On Sun May 05 23:40:18 2013, [email protected] wrote: > Hi, > > found in the current git version. > > RFC 6347, Sect. 4.2.2 says: > The first message each side transmits in each handshake always has > message_seq = 0. Whenever each new message is generated, the > message_seq value is incremented by one. Note that in the case of a > rehandshake, this implies that the HelloRequest will have message_seq > = 0 and the ServerHello will have message_seq = 1 > > When a OpenSSL DTLS server requests a rehandshake, it correctly sends a > HelloRequest with message_seq = 0, the next ServerHello should have > message_seq = 1, but OpenSSL sends it with message_seq = 0. This clearly > violates the RFC. >
Do you get that with the 1.0.2 branch too? Note that the master branch has been extensively revised and there may be the odd bug lurking in there. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [email protected] Automated List Manager [email protected]
