Home | History | Annotate | Download | only in patches
      1 diff -pu a/nss/lib/ssl/sslreveal.c b/nss/lib/ssl/sslreveal.c
      2 --- a/nss/lib/ssl/sslreveal.c	2013-07-31 12:07:10.974699609 -0700
      3 +++ b/nss/lib/ssl/sslreveal.c	2013-07-31 12:41:08.684380521 -0700
      4 @@ -77,7 +77,6 @@ SSL_HandshakeNegotiatedExtension(PRFileD
      5  {
      6    /* some decisions derived from SSL_GetChannelInfo */
      7    sslSocket * sslsocket = NULL;
      8 -  PRBool enoughFirstHsDone = PR_FALSE;
      9  
     10    if (!pYes) {
     11      PORT_SetError(SEC_ERROR_INVALID_ARGS);
     12 @@ -93,14 +92,8 @@ SSL_HandshakeNegotiatedExtension(PRFileD
     13  
     14    *pYes = PR_FALSE;
     15  
     16 -  if (sslsocket->firstHsDone) {
     17 -    enoughFirstHsDone = PR_TRUE;
     18 -  } else if (sslsocket->ssl3.initialized && ssl3_CanFalseStart(sslsocket)) {
     19 -    enoughFirstHsDone = PR_TRUE;
     20 -  }
     21 -
     22    /* according to public API SSL_GetChannelInfo, this doesn't need a lock */
     23 -  if (sslsocket->opt.useSecurity && enoughFirstHsDone) {
     24 +  if (sslsocket->opt.useSecurity) {
     25      if (sslsocket->ssl3.initialized) { /* SSL3 and TLS */
     26        /* now we know this socket went through ssl3_InitState() and
     27         * ss->xtnData got initialized, which is the only member accessed by
     28