Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(58)

Side by Side Diff: net/third_party/nss/ssl/ssl3con.c

Issue 10014010: net: False Start only for NPN capable servers. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 8 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ 1 /* -*- Mode: C; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
2 /* 2 /*
3 * SSL3 Protocol 3 * SSL3 Protocol
4 * 4 *
5 * ***** BEGIN LICENSE BLOCK ***** 5 * ***** BEGIN LICENSE BLOCK *****
6 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 6 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
7 * 7 *
8 * The contents of this file are subject to the Mozilla Public License Version 8 * The contents of this file are subject to the Mozilla Public License Version
9 * 1.1 (the "License"); you may not use this file except in compliance with 9 * 1.1 (the "License"); you may not use this file except in compliance with
10 * the License. You may obtain a copy of the License at 10 * the License. You may obtain a copy of the License at
(...skipping 6068 matching lines...) Expand 10 before | Expand all | Expand 10 after
6079 /* XXX: does not take into account whether we are waiting for 6079 /* XXX: does not take into account whether we are waiting for
6080 * SSL_AuthCertificateComplete or SSL_RestartHandshakeAfterCertReq. If/when 6080 * SSL_AuthCertificateComplete or SSL_RestartHandshakeAfterCertReq. If/when
6081 * that is done, this function could return different results each time it 6081 * that is done, this function could return different results each time it
6082 * would be called. 6082 * would be called.
6083 */ 6083 */
6084 6084
6085 ssl_GetSpecReadLock(ss); 6085 ssl_GetSpecReadLock(ss);
6086 rv = ss->opt.enableFalseStart && 6086 rv = ss->opt.enableFalseStart &&
6087 !ss->sec.isServer && 6087 !ss->sec.isServer &&
6088 !ss->ssl3.hs.isResuming && 6088 !ss->ssl3.hs.isResuming &&
6089 ssl3_ExtensionNegotiated(ss, ssl_next_proto_nego_xtn) &&
wtc 2012/04/17 22:46:09 If we do it this way, we need to update the docume
6089 ss->ssl3.cwSpec && 6090 ss->ssl3.cwSpec &&
6090 ss->ssl3.cwSpec->cipher_def->secret_key_size >= 10 && 6091 ss->ssl3.cwSpec->cipher_def->secret_key_size >= 10 &&
6091 (ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_rsa || 6092 (ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_rsa ||
6092 ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_dh || 6093 ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_dh ||
6093 ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_ecdh); 6094 ss->ssl3.hs.kea_def->exchKeyType == ssl_kea_ecdh);
6094 ssl_ReleaseSpecReadLock(ss); 6095 ssl_ReleaseSpecReadLock(ss);
6095 return rv; 6096 return rv;
6096 } 6097 }
6097 6098
6098 static SECStatus ssl3_SendClientSecondRound(sslSocket *ss); 6099 static SECStatus ssl3_SendClientSecondRound(sslSocket *ss);
(...skipping 4332 matching lines...) Expand 10 before | Expand all | Expand 10 after
10431 PORT_Free(ss->ssl3.hs.recvdFragments.buf); 10432 PORT_Free(ss->ssl3.hs.recvdFragments.buf);
10432 } 10433 }
10433 } 10434 }
10434 10435
10435 ss->ssl3.initialized = PR_FALSE; 10436 ss->ssl3.initialized = PR_FALSE;
10436 10437
10437 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE); 10438 SECITEM_FreeItem(&ss->ssl3.nextProto, PR_FALSE);
10438 } 10439 }
10439 10440
10440 /* End of ssl3con.c */ 10441 /* End of ssl3con.c */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698