summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authormckev@amazon.com <mckev@amazon.com@0039d316-1c4b-4281-b951-d872f2087c98>2013-11-28 05:18:02 +0000
committermckev@amazon.com <mckev@amazon.com@0039d316-1c4b-4281-b951-d872f2087c98>2013-11-28 05:18:02 +0000
commit63e468645ea8c3f6fd8d5bc0af3b77b11736b5e7 (patch)
treec9dae5f752d64f2cc16741794fbacee306c9b312 /net
parentdaf5dde94d5b27b07ed531fa33923c636759de0e (diff)
downloadchromium_src-63e468645ea8c3f6fd8d5bc0af3b77b11736b5e7.zip
chromium_src-63e468645ea8c3f6fd8d5bc0af3b77b11736b5e7.tar.gz
chromium_src-63e468645ea8c3f6fd8d5bc0af3b77b11736b5e7.tar.bz2
Allow close_notify during the SSL handshake to trigger TLS fallback on Android
R=wtc@chromium.org BUG=308650 TEST=Visit https://www.auroragov.org and observe that it loads. Review URL: https://codereview.chromium.org/81413002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@237678 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/socket/ssl_client_socket_openssl.cc3
1 files changed, 3 insertions, 0 deletions
diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
index 549f4ed..ab021e7 100644
--- a/net/socket/ssl_client_socket_openssl.cc
+++ b/net/socket/ssl_client_socket_openssl.cc
@@ -163,6 +163,9 @@ int MapOpenSSLErrorSSL() {
case SSL_R_INVALID_TICKET_KEYS_LENGTH:
case SSL_R_KEY_ARG_TOO_LONG:
case SSL_R_READ_WRONG_PACKET_TYPE:
+ // SSL_do_handshake reports this error when the server responds to a
+ // ClientHello with a fatal close_notify alert.
+ case SSL_AD_REASON_OFFSET + SSL_AD_CLOSE_NOTIFY:
case SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE:
// TODO(joth): SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE may be returned from the
// server after receiving ClientHello if there's no common supported cipher.