| Index: net/third_party/nss/patches/getrequestedclientcerttypes.patch
|
| ===================================================================
|
| --- net/third_party/nss/patches/getrequestedclientcerttypes.patch (revision 242942)
|
| +++ net/third_party/nss/patches/getrequestedclientcerttypes.patch (working copy)
|
| @@ -1,7 +1,7 @@
|
| diff -pu a/nss/lib/ssl/ssl3con.c b/nss/lib/ssl/ssl3con.c
|
| ---- a/nss/lib/ssl/ssl3con.c 2013-07-31 12:40:14.493586151 -0700
|
| -+++ b/nss/lib/ssl/ssl3con.c 2013-07-31 12:42:42.035748760 -0700
|
| -@@ -6544,6 +6544,9 @@ ssl3_HandleCertificateRequest(sslSocket
|
| +--- a/nss/lib/ssl/ssl3con.c 2014-01-03 19:31:09.783859095 -0800
|
| ++++ b/nss/lib/ssl/ssl3con.c 2014-01-03 19:31:49.664511081 -0800
|
| +@@ -6962,6 +6962,9 @@ ssl3_HandleCertificateRequest(sslSocket
|
| if (rv != SECSuccess)
|
| goto loser; /* malformed, alert has been sent */
|
|
|
| @@ -11,7 +11,7 @@
|
| if (isTLS12) {
|
| rv = ssl3_ConsumeHandshakeVariable(ss, &algorithms, 2, &b, &length);
|
| if (rv != SECSuccess)
|
| -@@ -6743,6 +6746,7 @@ loser:
|
| +@@ -7163,6 +7166,7 @@ loser:
|
| PORT_SetError(errCode);
|
| rv = SECFailure;
|
| done:
|
| @@ -20,9 +20,9 @@
|
| PORT_FreeArena(arena, PR_FALSE);
|
| #ifdef NSS_PLATFORM_CLIENT_AUTH
|
| diff -pu a/nss/lib/ssl/ssl.h b/nss/lib/ssl/ssl.h
|
| ---- a/nss/lib/ssl/ssl.h 2013-07-31 12:40:53.784162112 -0700
|
| -+++ b/nss/lib/ssl/ssl.h 2013-07-31 12:41:57.515096255 -0700
|
| -@@ -732,6 +732,16 @@ SSL_IMPORT SECStatus SSL_ReHandshakeWith
|
| +--- a/nss/lib/ssl/ssl.h 2014-01-03 19:31:36.454295113 -0800
|
| ++++ b/nss/lib/ssl/ssl.h 2014-01-03 19:31:49.664511081 -0800
|
| +@@ -763,6 +763,16 @@ SSL_IMPORT SECStatus SSL_ReHandshakeWith
|
| PRBool flushCache,
|
| PRIntervalTime timeout);
|
|
|
| @@ -40,9 +40,9 @@
|
| #ifdef SSL_DEPRECATED_FUNCTION
|
| /* deprecated!
|
| diff -pu a/nss/lib/ssl/sslimpl.h b/nss/lib/ssl/sslimpl.h
|
| ---- a/nss/lib/ssl/sslimpl.h 2013-07-31 12:40:14.503586299 -0700
|
| -+++ b/nss/lib/ssl/sslimpl.h 2013-07-31 12:41:57.515096255 -0700
|
| -@@ -1168,6 +1168,10 @@ struct sslSocketStr {
|
| +--- a/nss/lib/ssl/sslimpl.h 2014-01-03 19:31:09.783859095 -0800
|
| ++++ b/nss/lib/ssl/sslimpl.h 2014-01-03 19:31:49.684511406 -0800
|
| +@@ -1220,6 +1220,10 @@ struct sslSocketStr {
|
| unsigned int sizeCipherSpecs;
|
| const unsigned char * preferredCipher;
|
|
|
| @@ -54,9 +54,9 @@
|
|
|
| /* Callbacks */
|
| diff -pu a/nss/lib/ssl/sslsock.c b/nss/lib/ssl/sslsock.c
|
| ---- a/nss/lib/ssl/sslsock.c 2013-07-31 12:40:53.784162112 -0700
|
| -+++ b/nss/lib/ssl/sslsock.c 2013-07-31 12:41:57.515096255 -0700
|
| -@@ -1933,6 +1933,20 @@ SSL_HandshakeResumedSession(PRFileDesc *
|
| +--- a/nss/lib/ssl/sslsock.c 2014-01-03 19:31:36.454295113 -0800
|
| ++++ b/nss/lib/ssl/sslsock.c 2014-01-03 19:31:49.704511734 -0800
|
| +@@ -1847,6 +1847,20 @@ SSL_HandshakeResumedSession(PRFileDesc *
|
| return SECSuccess;
|
| }
|
|
|
| @@ -77,7 +77,7 @@
|
| /************************************************************************/
|
| /* The following functions are the TOP LEVEL SSL functions.
|
| ** They all get called through the NSPRIOMethods table below.
|
| -@@ -2995,6 +3009,7 @@ ssl_NewSocket(PRBool makeLocks, SSLProto
|
| +@@ -2914,6 +2928,7 @@ ssl_NewSocket(PRBool makeLocks, SSLProto
|
| sc->serverKeyBits = 0;
|
| ss->certStatusArray[i] = NULL;
|
| }
|
|
|