summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authoralexei.volkov.bugs%sun.com <devnull@localhost>2010-02-26 19:25:44 +0000
committeralexei.volkov.bugs%sun.com <devnull@localhost>2010-02-26 19:25:44 +0000
commit9379f5d70a125b385c8f09535c1f155696203070 (patch)
tree704261a6e2952d84349597c72f722f445533c230
parent03f363eacc83918d4c4fcf24d9949064e41e4ecc (diff)
downloadnss-hg-9379f5d70a125b385c8f09535c1f155696203070.tar.gz
548654 - libssl: handshake failure alert is set twice upon unsuccessful extension parsing. r=wtc
-rw-r--r--security/nss/lib/ssl/ssl3ext.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/security/nss/lib/ssl/ssl3ext.c b/security/nss/lib/ssl/ssl3ext.c
index 4dca0064c..a25f4f05b 100644
--- a/security/nss/lib/ssl/ssl3ext.c
+++ b/security/nss/lib/ssl/ssl3ext.c
@@ -1501,8 +1501,6 @@ ssl3_HandleRenegotiationInfoXtn(sslSocket *ss, PRUint16 ex_type, SECItem *data)
data->data[0] != len || (len &&
NSS_SecureMemcmp(ss->ssl3.hs.finishedMsgs.data,
data->data + 1, len))) {
- /* Can we do this here? Or, must we arrange for the caller to do it? */
- (void)SSL3_SendAlert(ss, alert_fatal, handshake_failure);
PORT_SetError(SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE);
return SECFailure;
}