• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1diff -pu a/nss/lib/ssl/ssl.h b/nss/lib/ssl/ssl.h
2--- a/nss/lib/ssl/ssl.h	2014-01-17 17:52:46.715854283 -0800
3+++ b/nss/lib/ssl/ssl.h	2014-01-17 17:53:20.876422375 -0800
4@@ -997,6 +997,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegoti
5                                                       SSLExtensionType extId,
6                                                       PRBool *yes);
7
8+SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd,
9+                                                 PRBool *last_handshake_resumed);
10+
11 /*
12 ** How long should we wait before retransmitting the next flight of
13 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a
14diff -pu a/nss/lib/ssl/sslsock.c b/nss/lib/ssl/sslsock.c
15--- a/nss/lib/ssl/sslsock.c	2014-01-17 17:52:46.715854283 -0800
16+++ b/nss/lib/ssl/sslsock.c	2014-01-17 17:53:20.876422375 -0800
17@@ -1855,6 +1855,20 @@ SSL_PeerStapledOCSPResponses(PRFileDesc
18     return &ss->sec.ci.sid->peerCertStatus;
19 }
20
21+SECStatus
22+SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
23+    sslSocket *ss = ssl_FindSocket(fd);
24+
25+    if (!ss) {
26+	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
27+		 SSL_GETPID(), fd));
28+	return SECFailure;
29+    }
30+
31+    *handshake_resumed = ss->ssl3.hs.isResuming;
32+    return SECSuccess;
33+}
34+
35 /************************************************************************/
36 /* The following functions are the TOP LEVEL SSL functions.
37 ** They all get called through the NSPRIOMethods table below.
38