| Index: net/third_party/nss/ssl/sslsecur.c
|
| ===================================================================
|
| --- net/third_party/nss/ssl/sslsecur.c (revision 242942)
|
| +++ net/third_party/nss/ssl/sslsecur.c (working copy)
|
| @@ -277,7 +277,7 @@
|
|
|
| /* SSL v2 protocol does not support subsequent handshakes. */
|
| if (ss->version < SSL_LIBRARY_VERSION_3_0) {
|
| - PORT_SetError(SEC_ERROR_INVALID_ARGS);
|
| + PORT_SetError(SSL_ERROR_FEATURE_NOT_SUPPORTED_FOR_SSL2);
|
| rv = SECFailure;
|
| } else {
|
| ssl_GetSSL3HandshakeLock(ss);
|
| @@ -1237,7 +1237,6 @@
|
| ssl_SecureSend(sslSocket *ss, const unsigned char *buf, int len, int flags)
|
| {
|
| int rv = 0;
|
| - PRBool falseStart = PR_FALSE;
|
|
|
| SSL_TRC(2, ("%d: SSL[%d]: SecureSend: sending %d bytes",
|
| SSL_GETPID(), ss->fd, len));
|
| @@ -1272,6 +1271,7 @@
|
| ss->writerThread = PR_GetCurrentThread();
|
| /* If any of these is non-zero, the initial handshake is not done. */
|
| if (!ss->firstHsDone) {
|
| + PRBool falseStart = PR_FALSE;
|
| ssl_Get1stHandshakeLock(ss);
|
| if (ss->opt.enableFalseStart &&
|
| ss->version >= SSL_LIBRARY_VERSION_3_0) {
|
| @@ -1398,10 +1398,6 @@
|
| SECStatus
|
| SSL_SetTrustAnchors(PRFileDesc *fd, CERTCertList *certList)
|
| {
|
| - PORT_SetError(PR_NOT_IMPLEMENTED_ERROR);
|
| - PR_NOT_REACHED("not implemented");
|
| - return SECFailure;
|
| -#if 0
|
| sslSocket * ss = ssl_FindSocket(fd);
|
| CERTDistNames *names = NULL;
|
|
|
| @@ -1429,7 +1425,6 @@
|
| ssl_Release1stHandshakeLock(ss);
|
|
|
| return SECSuccess;
|
| -#endif
|
| }
|
|
|
| /*
|
|
|