[openssl-dev] [openssl.org #3109] [openssl.org #3041[PATCH] DTLS message_sequence number wrong in rehandshake ServerHello

2015-05-06 Thread Matt Caswell via RT
This ticket was opened in error. Closing.

Matt

___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev


[openssl.org #3109] [openssl.org #3041[PATCH] DTLS message_sequence number wrong in rehandshake ServerHello

2013-08-11 Thread Michael Tuexen via RT
This patch ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest consumes the sequence number 0. The subsequent
  ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
  be 1 if a HelloRequest was received earlier.
This patch fixes the RFC violation.

This patch should be applied to 1.0.1, 1.0.0 and 0.9.8.




renegotiate.patch
Description: Binary data