Tolerate early ChangeCipherSpec in DTLS.
This would only come up if the peer didn't pack records together, but
it's free to handle. Notably OpenSSL has a bug where it does not pack
retransmits together.
Change-Id: I0927d768f6b50c62bacdd82bd1c95396ed503cf3
Reviewed-on: https://boringssl-review.googlesource.com/18724
Reviewed-by: David Benjamin <davidben@google.com>
diff --git a/ssl/handshake_client.cc b/ssl/handshake_client.cc
index 742e106..2a3e627 100644
--- a/ssl/handshake_client.cc
+++ b/ssl/handshake_client.cc
@@ -781,7 +781,7 @@
}
if (ssl->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) {
- ssl->d1->send_cookie = 0;
+ ssl->d1->send_cookie = false;
ssl->s3->tmp.reuse_message = 1;
return 1;
}
@@ -799,7 +799,7 @@
OPENSSL_memcpy(ssl->d1->cookie, CBS_data(&cookie), CBS_len(&cookie));
ssl->d1->cookie_len = CBS_len(&cookie);
- ssl->d1->send_cookie = 1;
+ ssl->d1->send_cookie = true;
return 1;
}