diff options
author | Michael Tuexen <tuexen@fh-muenster.de> | 2013-08-13 18:53:19 +0100 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2013-08-13 18:53:19 +0100 |
commit | b62f4daac00303280361924b9cc19b3e27528b15 (patch) | |
tree | 5cb0356e44d092695a8d2bf5481bf44bcbe89d35 /FAQ | |
parent | 0c75eeacd3285b395dc75b65c3e6fe6ffbef59f0 (diff) | |
download | openssl-new-b62f4daac00303280361924b9cc19b3e27528b15.tar.gz |
DTLS message_sequence number wrong in rehandshake ServerHello
This fix ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest "consumes" the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.
Diffstat (limited to 'FAQ')
0 files changed, 0 insertions, 0 deletions