Various other functions. |
5 * | 5 * |
6 * This Source Code Form is subject to the terms of the Mozilla Public | 6 * This Source Code Form is subject to the terms of the Mozilla Public |
7 * License, v. 2.0. If a copy of the MPL was not distributed with this | 7 * License, v. 2.0. If a copy of the MPL was not distributed with this |
8 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 8 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
9 #include "seccomon.h" | 9 #include "seccomon.h" |
10 #include "cert.h" | 10 #include "cert.h" |
(...skipping 1309 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1320 return SECFailure; | 1320 return SECFailure; |
1321 } | 1321 } |
1322 if (SSL_IS_SSL2_CIPHER(which)) { | 1322 if (SSL_IS_SSL2_CIPHER(which)) { |
1323 rv = ssl2_CipherPrefSet(ss, which, enabled); | 1323 rv = ssl2_CipherPrefSet(ss, which, enabled); |
1324 } else { | 1324 } else { |
1325 rv = ssl3_CipherPrefSet(ss, (ssl3CipherSuite)which, enabled); | 1325 rv = ssl3_CipherPrefSet(ss, (ssl3CipherSuite)which, enabled); |
1326 } | 1326 } |
1327 return rv; | 1327 return rv; |
1328 } | 1328 } |
1329 | 1329 |
| 1330 SECStatus |
| 1331 SSL_CipherOrderSet(PRFileDesc *fd, const PRUint16 *ciphers, size_t len) |
| 1332 { |
| 1333 sslSocket *ss = ssl_FindSocket(fd); |
| 1334 |
| 1335 if (!ss) { |
| 1336 SSL_DBG(("%d: SSL[%d]: bad socket in CipherOrderSet", SSL_GETPID(), |
| 1337 fd)); |
| 1338 return SECFailure; |
| 1339 } |
| 1340 return ssl3_CipherOrderSet(ss, ciphers, len); |
| 1341 } |
| 1342 |
1330 SECStatus | 1343 SECStatus |
1331 SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled) | 1344 SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled) |
1332 { | 1345 { |
1333 SECStatus rv; | 1346 SECStatus rv; |
1334 sslSocket *ss = ssl_FindSocket(fd); | 1347 sslSocket *ss = ssl_FindSocket(fd); |
1335 | 1348 |
1336 if (!enabled) { | 1349 if (!enabled) { |
1337 PORT_SetError(SEC_ERROR_INVALID_ARGS); | 1350 PORT_SetError(SEC_ERROR_INVALID_ARGS); |
1338 return SECFailure; | 1351 return SECFailure; |
1339 } | 1352 } |
(...skipping 1785 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3125 loser: | 3138 loser: |
3126 ssl_DestroySocketContents(ss); | 3139 ssl_DestroySocketContents(ss); |
3127 ssl_DestroyLocks(ss); | 3140 ssl_DestroyLocks(ss); |
3128 PORT_Free(ss); | 3141 PORT_Free(ss); |
3129 ss = NULL; | 3142 ss = NULL; |
3130 } | 3143 } |
3131 } | 3144 } |
3132 return ss; | 3145 return ss; |
3133 } | 3146 } |
3134 | 3147 |
OLD | NEW |