aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl/src/dtls.erl
diff options
context:
space:
mode:
authorJean-Sébastien Pédron <[email protected]>2018-02-06 13:59:22 +0100
committerJean-Sébastien Pédron <[email protected]>2018-02-09 10:42:47 +0100
commita5eb5642b84c6843611f718cfd105557f8a7a406 (patch)
treeef57441cc5a62ee0541f197cf6b22090ac115684 /lib/ssl/src/dtls.erl
parent2e5063371ca21eeabd9c20462c16fac0ee147028 (diff)
downloadotp-a5eb5642b84c6843611f718cfd105557f8a7a406.tar.gz
otp-a5eb5642b84c6843611f718cfd105557f8a7a406.tar.bz2
otp-a5eb5642b84c6843611f718cfd105557f8a7a406.zip
ssl: Add the unexpected message to #alert{}
... in handle_common_event(), instead of passing it to handle_own_alert() after wrapping it in a tuple with `StateName` (i.e. `{StateName, Msg}`). The `StateName` is passed to handle_normal_shutdown() and to alert_user(). The latter has a clause matching it against `connection`. Unfortunately, when the argument was in fact `{StateName, Msg}`, another clause was executed which dropped the `active` flag value and forced it to `false`, even if the state was actually `connection`. It meant that later in send_or_reply(), the alert was not propagated to the user, even though it should (`active` set to `true` or `once`). Now that handle_common_event() always passes the actual `StateName`, the problem is fixed. ERL-562
Diffstat (limited to 'lib/ssl/src/dtls.erl')
0 files changed, 0 insertions, 0 deletions