diff options
author | Andy Polyakov <appro@openssl.org> | 2007-10-17 21:17:49 +0000 |
---|---|---|
committer | Andy Polyakov <appro@openssl.org> | 2007-10-17 21:17:49 +0000 |
commit | a9c23ea079f2e85001a94b8e9824a07669722351 (patch) | |
tree | c508b323520b837be8f87b05c1084463e5c6efff /ssl/d1_pkt.c | |
parent | 33ffe2a7f7d0ef64c3012111188d5d0ee587dd59 (diff) |
Don't let DTLS ChangeCipherSpec increment handshake sequence number. From
HEAD with a twist: server interoperates with non-compliant client.
PR: 1587
Diffstat (limited to 'ssl/d1_pkt.c')
-rw-r--r-- | ssl/d1_pkt.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/ssl/d1_pkt.c b/ssl/d1_pkt.c index b1248770b5..377696deac 100644 --- a/ssl/d1_pkt.c +++ b/ssl/d1_pkt.c @@ -1006,8 +1006,8 @@ start: /* do this whenever CCS is processed */ dtls1_reset_seq_numbers(s, SSL3_CC_READ); - /* handshake read seq is reset upon handshake completion */ - s->d1->handshake_read_seq++; + if (s->client_version == DTLS1_BAD_VER) + s->d1->handshake_read_seq++; goto start; } |