Matt Caswell 78b9d13474 Stop DTLS servers asking for unsafe legacy renegotiation
If a DTLS client that does not support secure renegotiation connects to an
OpenSSL DTLS server then, by default, renegotiation is disabled. If a
server application attempts to initiate a renegotiation then OpenSSL is
supposed to prevent this. However due to a discrepancy between the TLS and
DTLS code, the server sends a HelloRequest anyway in DTLS.

This is not a security concern because the handshake will still fail later
in the process when the client responds with a ClientHello.

Reviewed-by: Tim Hudson <tjh@openssl.org>
(cherry picked from commit d40ec4ab8e7c0ff39bf4f9918fbb9dfdca4c5221)
2015-11-10 19:27:25 +00:00
..
2015-09-20 14:22:52 +01:00
2015-06-02 09:12:39 +01:00
2015-05-22 10:24:49 +01:00
2015-02-27 20:32:49 +00:00
2015-01-22 09:38:39 +00:00
2015-06-08 15:05:08 +02:00
2015-03-11 10:49:22 +00:00
2015-09-02 00:31:33 +01:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-07-27 16:14:02 +01:00
2015-01-22 09:38:39 +00:00
2015-08-11 20:23:00 +01:00
2015-05-05 20:07:48 +01:00
2015-08-11 20:23:00 +01:00
2015-04-30 23:26:06 +01:00
2015-10-23 20:43:09 +02:00
2015-04-16 13:51:51 -04:00