summaryrefslogtreecommitdiffstats
path: root/net/socket
diff options
context:
space:
mode:
Diffstat (limited to 'net/socket')
-rw-r--r--net/socket/ssl_client_socket_unittest.cc2
-rw-r--r--net/socket/ssl_client_socket_win.cc6
2 files changed, 6 insertions, 2 deletions
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
index 7b297f8..5c036b3 100644
--- a/net/socket/ssl_client_socket_unittest.cc
+++ b/net/socket/ssl_client_socket_unittest.cc
@@ -426,7 +426,6 @@ TEST_F(SSLClientSocketTest, Read_Interrupted) {
EXPECT_GT(rv, 0);
}
-#if !defined(OS_WIN)
// Regression test for http://crbug.com/42538
TEST_F(SSLClientSocketTest, PrematureApplicationData) {
net::AddressList addr;
@@ -469,4 +468,3 @@ TEST_F(SSLClientSocketTest, PrematureApplicationData) {
rv = sock->Connect(&callback);
EXPECT_EQ(net::ERR_SSL_PROTOCOL_ERROR, rv);
}
-#endif // !defined(OS_WIN)
diff --git a/net/socket/ssl_client_socket_win.cc b/net/socket/ssl_client_socket_win.cc
index 1d014ab..7fd1f7c 100644
--- a/net/socket/ssl_client_socket_win.cc
+++ b/net/socket/ssl_client_socket_win.cc
@@ -825,6 +825,12 @@ int SSLClientSocketWin::DoHandshakeReadComplete(int result) {
&out_flags,
&expiry);
+ if (isc_status_ == SEC_E_INVALID_TOKEN) {
+ // Peer sent us an SSL record type that's invalid during SSL handshake.
+ // TODO(wtc): move this to MapSecurityError after sufficient testing.
+ return ERR_SSL_PROTOCOL_ERROR;
+ }
+
if (send_buffer_.cbBuffer != 0 &&
(isc_status_ == SEC_E_OK ||
isc_status_ == SEC_I_CONTINUE_NEEDED ||