diff options
author | Matt Caswell <matt@openssl.org> | 2017-04-20 15:13:28 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2017-04-25 14:04:13 +0100 |
commit | c9a6b9f7ed482025d684ef3a04505004f85a97a1 (patch) | |
tree | 43a2c63a0db3e7bda9577d049222c5347b268407 /ssl/statem/statem.c | |
parent | d746e49bcd9cc84cce13b1cd2d3ea35b909880a7 (diff) |
Remove special case code for SCTP reneg handling
There was code existing which attempted to handle the case where application
data is received after a reneg handshake has started in SCTP. In normal DTLS
we just fail the connection if this occurs, so there doesn't seem any reason
to try and work around it for SCTP. In practice it didn't work properly
anyway and is probably a bad idea to start with.
Fixes #3251
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3287)
Diffstat (limited to 'ssl/statem/statem.c')
-rw-r--r-- | ssl/statem/statem.c | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/ssl/statem/statem.c b/ssl/statem/statem.c index 512f1e0941..691bfbbb2a 100644 --- a/ssl/statem/statem.c +++ b/ssl/statem/statem.c @@ -850,26 +850,3 @@ int ossl_statem_app_data_allowed(SSL *s) return 0; } - -#ifndef OPENSSL_NO_SCTP -/* - * Set flag used by SCTP to determine whether we are in the read sock state - */ -void ossl_statem_set_sctp_read_sock(SSL *s, int read_sock) -{ - s->statem.in_sctp_read_sock = read_sock; -} - -/* - * Called by the record layer to determine whether we are in the read sock - * state or not. - * - * Return values are: - * 1: Yes (we are in the read sock state) - * 0: No (we are not in the read sock state) - */ -int ossl_statem_in_sctp_read_sock(SSL *s) -{ - return s->statem.in_sctp_read_sock; -} -#endif |