| Index: patches/jsse.patch
 | 
| ===================================================================
 | 
| --- patches/jsse.patch	(revision 156279)
 | 
| +++ patches/jsse.patch	(working copy)
 | 
| @@ -10,14 +10,6 @@
 | 
|   	/* Default generate session ID callback. */
 | 
|   	GEN_SESSION_CB generate_session_id;
 | 
|   
 | 
| -@@ -1546,6 +1549,7 @@ const SSL_CIPHER *SSL_get_current_cipher
 | 
| - int	SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits);
 | 
| - char *	SSL_CIPHER_get_version(const SSL_CIPHER *c);
 | 
| - const char *	SSL_CIPHER_get_name(const SSL_CIPHER *c);
 | 
| -+const char *	SSL_CIPHER_authentication_method(const SSL_CIPHER *c);
 | 
| - 
 | 
| - int	SSL_get_fd(const SSL *s);
 | 
| - int	SSL_get_rfd(const SSL *s);
 | 
|  @@ -1554,6 +1558,7 @@ const char  * SSL_get_cipher_list(const 
 | 
|   char *	SSL_get_shared_ciphers(const SSL *s, char *buf, int len);
 | 
|   int	SSL_get_read_ahead(const SSL * s);
 | 
| @@ -48,9 +40,9 @@
 | 
|   const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s,
 | 
|   					unsigned int *len);
 | 
|  +const char *	SSL_SESSION_get_version(const SSL_SESSION *s);
 | 
| + unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *s);
 | 
|   #ifndef OPENSSL_NO_FP_API
 | 
|   int	SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses);
 | 
| - #endif
 | 
|  @@ -1624,6 +1633,7 @@ int	SSL_SESSION_print(BIO *fp,const SSL_
 | 
|   void	SSL_SESSION_free(SSL_SESSION *ses);
 | 
|   int	i2d_SSL_SESSION(SSL_SESSION *in,unsigned char **pp);
 | 
| @@ -296,13 +288,19 @@
 | 
|   /* works well for SSLv2, not so good for SSLv3 */
 | 
|   char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len)
 | 
|   	{
 | 
| -@@ -2551,18 +2578,45 @@ SSL_METHOD *ssl_bad_method(int ver)
 | 
| +@@ -2551,22 +2578,45 @@ SSL_METHOD *ssl_bad_method(int ver)
 | 
|   	return(NULL);
 | 
|   	}
 | 
|   
 | 
|  -const char *SSL_get_version(const SSL *s)
 | 
|  +static const char *ssl_get_version(int version)
 | 
|   	{
 | 
| +-	if (s->version == TLS1_2_VERSION)
 | 
| ++	if (version == TLS1_2_VERSION)
 | 
| + 		return("TLSv1.2");
 | 
| +-	else if (s->version == TLS1_1_VERSION)
 | 
| ++	else if (version == TLS1_1_VERSION)
 | 
| + 		return("TLSv1.1");
 | 
|  -	if (s->version == TLS1_VERSION)
 | 
|  +	if (version == TLS1_VERSION)
 | 
|   		return("TLSv1");
 | 
| @@ -334,12 +332,8 @@
 | 
|  +		{
 | 
|  +	case SSL2_VERSION:
 | 
|  +		return SSL_TXT_RSA;
 | 
| -+	case SSL3_VERSION:
 | 
| -+	case TLS1_VERSION:
 | 
| -+	case DTLS1_VERSION:
 | 
| -+		return SSL_CIPHER_authentication_method(ssl->s3->tmp.new_cipher);
 | 
|  +	default:
 | 
| -+		return "UNKNOWN";
 | 
| ++		return SSL_CIPHER_authentication_method(ssl->s3->tmp.new_cipher);
 | 
|  +		}
 | 
|  +	}
 | 
|  +
 | 
| 
 |