summaryrefslogtreecommitdiffstats
path: root/ssl/d1_pkt.c
diff options
context:
space:
mode:
authorAndy Polyakov <appro@openssl.org>2007-10-17 21:17:49 +0000
committerAndy Polyakov <appro@openssl.org>2007-10-17 21:17:49 +0000
commita9c23ea079f2e85001a94b8e9824a07669722351 (patch)
treec508b323520b837be8f87b05c1084463e5c6efff /ssl/d1_pkt.c
parent33ffe2a7f7d0ef64c3012111188d5d0ee587dd59 (diff)
Don't let DTLS ChangeCipherSpec increment handshake sequence number. From
HEAD with a twist: server interoperates with non-compliant client. PR: 1587
Diffstat (limited to 'ssl/d1_pkt.c')
-rw-r--r--ssl/d1_pkt.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/ssl/d1_pkt.c b/ssl/d1_pkt.c
index b1248770b5..377696deac 100644
--- a/ssl/d1_pkt.c
+++ b/ssl/d1_pkt.c
@@ -1006,8 +1006,8 @@ start:
/* do this whenever CCS is processed */
dtls1_reset_seq_numbers(s, SSL3_CC_READ);
- /* handshake read seq is reset upon handshake completion */
- s->d1->handshake_read_seq++;
+ if (s->client_version == DTLS1_BAD_VER)
+ s->d1->handshake_read_seq++;
goto start;
}