| Index: net/third_party/nss/ssl/sslsock.c
|
| diff --git a/net/third_party/nss/ssl/sslsock.c b/net/third_party/nss/ssl/sslsock.c
|
| index 596ca3d8e1ab0f69790bf8be05607029ec045bcb..eae62bf6010003f4f9d7f64d4f5fb852ca56eb23 100644
|
| --- a/net/third_party/nss/ssl/sslsock.c
|
| +++ b/net/third_party/nss/ssl/sslsock.c
|
| @@ -1615,6 +1615,20 @@ SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
|
| return SECSuccess;
|
| }
|
|
|
| +const SECItem *
|
| +SSL_GetRequestedClientCertificateTypes(PRFileDesc *fd)
|
| +{
|
| + sslSocket *ss = ssl_FindSocket(fd);
|
| +
|
| + if (!ss) {
|
| + SSL_DBG(("%d: SSL[%d]: bad socket in "
|
| + "SSL_GetRequestedClientCertificateTypes", SSL_GETPID(), fd));
|
| + return NULL;
|
| + }
|
| +
|
| + return ss->requestedCertTypes;
|
| +}
|
| +
|
| /************************************************************************/
|
| /* The following functions are the TOP LEVEL SSL functions.
|
| ** They all get called through the NSPRIOMethods table below.
|
| @@ -2599,6 +2613,7 @@ ssl_NewSocket(PRBool makeLocks)
|
| sc->serverKeyPair = NULL;
|
| sc->serverKeyBits = 0;
|
| }
|
| + ss->requestedCertTypes = NULL;
|
| ss->stepDownKeyPair = NULL;
|
| ss->dbHandle = CERT_GetDefaultCertDB();
|
|
|
| @@ -2639,4 +2654,3 @@ loser:
|
| }
|
| return ss;
|
| }
|
| -
|
|
|