OLD | NEW |
| (Empty) |
1 diff -pu a/nss/lib/ssl/ssl3con.c b/nss/lib/ssl/ssl3con.c | |
2 --- a/nss/lib/ssl/ssl3con.c 2014-01-17 19:01:58.104487211 -0800 | |
3 +++ b/nss/lib/ssl/ssl3con.c 2014-01-17 19:02:38.965159506 -0800 | |
4 @@ -5211,7 +5211,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
5 * the lock across the calls to ssl3_CallHelloExtensionSenders. | |
6 */ | |
7 if (sid->u.ssl3.lock) { | |
8 - PR_RWLock_Rlock(sid->u.ssl3.lock); | |
9 + NSSRWLock_LockRead(sid->u.ssl3.lock); | |
10 } | |
11 | |
12 if (isTLS || (ss->firstHsDone && ss->peerRequestedProtection)) { | |
13 @@ -5220,7 +5220,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
14 | |
15 extLen = ssl3_CallHelloExtensionSenders(ss, PR_FALSE, maxBytes, NULL); | |
16 if (extLen < 0) { | |
17 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
18 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
19 return SECFailure; | |
20 } | |
21 maxBytes -= extLen; | |
22 @@ -5248,7 +5248,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
23 /* how many suites are permitted by policy and user preference? */ | |
24 num_suites = count_cipher_suites(ss, ss->ssl3.policy, PR_TRUE); | |
25 if (!num_suites) { | |
26 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
27 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
28 return SECFailure; /* count_cipher_suites has set error code. */ | |
29 } | |
30 | |
31 @@ -5293,7 +5293,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
32 | |
33 rv = ssl3_AppendHandshakeHeader(ss, client_hello, length); | |
34 if (rv != SECSuccess) { | |
35 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
36 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
37 return rv; /* err set by ssl3_AppendHandshake* */ | |
38 } | |
39 | |
40 @@ -5312,21 +5312,21 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
41 rv = ssl3_AppendHandshakeNumber(ss, ss->clientHelloVersion, 2); | |
42 } | |
43 if (rv != SECSuccess) { | |
44 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
45 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
46 return rv; /* err set by ssl3_AppendHandshake* */ | |
47 } | |
48 | |
49 if (!resending) { /* Don't re-generate if we are in DTLS re-sending mode */ | |
50 rv = ssl3_GetNewRandom(&ss->ssl3.hs.client_random); | |
51 if (rv != SECSuccess) { | |
52 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
53 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
54 return rv; /* err set by GetNewRandom. */ | |
55 } | |
56 } | |
57 rv = ssl3_AppendHandshake(ss, &ss->ssl3.hs.client_random, | |
58 SSL3_RANDOM_LENGTH); | |
59 if (rv != SECSuccess) { | |
60 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
61 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
62 return rv; /* err set by ssl3_AppendHandshake* */ | |
63 } | |
64 | |
65 @@ -5336,7 +5336,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
66 else | |
67 rv = ssl3_AppendHandshakeVariable(ss, NULL, 0, 1); | |
68 if (rv != SECSuccess) { | |
69 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
70 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
71 return rv; /* err set by ssl3_AppendHandshake* */ | |
72 } | |
73 | |
74 @@ -5344,14 +5344,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
75 rv = ssl3_AppendHandshakeVariable( | |
76 ss, ss->ssl3.hs.cookie, ss->ssl3.hs.cookieLen, 1); | |
77 if (rv != SECSuccess) { | |
78 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
79 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
80 return rv; /* err set by ssl3_AppendHandshake* */ | |
81 } | |
82 } | |
83 | |
84 rv = ssl3_AppendHandshakeNumber(ss, num_suites*sizeof(ssl3CipherSuite), 2); | |
85 if (rv != SECSuccess) { | |
86 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
87 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
88 return rv; /* err set by ssl3_AppendHandshake* */ | |
89 } | |
90 | |
91 @@ -5360,7 +5360,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
92 rv = ssl3_AppendHandshakeNumber(ss, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, | |
93 sizeof(ssl3CipherSuite)); | |
94 if (rv != SECSuccess) { | |
95 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
96 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
97 return rv; /* err set by ssl3_AppendHandshake* */ | |
98 } | |
99 actual_count++; | |
100 @@ -5369,7 +5369,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
101 rv = ssl3_AppendHandshakeNumber(ss, TLS_FALLBACK_SCSV, | |
102 sizeof(ssl3CipherSuite)); | |
103 if (rv != SECSuccess) { | |
104 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
105 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
106 return rv; /* err set by ssl3_AppendHandshake* */ | |
107 } | |
108 actual_count++; | |
109 @@ -5379,7 +5379,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
110 if (config_match(suite, ss->ssl3.policy, PR_TRUE, &ss->vrange)) { | |
111 actual_count++; | |
112 if (actual_count > num_suites) { | |
113 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
114 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | |
