Index: net/quic/core/crypto/quic_crypto_server_config.cc |
diff --git a/net/quic/core/crypto/quic_crypto_server_config.cc b/net/quic/core/crypto/quic_crypto_server_config.cc |
index 2c843a6161567a2bae47f6bad855c2a3a7dc40e8..8557271c2c762f0086c8eb096b07b2e85b9aab7b 100644 |
--- a/net/quic/core/crypto/quic_crypto_server_config.cc |
+++ b/net/quic/core/crypto/quic_crypto_server_config.cc |
@@ -1516,9 +1516,9 @@ void QuicCryptoServerConfig::BuildRejection( |
bool should_return_sct = |
params->sct_supported_by_client && enable_serving_sct_; |
const size_t sct_size = should_return_sct ? crypto_proof.cert_sct.size() : 0; |
- if (info.valid_source_address_token || |
- crypto_proof.signature.size() + compressed.size() + sct_size < |
- max_unverified_size) { |
+ const size_t total_size = |
+ crypto_proof.signature.size() + compressed.size() + sct_size; |
+ if (info.valid_source_address_token || total_size < max_unverified_size) { |
out->SetStringPiece(kCertificateTag, compressed); |
out->SetStringPiece(kPROF, crypto_proof.signature); |
if (should_return_sct) { |
@@ -1528,6 +1528,14 @@ void QuicCryptoServerConfig::BuildRejection( |
out->SetStringPiece(kCertificateSCTTag, crypto_proof.cert_sct); |
} |
} |
+ } else { |
+ if (FLAGS_quic_use_chlo_packet_size) { |
+ DLOG(WARNING) |
+ << "Sending inchoate REJ for hostname: " << info.sni |
+ << " signature: " << crypto_proof.signature.size() |
+ << " cert: " << compressed.size() << " sct:" << sct_size |
+ << " total: " << total_size << " max: " << max_unverified_size; |
+ } |
} |
} |