Hi, found in the current git version.
RFC 6347, Sect. 4.2.2 says: The first message each side transmits in each handshake always has message_seq = 0. Whenever each new message is generated, the message_seq value is incremented by one. Note that in the case of a rehandshake, this implies that the HelloRequest will have message_seq = 0 and the ServerHello will have message_seq = 1 When a OpenSSL DTLS server requests a rehandshake, it correctly sends a HelloRequest with message_seq = 0, the next ServerHello should have message_seq = 1, but OpenSSL sends it with message_seq = 0. This clearly violates the RFC. Andreas -- -- Dipl. Inform. Andreas Schultz ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org