Matt Caswell d40ec4ab8e Stop DTLS servers asking for unsafe legacy renegotiation
If a DTLS client that does not support secure renegotiation connects to an
OpenSSL DTLS server then, by default, renegotiation is disabled. If a
server application attempts to initiate a renegotiation then OpenSSL is
supposed to prevent this. However due to a discrepancy between the TLS and
DTLS code, the server sends a HelloRequest anyway in DTLS.

This is not a security concern because the handshake will still fail later
in the process when the client responds with a ClientHello.

Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-11-10 19:24:20 +00:00
..
2015-09-20 14:21:18 +01:00
2015-08-28 11:59:23 -04:00
2015-03-19 11:11:22 +00:00
2015-05-22 09:44:44 +01:00
2015-02-27 20:31:28 +00:00
2015-01-22 09:31:38 +00:00
2015-09-02 00:37:58 +01:00
2015-06-08 15:04:28 +02:00
2015-03-11 10:45:23 +00:00
2015-06-20 19:28:58 +01:00
2015-07-30 10:18:43 +01:00
2015-09-02 00:29:00 +01:00
2015-01-22 09:31:38 +00:00
2015-01-22 09:31:38 +00:00
2015-01-22 09:31:38 +00:00
2015-01-22 09:31:38 +00:00
2015-08-11 20:20:17 +01:00
2015-09-02 00:37:58 +01:00
2015-05-05 19:50:12 +01:00
2015-01-07 02:15:35 +01:00
2015-08-11 20:20:17 +01:00
2015-04-30 23:21:50 +01:00
2015-10-23 20:32:58 +02:00
2015-04-16 13:50:01 -04:00