Stop client from sending Certificate message when not requested
authorMatt Caswell <matt@openssl.org>
Tue, 22 Nov 2016 16:39:27 +0000 (16:39 +0000)
committerMatt Caswell <matt@openssl.org>
Mon, 23 Jan 2017 14:09:10 +0000 (14:09 +0000)
In a non client-auth renegotiation where the original handshake *was*
client auth, then the client will send a Certificate message anyway
resulting in a connection failure.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1983)

ssl/statem/statem.c

index caaf0687b5fb8aaaecd45407156cf03a45443cfb..f4895f41ac5693d8b94b82b1d4bd71f280736063 100644 (file)
@@ -369,6 +369,7 @@ static int state_machine(SSL *s, int server)
             s->hit = 0;
 
             s->s3->tmp.cert_request = 0;
+            s->s3->tmp.cert_req = 0;
 
             if (SSL_IS_DTLS(s)) {
                 st->use_timer = 1;