Don't let DTLS ChangeCipherSpec increment handshake sequence number. From
authorAndy Polyakov <appro@openssl.org>
Wed, 17 Oct 2007 21:17:49 +0000 (21:17 +0000)
committerAndy Polyakov <appro@openssl.org>
Wed, 17 Oct 2007 21:17:49 +0000 (21:17 +0000)
commita9c23ea079f2e85001a94b8e9824a07669722351
treec508b323520b837be8f87b05c1084463e5c6efff
parent33ffe2a7f7d0ef64c3012111188d5d0ee587dd59
Don't let DTLS ChangeCipherSpec increment handshake sequence number. From
HEAD with a twist: server interoperates with non-compliant client.
PR: 1587
ssl/d1_both.c
ssl/d1_pkt.c