diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2011-04-03 17:15:23 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2011-04-03 17:15:23 +0000 |
commit | 7116a41129dd7a2954c962f33b3bfdafb2881b86 (patch) | |
tree | 98fee0b237e7f24e9e0ea7e06b901b860e433f28 /ssl/d1_both.c | |
parent | 7143acab25dc4b0dfa602b9b40c1783114aee193 (diff) |
PR: 2462
Submitted by: Robin Seggelmann <seggelmann@fh-muenster.de>
Reviewed by: steve
Fix DTLS Retransmission Buffer Bug
Diffstat (limited to 'ssl/d1_both.c')
-rw-r--r-- | ssl/d1_both.c | 14 |
1 files changed, 0 insertions, 14 deletions
diff --git a/ssl/d1_both.c b/ssl/d1_both.c index e82590f911..df684e57fa 100644 --- a/ssl/d1_both.c +++ b/ssl/d1_both.c @@ -468,20 +468,6 @@ again: if (!s->d1->listen) s->d1->handshake_read_seq++; - /* we just read a handshake message from the other side: - * this means that we don't need to retransmit of the - * buffered messages. - * XDTLS: may be able clear out this - * buffer a little sooner (i.e if an out-of-order - * handshake message/record is received at the record - * layer. - * XDTLS: exception is that the server needs to - * know that change cipher spec and finished messages - * have been received by the client before clearing this - * buffer. this can simply be done by waiting for the - * first data segment, but is there a better way? */ - dtls1_clear_record_buffer(s); - s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; return s->init_num; |