Add explicit |forceOnlineSignin| to user pod status
[chromium-blink-merge.git] / net / third_party / nss / patches / didhandshakeresume.patch
blob74bba106f56cc322c96bd0f9d224b63bb16a6a67
1 diff -pu a/nss/lib/ssl/ssl.h b/nss/lib/ssl/ssl.h
2 --- a/nss/lib/ssl/ssl.h 2014-01-03 19:31:09.783859095 -0800
3 +++ b/nss/lib/ssl/ssl.h 2014-01-03 19:31:19.214013263 -0800
4 @@ -967,6 +967,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegoti
5 SSLExtensionType extId,
6 PRBool *yes);
8 +SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd,
9 + PRBool *last_handshake_resumed);
12 ** How long should we wait before retransmitting the next flight of
13 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a
14 diff -pu a/nss/lib/ssl/sslsock.c b/nss/lib/ssl/sslsock.c
15 --- a/nss/lib/ssl/sslsock.c 2014-01-03 19:31:09.783859095 -0800
16 +++ b/nss/lib/ssl/sslsock.c 2014-01-03 19:31:19.214013263 -0800
17 @@ -1833,6 +1833,20 @@ SSL_PeerStapledOCSPResponses(PRFileDesc
18 return &ss->sec.ci.sid->peerCertStatus;
21 +SECStatus
22 +SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
23 + sslSocket *ss = ssl_FindSocket(fd);
25 + if (!ss) {
26 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
27 + SSL_GETPID(), fd));
28 + return SECFailure;
29 + }
31 + *handshake_resumed = ss->ssl3.hs.isResuming;
32 + return SECSuccess;
35 /************************************************************************/
36 /* The following functions are the TOP LEVEL SSL functions.
37 ** They all get called through the NSPRIOMethods table below.