Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment...
authorMatt Caswell <matt@openssl.org>
Thu, 24 Jul 2014 22:54:28 +0000 (23:54 +0100)
committerMatt Caswell <matt@openssl.org>
Wed, 6 Aug 2014 19:27:51 +0000 (20:27 +0100)
commit0c37aed3f327782645d68964cd7a714df6b8880d
treec3e9ff09b651a93069d37b00d65442c7c4e32124
parent099ccdb8084aff60efad0c91185cb465f9123859
Applying same fix as in dtls1_process_out_of_seq_message. A truncated DTLS fragment would cause *ok to be clear, but the return value would still be the number of bytes read.

Problem identified by Emilia Käsper, based on previous issue/patch by Adam
Langley.

Reviewed-by: Emilia Käsper <emilia@openssl.org>
ssl/d1_both.c