OLD | NEW |
| (Empty) |
1 diff --git a/lib/ssl/ssl.h b/lib/ssl/ssl.h | |
2 index 3974ee8..e905aab 100644 | |
3 --- a/lib/ssl/ssl.h | |
4 +++ b/lib/ssl/ssl.h | |
5 @@ -1123,6 +1123,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFi
leDesc *socket, | |
6 SSLExtensionType extId, | |
7 PRBool *yes); | |
8 | |
9 +SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, | |
10 + PRBool *last_handshake_resumed
); | |
11 + | |
12 /* | |
13 ** How long should we wait before retransmitting the next flight of | |
14 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a | |
15 diff --git a/lib/ssl/sslsock.c b/lib/ssl/sslsock.c | |
16 index cc15406..601df2a 100644 | |
17 --- a/lib/ssl/sslsock.c | |
18 +++ b/lib/ssl/sslsock.c | |
19 @@ -2481,6 +2481,21 @@ SSL_PeerStapledOCSPResponses(PRFileDesc *fd) | |
20 return &ss->sec.ci.sid->peerCertStatus; | |
21 } | |
22 | |
23 +SECStatus | |
24 +SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) | |
25 +{ | |
26 + sslSocket *ss = ssl_FindSocket(fd); | |
27 + | |
28 + if (!ss) { | |
29 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession", | |
30 + SSL_GETPID(), fd)); | |
31 + return SECFailure; | |
32 + } | |
33 + | |
34 + *handshake_resumed = ss->ssl3.hs.isResuming; | |
35 + return SECSuccess; | |
36 +} | |
37 + | |
38 /************************************************************************/ | |
39 /* The following functions are the TOP LEVEL SSL functions. | |
40 ** They all get called through the NSPRIOMethods table below. | |
OLD | NEW |