Index: net/third_party/nss/ssl/ssl3ext.c |
diff --git a/net/third_party/nss/ssl/ssl3ext.c b/net/third_party/nss/ssl/ssl3ext.c |
index 8be042ed6a752f0fdaf1160112a2d5797ee4160b..cdebcc9a42abb46628289af280cef98efb13b9e9 100644 |
--- a/net/third_party/nss/ssl/ssl3ext.c |
+++ b/net/third_party/nss/ssl/ssl3ext.c |
@@ -2322,7 +2322,7 @@ ssl3_CalculatePaddingExtensionLength(unsigned int clientHelloLength) |
/* ssl3_AppendPaddingExtension possibly adds an extension which ensures that a |
* ClientHello record is either < 256 bytes or is >= 512 bytes. This ensures |
* that we don't trigger bugs in F5 products. */ |
-unsigned int |
+PRInt32 |
ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen, |
PRUint32 maxBytes) |
{ |
@@ -2337,7 +2337,7 @@ ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen, |
extensionLen > maxBytes || |
paddingLen > sizeof(padding)) { |
PORT_Assert(0); |
- return 0; |
+ return -1; |
} |
if (SECSuccess != ssl3_AppendHandshakeNumber(ss, ssl_padding_xtn, 2)) |