crypto/boringssl: perform dummy seal when client resets keys too #1965
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is yet more fallout from b17904e (also see 7d686e1). This time the missing dummy seal is for clients, after the initial epoch is reset (e.g. due to retry or version negotiation), which also causes the initial key material to be dervied again.
When that happens, and if the client's PTO fires (e.g. because the server is slow to respond) that will trigger the client to create a new Initial packet that will fail to seal because the initial seal context expects a packet number of 0, while the actual packet number is greater than that as it's a retransmission.
This only happens when the client's initial PTO fires because otherwise it would just send a Handshake packet instead, without using the initial key material.