| OLD | NEW |
| (Empty) |
| 1 diff -pu a/nss/lib/ssl/sslreveal.c b/nss/lib/ssl/sslreveal.c | |
| 2 --- a/nss/lib/ssl/sslreveal.c 2013-07-31 12:07:10.974699609 -0700 | |
| 3 +++ b/nss/lib/ssl/sslreveal.c 2013-07-31 12:41:08.684380521 -0700 | |
| 4 @@ -77,7 +77,6 @@ SSL_HandshakeNegotiatedExtension(PRFileD | |
| 5 { | |
| 6 /* some decisions derived from SSL_GetChannelInfo */ | |
| 7 sslSocket * sslsocket = NULL; | |
| 8 - PRBool enoughFirstHsDone = PR_FALSE; | |
| 9 | |
| 10 if (!pYes) { | |
| 11 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 12 @@ -93,14 +92,8 @@ SSL_HandshakeNegotiatedExtension(PRFileD | |
| 13 | |
| 14 *pYes = PR_FALSE; | |
| 15 | |
| 16 - if (sslsocket->firstHsDone) { | |
| 17 - enoughFirstHsDone = PR_TRUE; | |
| 18 - } else if (sslsocket->ssl3.initialized && ssl3_CanFalseStart(sslsocket)) { | |
| 19 - enoughFirstHsDone = PR_TRUE; | |
| 20 - } | |
| 21 - | |
| 22 /* according to public API SSL_GetChannelInfo, this doesn't need a lock */ | |
| 23 - if (sslsocket->opt.useSecurity && enoughFirstHsDone) { | |
| 24 + if (sslsocket->opt.useSecurity) { | |
| 25 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */ | |
| 26 /* now we know this socket went through ssl3_InitState() and | |
| 27 * ss->xtnData got initialized, which is the only member accessed by | |
| OLD | NEW |