| Index: net/third_party/nss/ssl/ssl3ext.c
|
| diff --git a/net/third_party/nss/ssl/ssl3ext.c b/net/third_party/nss/ssl/ssl3ext.c
|
| index 8be042ed6a752f0fdaf1160112a2d5797ee4160b..cdebcc9a42abb46628289af280cef98efb13b9e9 100644
|
| --- a/net/third_party/nss/ssl/ssl3ext.c
|
| +++ b/net/third_party/nss/ssl/ssl3ext.c
|
| @@ -2322,7 +2322,7 @@ ssl3_CalculatePaddingExtensionLength(unsigned int clientHelloLength)
|
| /* ssl3_AppendPaddingExtension possibly adds an extension which ensures that a
|
| * ClientHello record is either < 256 bytes or is >= 512 bytes. This ensures
|
| * that we don't trigger bugs in F5 products. */
|
| -unsigned int
|
| +PRInt32
|
| ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen,
|
| PRUint32 maxBytes)
|
| {
|
| @@ -2337,7 +2337,7 @@ ssl3_AppendPaddingExtension(sslSocket *ss, unsigned int extensionLen,
|
| extensionLen > maxBytes ||
|
| paddingLen > sizeof(padding)) {
|
| PORT_Assert(0);
|
| - return 0;
|
| + return -1;
|
| }
|
|
|
| if (SECSuccess != ssl3_AppendHandshakeNumber(ss, ssl_padding_xtn, 2))
|
|
|