diff options
author | alexei.volkov.bugs%sun.com <devnull@localhost> | 2010-02-26 19:25:44 +0000 |
---|---|---|
committer | alexei.volkov.bugs%sun.com <devnull@localhost> | 2010-02-26 19:25:44 +0000 |
commit | 9379f5d70a125b385c8f09535c1f155696203070 (patch) | |
tree | 704261a6e2952d84349597c72f722f445533c230 | |
parent | 03f363eacc83918d4c4fcf24d9949064e41e4ecc (diff) | |
download | nss-hg-9379f5d70a125b385c8f09535c1f155696203070.tar.gz |
548654 - libssl: handshake failure alert is set twice upon unsuccessful extension parsing. r=wtc
-rw-r--r-- | security/nss/lib/ssl/ssl3ext.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/security/nss/lib/ssl/ssl3ext.c b/security/nss/lib/ssl/ssl3ext.c index 4dca0064c..a25f4f05b 100644 --- a/security/nss/lib/ssl/ssl3ext.c +++ b/security/nss/lib/ssl/ssl3ext.c @@ -1501,8 +1501,6 @@ ssl3_HandleRenegotiationInfoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data) data->data[0] != len || (len && NSS_SecureMemcmp(ss->ssl3.hs.finishedMsgs.data, data->data + 1, len))) { - /* Can we do this here? Or, must we arrange for the caller to do it? */ - (void)SSL3_SendAlert(ss, alert_fatal, handshake_failure); PORT_SetError(SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE); return SECFailure; } |