Emilia Kasper 249a3e362f Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.

(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)

Thanks to Joeri de Ruiter for reporting this issue.

Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit e94a6c0ede623960728415b68650a595e48f5a43)

Conflicts:
	CHANGES
	ssl/s3_srvr.c
2014-11-20 15:32:08 +01:00
..
2012-04-16 17:43:15 +00:00
2014-10-15 04:05:42 +02:00
2014-10-15 08:51:49 -04:00
2009-04-21 22:20:12 +00:00
2014-02-26 15:33:09 +00:00
2014-09-24 15:52:41 +02:00
2013-01-28 17:30:38 +00:00
2014-10-15 04:05:42 +02:00
2013-01-28 17:30:38 +00:00
2012-06-08 09:18:47 +00:00
2014-10-15 04:05:42 +02:00
2014-10-15 04:05:42 +02:00
2014-10-15 08:51:50 -04:00
2002-07-10 07:01:54 +00:00
2014-10-15 08:51:50 -04:00
2014-10-15 04:05:42 +02:00
2014-11-20 15:26:26 +01:00
2012-06-08 09:18:47 +00:00
2014-10-28 17:41:49 +01:00
2011-05-11 13:37:52 +00:00
2011-05-11 13:37:52 +00:00
2014-10-15 04:05:42 +02:00
2011-05-11 13:37:52 +00:00
2009-12-27 22:59:09 +00:00
2011-05-11 13:37:52 +00:00
2014-10-15 04:05:42 +02:00
2014-08-06 20:27:51 +01:00