OLD | NEW |
---|---|
1 /* | 1 /* |
2 * vtables (and methods that call through them) for the 4 types of | 2 * vtables (and methods that call through them) for the 4 types of |
3 * SSLSockets supported. Only one type is still supported. | 3 * SSLSockets supported. Only one type is still supported. |
4 * Various other functions. | 4 * Various other functions. |
5 * | 5 * |
6 * ***** BEGIN LICENSE BLOCK ***** | 6 * ***** BEGIN LICENSE BLOCK ***** |
7 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 7 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
8 * | 8 * |
9 * The contents of this file are subject to the Mozilla Public License Version | 9 * The contents of this file are subject to the Mozilla Public License Version |
10 * 1.1 (the "License"); you may not use this file except in compliance with | 10 * 1.1 (the "License"); you may not use this file except in compliance with |
(...skipping 2885 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2896 } | 2896 } |
2897 if (!ssl_trace_iob) { | 2897 if (!ssl_trace_iob) { |
2898 ssl_trace_iob = stderr; | 2898 ssl_trace_iob = stderr; |
2899 } | 2899 } |
2900 #ifdef TRACE | 2900 #ifdef TRACE |
2901 ev = getenv("SSLTRACE"); | 2901 ev = getenv("SSLTRACE"); |
2902 if (ev && ev[0]) { | 2902 if (ev && ev[0]) { |
2903 ssl_trace = atoi(ev); | 2903 ssl_trace = atoi(ev); |
2904 SSL_TRACE(("SSL: tracing set to %d", ssl_trace)); | 2904 SSL_TRACE(("SSL: tracing set to %d", ssl_trace)); |
2905 } | 2905 } |
2906 #endif /* TRACE */ | |
2907 ev = getenv("SSLDEBUG"); | |
2908 if (ev && ev[0]) { | |
2909 ssl_debug = atoi(ev); | |
2910 SSL_TRACE(("SSL: debugging set to %d", ssl_debug)); | |
2911 } | |
2912 #endif /* DEBUG */ | |
2906 ev = getenv("SSLKEYLOGFILE"); | 2913 ev = getenv("SSLKEYLOGFILE"); |
2907 if (ev && ev[0]) { | 2914 if (ev && ev[0]) { |
2908 ssl_keylog_iob = fopen(ev, "a"); | 2915 ssl_keylog_iob = fopen(ev, "a"); |
2909 if (ftell(ssl_keylog_iob) == 0) { | 2916 if (ftell(ssl_keylog_iob) == 0) { |
2910 fputs("# pre-master secret log file, generated by NSS\n", | 2917 fputs("# pre-master secret log file, generated by NSS\n", |
wtc
2012/06/08 02:34:31
Should we update this comment? You are now loggin
agl
2012/06/11 19:16:35
updated in crrev.com/141456
| |
2911 ssl_keylog_iob); | 2918 ssl_keylog_iob); |
2912 } | 2919 } |
2913 SSL_TRACE(("SSL: logging pre-master secrets to %s", ev)); | 2920 SSL_TRACE(("SSL: logging pre-master secrets to %s", ev)); |
2914 } | 2921 } |
2915 #endif /* TRACE */ | |
2916 ev = getenv("SSLDEBUG"); | |
2917 if (ev && ev[0]) { | |
2918 ssl_debug = atoi(ev); | |
2919 SSL_TRACE(("SSL: debugging set to %d", ssl_debug)); | |
2920 } | |
2921 #endif /* DEBUG */ | |
2922 ev = getenv("SSLBYPASS"); | 2922 ev = getenv("SSLBYPASS"); |
2923 if (ev && ev[0]) { | 2923 if (ev && ev[0]) { |
2924 ssl_defaults.bypassPKCS11 = (ev[0] == '1'); | 2924 ssl_defaults.bypassPKCS11 = (ev[0] == '1'); |
2925 SSL_TRACE(("SSL: bypass default set to %d", \ | 2925 SSL_TRACE(("SSL: bypass default set to %d", \ |
2926 ssl_defaults.bypassPKCS11)); | 2926 ssl_defaults.bypassPKCS11)); |
2927 } | 2927 } |
2928 ev = getenv("SSLFORCELOCKS"); | 2928 ev = getenv("SSLFORCELOCKS"); |
2929 if (ev && ev[0] == '1') { | 2929 if (ev && ev[0] == '1') { |
2930 ssl_force_locks = PR_TRUE; | 2930 ssl_force_locks = PR_TRUE; |
2931 ssl_defaults.noLocks = 0; | 2931 ssl_defaults.noLocks = 0; |
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
3041 ssl_DestroySocketContents(ss); | 3041 ssl_DestroySocketContents(ss); |
3042 ssl_DestroyLocks(ss); | 3042 ssl_DestroyLocks(ss); |
3043 PORT_Free(ss); | 3043 PORT_Free(ss); |
3044 ss = NULL; | 3044 ss = NULL; |
3045 } | 3045 } |
3046 ss->protocolVariant = protocolVariant; | 3046 ss->protocolVariant = protocolVariant; |
3047 } | 3047 } |
3048 return ss; | 3048 return ss; |
3049 } | 3049 } |
3050 | 3050 |
OLD | NEW |