DescriptionDon't resend payload after Snap Start misprediction.
The Snap Start code in NSS worked like the prototype implementation in
tlsclient. This had the library take care of resending the application
data in the event of a mispredict. However, that was safe because it did
certificate verification as the message was received.
However, in Chrome, it's possible that a mispredict could be triggered by
the server having a different certificate and NSS would resend the
application data before Chrome verified the certificate.
This change removes that behaviour from NSS and makes the retransmission
the job of ssl_client_socket_nss.cc.
BUG=none
TEST=none
Patch Set 1 #Patch Set 2 : ... #
Total comments: 8
Patch Set 3 : ... #
Total comments: 1
Messages
Total messages: 5 (0 generated)
|