OLD | NEW |
| (Empty) |
1 diff -pu a/nss/lib/ssl/sslreveal.c b/nss/lib/ssl/sslreveal.c | |
2 --- a/nss/lib/ssl/sslreveal.c 2013-07-31 12:07:10.974699609 -0700 | |
3 +++ b/nss/lib/ssl/sslreveal.c 2013-07-31 12:41:08.684380521 -0700 | |
4 @@ -77,7 +77,6 @@ SSL_HandshakeNegotiatedExtension(PRFileD | |
5 { | |
6 /* some decisions derived from SSL_GetChannelInfo */ | |
7 sslSocket * sslsocket = NULL; | |
8 - PRBool enoughFirstHsDone = PR_FALSE; | |
9 | |
10 if (!pYes) { | |
11 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
12 @@ -93,14 +92,8 @@ SSL_HandshakeNegotiatedExtension(PRFileD | |
13 | |
14 *pYes = PR_FALSE; | |
15 | |
16 - if (sslsocket->firstHsDone) { | |
17 - enoughFirstHsDone = PR_TRUE; | |
18 - } else if (sslsocket->ssl3.initialized && ssl3_CanFalseStart(sslsocket)) { | |
19 - enoughFirstHsDone = PR_TRUE; | |
20 - } | |
21 - | |
22 /* according to public API SSL_GetChannelInfo, this doesn't need a lock */ | |
23 - if (sslsocket->opt.useSecurity && enoughFirstHsDone) { | |
24 + if (sslsocket->opt.useSecurity) { | |
25 if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */ | |
26 /* now we know this socket went through ssl3_InitState() and | |
27 * ss->xtnData got initialized, which is the only member accessed by | |
OLD | NEW |