Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1124)

Side by Side Diff: net/third_party/nss/ssl/derive.c

Issue 9764001: Add DTLS support to NSS, contributed by Eric Rescorla. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 8 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * Key Derivation that doesn't use PKCS11 2 * Key Derivation that doesn't use PKCS11
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 565 matching lines...) Expand 10 before | Expand all | Expand 10 after
576 * specified cert make sure the extract operation is attempted from the slot 576 * specified cert make sure the extract operation is attempted from the slot
577 * where the private key resides. 577 * where the private key resides.
578 * If MS can be extracted for all ciphers, (*pcanbypass) is set to TRUE and 578 * If MS can be extracted for all ciphers, (*pcanbypass) is set to TRUE and
579 * SECSuccess is returned. In all other cases but one (*pcanbypass) is 579 * SECSuccess is returned. In all other cases but one (*pcanbypass) is
580 * set to FALSE and SECFailure is returned. 580 * set to FALSE and SECFailure is returned.
581 * In that last case Derive() has been called successfully but the MS is null, 581 * In that last case Derive() has been called successfully but the MS is null,
582 * CanBypass sets (*pcanbypass) to FALSE and returns SECSuccess indicating the 582 * CanBypass sets (*pcanbypass) to FALSE and returns SECSuccess indicating the
583 * arguments were all valid but the slot cannot be bypassed. 583 * arguments were all valid but the slot cannot be bypassed.
584 */ 584 */
585 585
586 /*
587 * TODO: Add a TLS 1.1 mask here
588 */
589
586 SECStatus 590 SECStatus
587 SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey, 591 SSL_CanBypass(CERTCertificate *cert, SECKEYPrivateKey *srvPrivkey,
588 PRUint32 protocolmask, PRUint16 *ciphersuites, int nsuites, 592 PRUint32 protocolmask, PRUint16 *ciphersuites, int nsuites,
589 PRBool *pcanbypass, void *pwArg) 593 PRBool *pcanbypass, void *pwArg)
590 { SECStatus rv; 594 { SECStatus rv;
591 int i; 595 int i;
592 PRUint16 suite; 596 PRUint16 suite;
593 PK11SymKey * pms = NULL; 597 PK11SymKey * pms = NULL;
594 SECKEYPublicKey * srvPubkey = NULL; 598 SECKEYPublicKey * srvPubkey = NULL;
595 KeyType privKeytype; 599 KeyType privKeytype;
(...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after
872 876
873 if (srvPubkey) { 877 if (srvPubkey) {
874 SECKEY_DestroyPublicKey(srvPubkey); 878 SECKEY_DestroyPublicKey(srvPubkey);
875 srvPubkey = NULL; 879 srvPubkey = NULL;
876 } 880 }
877 881
878 882
879 return rv; 883 return rv;
880 } 884 }
881 885
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698