Session resumption involves a version check, so version negotiation must
happen first. Currently, the DTLS implementation cannot do session
resumption in DTLS 1.0 because the ssl_version check always checks against
1.2.

Switching the order also removes the need to fixup ssl_version in DTLS
version negotiation.

The DTLS1-ECDHE-RSA-AES256-SHA-server test (and any other
DTLS1-{cipher-name}-server test) in BoringSSL's test suite can be used to
repro this:
https://mta.openssl.org/pipermail/openssl-dev/2016-March/005779.html

David

-- 
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4392
Please log in as guest with password guest if prompted

Attachment: 0006-Resolve-DTLS-cookie-and-version-before-session-resum.patch
Description: Binary data

-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to