1 diff -pu a/nss/lib/ssl/ssl.h b/nss/lib/ssl/ssl.h
2 --- a/nss/lib/ssl/ssl.h 2014-01-03 19:31:09.783859095 -0800
3 +++ b/nss/lib/ssl/ssl.h 2014-01-03 19:31:19.214013263 -0800
4 @@ -967,6 +967,9 @@ SSL_IMPORT SECStatus SSL_HandshakeNegoti
5 SSLExtensionType extId,
8 +SSL_IMPORT SECStatus SSL_HandshakeResumedSession(PRFileDesc *fd,
9 + PRBool *last_handshake_resumed);
12 ** How long should we wait before retransmitting the next flight of
13 ** the DTLS handshake? Returns SECFailure if not DTLS or not in a
14 diff -pu a/nss/lib/ssl/sslsock.c b/nss/lib/ssl/sslsock.c
15 --- a/nss/lib/ssl/sslsock.c 2014-01-03 19:31:09.783859095 -0800
16 +++ b/nss/lib/ssl/sslsock.c 2014-01-03 19:31:19.214013263 -0800
17 @@ -1833,6 +1833,20 @@ SSL_PeerStapledOCSPResponses(PRFileDesc
18 return &ss->sec.ci.sid->peerCertStatus;
22 +SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
23 + sslSocket *ss = ssl_FindSocket(fd);
26 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
31 + *handshake_resumed = ss->ssl3.hs.isResuming;
35 /************************************************************************/
36 /* The following functions are the TOP LEVEL SSL functions.
37 ** They all get called through the NSPRIOMethods table below.