OLD | NEW |
(Empty) | |
| 1 diff --git a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3con
.c |
| 2 index 5476fa5..1465558 100644 |
| 3 --- a/net/third_party/nss/ssl/ssl3con.c |
| 4 +++ b/net/third_party/nss/ssl/ssl3con.c |
| 5 @@ -6108,6 +6108,10 @@ ssl3_CanFalseStart(sslSocket *ss) { |
| 6 rv = ss->opt.enableFalseStart && |
| 7 !ss->sec.isServer && |
| 8 !ss->ssl3.hs.isResuming && |
| 9 + /* This check for NPN is performed here because we can't call |
| 10 + * SSL_HandshakeNegotiatedExtension in the auth callback because of |
| 11 + * lock ordering issues. See crbug.com/125299 */ |
| 12 + ssl3_ExtensionNegotiated(ss, ssl_next_proto_nego_xtn) && |
| 13 ss->ssl3.cwSpec && |
| 14 |
| 15 /* An attacker can control the selected ciphersuite so we only wish to |
OLD | NEW |