forked from wolfSSL/wolfssl
Change default DTLS future packet behaviour
This is a better default for most users. Most users who make use of DTLS, allow messages from "too far into the future". It makes sense that DTLS may lose connection for a period of time and will lose all messages from this period. Losing connection effectively stalls the wolfSSL DTLS connection.
This commit is contained in:
@ -13546,7 +13546,7 @@ static WC_INLINE int DtlsCheckWindow(WOLFSSL* ssl)
|
|||||||
WOLFSSL_MSG("Current record sequence number from the past.");
|
WOLFSSL_MSG("Current record sequence number from the past.");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#ifndef WOLFSSL_DTLS_ALLOW_FUTURE
|
#ifdef WOLFSSL_DTLS_DISALLOW_FUTURE
|
||||||
else if (!curLT && (diff > DTLS_SEQ_BITS)) {
|
else if (!curLT && (diff > DTLS_SEQ_BITS)) {
|
||||||
WOLFSSL_MSG("Rejecting message too far into the future.");
|
WOLFSSL_MSG("Rejecting message too far into the future.");
|
||||||
return 0;
|
return 0;
|
||||||
|
Reference in New Issue
Block a user