diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-07-07 22:10:06 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-07-07 22:10:06 +0000 |
commit | ef21c83524b111067f2d8b175d034fd08a51583a (patch) | |
tree | a821c67de1fe830576887b5c962130deedf3ac7d /net/socket/ssl_client_socket_unittest.cc | |
parent | 793d3a3c7137f9df125322b9c7b342000cc4ad52 (diff) | |
download | chromium_src-ef21c83524b111067f2d8b175d034fd08a51583a.zip chromium_src-ef21c83524b111067f2d8b175d034fd08a51583a.tar.gz chromium_src-ef21c83524b111067f2d8b175d034fd08a51583a.tar.bz2 |
net: Precede each CBC encrypted application data record with an empty one.
Precede each CBC encrypted application data record with an empty
application data record in order to randomize the IV in a backwards
compatible manner.
(This is a reland of r90632 which was reverted in r90643 because it tickled a
bug in remoting unittests.)
http://codereview.chromium.org/7239002
BUG=87159
TEST=HTTPS sites continue to work.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@91768 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_client_socket_unittest.cc')
-rw-r--r-- | net/socket/ssl_client_socket_unittest.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc index 49c9191..9946c90 100644 --- a/net/socket/ssl_client_socket_unittest.cc +++ b/net/socket/ssl_client_socket_unittest.cc @@ -396,7 +396,7 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) { // memio circular buffer (4k bytes) in SSLClientSocketNSS to wrap around. // This tests the fix for http://crbug.com/29815. std::string request_text = "GET / HTTP/1.1\r\nUser-Agent: long browser name "; - for (int i = 0; i < 3800; ++i) + for (int i = 0; i < 3768; ++i) request_text.push_back('*'); request_text.append("\r\n\r\n"); scoped_refptr<net::IOBuffer> request_buffer( |