115 /* set error card removal/insertion error */ | |
116 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | |
117 return SECFailure; | |
118 @@ -5387,7 +5387,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
119 rv = ssl3_AppendHandshakeNumber(ss, suite->cipher_suite, | |
120 sizeof(ssl3CipherSuite)); | |
121 if (rv != SECSuccess) { | |
122 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
123 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock);
} | |
124 return rv; /* err set by ssl3_AppendHandshake* */ | |
125 } | |
126 } | |
127 @@ -5398,14 +5398,14 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
128 * the server.. */ | |
129 if (actual_count != num_suites) { | |
130 /* Card removal/insertion error */ | |
131 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
132 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
133 PORT_SetError(SSL_ERROR_TOKEN_INSERTION_REMOVAL); | |
134 return SECFailure; | |
135 } | |
136 | |
137 rv = ssl3_AppendHandshakeNumber(ss, numCompressionMethods, 1); | |
138 if (rv != SECSuccess) { | |
139 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
140 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
141 return rv; /* err set by ssl3_AppendHandshake* */ | |
142 } | |
143 for (i = 0; i < compressionMethodsCount; i++) { | |
144 @@ -5413,7 +5413,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
145 continue; | |
146 rv = ssl3_AppendHandshakeNumber(ss, compressions[i], 1); | |
147 if (rv != SECSuccess) { | |
148 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
149 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
150 return rv; /* err set by ssl3_AppendHandshake* */ | |
151 } | |
152 } | |
153 @@ -5424,20 +5424,20 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
154 | |
155 rv = ssl3_AppendHandshakeNumber(ss, maxBytes, 2); | |
156 if (rv != SECSuccess) { | |
157 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
158 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
159 return rv; /* err set by AppendHandshake. */ | |
160 } | |
161 | |
162 extLen = ssl3_CallHelloExtensionSenders(ss, PR_TRUE, maxBytes, NULL); | |
163 if (extLen < 0) { | |
164 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
165 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
166 return SECFailure; | |
167 } | |
168 maxBytes -= extLen; | |
169 | |
170 extLen = ssl3_AppendPaddingExtension(ss, paddingExtensionLen, maxBytes); | |
171 if (extLen < 0) { | |
172 - if (sid->u.ssl3.lock) { PR_RWLock_Unlock(sid->u.ssl3.lock); } | |
173 + if (sid->u.ssl3.lock) { NSSRWLock_UnlockRead(sid->u.ssl3.lock); } | |
174 return SECFailure; | |
175 } | |
176 maxBytes -= extLen; | |
177 @@ -5446,7 +5446,7 @@ ssl3_SendClientHello(sslSocket *ss, PRBo | |
178 } | |
179 | |
180 if (sid->u.ssl3.lock) { | |
181 - PR_RWLock_Unlock(sid->u.ssl3.lock); | |
182 + NSSRWLock_UnlockRead(sid->u.ssl3.lock); | |
183 } | |
184 | |
185 if (ss->xtnData.sentSessionTicketInClientHello) { | |
186 diff -pu a/nss/lib/ssl/sslimpl.h b/nss/lib/ssl/sslimpl.h | |
187 --- a/nss/lib/ssl/sslimpl.h 2014-01-17 19:00:52.843413560 -0800 | |
188 +++ b/nss/lib/ssl/sslimpl.h 2014-01-17 19:02:38.965159506 -0800 | |
189 @@ -730,7 +730,7 @@ struct sslSessionIDStr { | |
190 * cached. Before then, there is no need to lock anything because | |
191 * the sid isn't being shared by anything. | |
192 */ | |
193 - PRRWLock *lock; | |
194 + NSSRWLock *lock; | |
195 | |
196 /* The lock must be held while reading or writing these members | |
197 * because they change while the sid is cached. | |
198 diff -pu a/nss/lib/ssl/sslnonce.c b/nss/lib/ssl/sslnonce.c | |
199 --- a/nss/lib/ssl/sslnonce.c 2014-01-17 19:02:25.844943628 -0800 | |
200 +++ b/nss/lib/ssl/sslnonce.c 2014-01-17 19:02:38.965159506 -0800 | |
201 @@ -136,7 +136,7 @@ ssl_DestroySID(sslSessionID *sid) | |
202 } | |
203 | |
204 if (sid->u.ssl3.lock) { | |
205 - PR_DestroyRWLock(sid->u.ssl3.lock); | |
206 + NSSRWLock_Destroy(sid->u.ssl3.lock); | |
207 } | |
208 } | |
209 | |
210 @@ -308,7 +308,7 @@ CacheSID(sslSessionID *sid) | |
211 PRINT_BUF(8, (0, "sessionID:", | |
212 sid->u.ssl3.sessionID, sid->u.ssl3.sessionIDLength)); | |
213 | |
214 - sid->u.ssl3.lock = PR_NewRWLock(PR_RWLOCK_RANK_NONE, NULL); | |
215 + sid->u.ssl3.lock = NSSRWLock_New(NSS_RWLOCK_RANK_NONE, NULL); | |
216 if (!sid->u.ssl3.lock) { | |
217 return; | |
218 } | |
219 @@ -448,7 +448,7 @@ ssl3_SetSIDSessionTicket(sslSessionID *s | |
220 * yet, so no locking is needed. | |
221 */ | |
222 if (sid->u.ssl3.lock) { | |
223 - PR_RWLock_Wlock(sid->u.ssl3.lock); | |
224 + NSSRWLock_LockWrite(sid->u.ssl3.lock); | |
225 | |
226 /* A server might have sent us an empty ticket, which has the | |
227 * effect of clearing the previously known ticket. | |
228 @@ -467,6 +467,6 @@ ssl3_SetSIDSessionTicket(sslSessionID *s | |
229 newSessionTicket->ticket.len = 0; | |
230 | |
231 if (sid->u.ssl3.lock) { | |
232 - PR_RWLock_Unlock(sid->u.ssl3.lock); | |
233 + NSSRWLock_UnlockWrite(sid->u.ssl3.lock); | |
234 } | |
235 } | |
OLD | NEW |