1diff -pu a/nss/lib/ssl/ssl.h b/nss/lib/ssl/ssl.h 2--- a/nss/lib/ssl/ssl.h 2013-07-31 12:40:14.503586299 -0700 3+++ b/nss/lib/ssl/ssl.h 2013-07-31 12:40:37.913929474 -0700 4@@ -940,6 +940,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegoti 5 SSLExtensionType extId, 6 PRBool *yes); 7 8+SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd, 9+ PRBool *last_handshake_resumed); 10+ 11 /* 12 ** How long should we wait before retransmitting the next flight of 13 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a 14diff -pu a/nss/lib/ssl/sslsock.c b/nss/lib/ssl/sslsock.c 15--- a/nss/lib/ssl/sslsock.c 2013-07-31 12:40:14.503586299 -0700 16+++ b/nss/lib/ssl/sslsock.c 2013-07-31 12:40:37.913929474 -0700 17@@ -1919,6 +1919,20 @@ SSL_PeerStapledOCSPResponses(PRFileDesc 18 return &ss->sec.ci.sid->peerCertStatus; 19 } 20 21+SECStatus 22+SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) { 23+ sslSocket *ss = ssl_FindSocket(fd); 24+ 25+ if (!ss) { 26+ SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession", 27+ SSL_GETPID(), fd)); 28+ return SECFailure; 29+ } 30+ 31+ *handshake_resumed = ss->ssl3.hs.isResuming; 32+ return SECSuccess; 33+} 34+ 35 /************************************************************************/ 36 /* The following functions are the TOP LEVEL SSL functions. 37 ** They all get called through the NSPRIOMethods table below. 38