| Index: net/third_party/nss/patches/didhandshakeresume.patch
|
| diff --git a/net/third_party/nss/patches/didhandshakeresume.patch b/net/third_party/nss/patches/didhandshakeresume.patch
|
| index bceeae1d8e6f7ad870edec26ca9da87c3c04c32c..8acb6e718ad92a1177fd2fb1eea1fad3ab97c302 100644
|
| --- a/net/third_party/nss/patches/didhandshakeresume.patch
|
| +++ b/net/third_party/nss/patches/didhandshakeresume.patch
|
| @@ -1,8 +1,8 @@
|
| diff --git a/lib/ssl/ssl.h b/lib/ssl/ssl.h
|
| -index 48fa018..0983b5f 100644
|
| +index 3974ee8..e905aab 100644
|
| --- a/lib/ssl/ssl.h
|
| +++ b/lib/ssl/ssl.h
|
| -@@ -1117,6 +1117,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket,
|
| +@@ -1123,6 +1123,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc *socket,
|
| SSLExtensionType extId,
|
| PRBool *yes);
|
|
|
| @@ -13,21 +13,22 @@ index 48fa018..0983b5f 100644
|
| ** How long should we wait before retransmitting the next flight of
|
| ** the DTLS handshake? Returns SECFailure if not DTLS or not in a
|
| diff --git a/lib/ssl/sslsock.c b/lib/ssl/sslsock.c
|
| -index 21754d6..b73f8f6 100644
|
| +index cc15406..601df2a 100644
|
| --- a/lib/ssl/sslsock.c
|
| +++ b/lib/ssl/sslsock.c
|
| -@@ -2151,6 +2151,20 @@ SSL_PeerStapledOCSPResponses(PRFileDesc *fd)
|
| +@@ -2481,6 +2481,21 @@ SSL_PeerStapledOCSPResponses(PRFileDesc *fd)
|
| return &ss->sec.ci.sid->peerCertStatus;
|
| }
|
|
|
| +SECStatus
|
| -+SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
|
| ++SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed)
|
| ++{
|
| + sslSocket *ss = ssl_FindSocket(fd);
|
| +
|
| + if (!ss) {
|
| -+ SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
|
| -+ SSL_GETPID(), fd));
|
| -+ return SECFailure;
|
| ++ SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
|
| ++ SSL_GETPID(), fd));
|
| ++ return SECFailure;
|
| + }
|
| +
|
| + *handshake_resumed = ss->ssl3.hs.isResuming;
|
|
|