Revision d40ec4ab8e7c0ff39bf4f9918fbb9dfdca4c5221 authored by Matt Caswell on 10 November 2015, 15:17:42 UTC, committed by Matt Caswell on 10 November 2015, 19:24:20 UTC
If a DTLS client that does not support secure renegotiation connects to an OpenSSL DTLS server then, by default, renegotiation is disabled. If a server application attempts to initiate a renegotiation then OpenSSL is supposed to prevent this. However due to a discrepancy between the TLS and DTLS code, the server sends a HelloRequest anyway in DTLS. This is not a security concern because the handshake will still fail later in the process when the client responds with a ClientHello. Reviewed-by: Tim Hudson <tjh@openssl.org>
1 parent 15a7164
File | Mode | Size |
---|---|---|
TODO | -rw-r--r-- | 534 bytes |
VMSify-conf.pl | -rw-r--r-- | 1.1 KB |
WISHLIST.TXT | -rw-r--r-- | 188 bytes |
install-vms.com | -rwxr-xr-x | 1.8 KB |
mkshared.com | -rw-r--r-- | 14.8 KB |
multinet_shr.opt | -rw-r--r-- | 43 bytes |
openssl_startup.com | -rwxr-xr-x | 3.2 KB |
openssl_undo.com | -rwxr-xr-x | 383 bytes |
openssl_utils.com | -rw-r--r-- | 1.5 KB |
socketshr_shr.opt | -rw-r--r-- | 16 bytes |
tcpip_shr_decc.opt | -rw-r--r-- | 34 bytes |
test-includes.com | -rw-r--r-- | 752 bytes |
ucx_shr_decc.opt | -rw-r--r-- | 32 bytes |
ucx_shr_decc_log.opt | -rw-r--r-- | 18 bytes |
ucx_shr_vaxc.opt | -rw-r--r-- | 32 bytes |

Computing file changes ...