Emilia Kasper e5f261df73 Ensure SSL3_FLAGS_CCS_OK (or d1->change_cipher_spec_ok for DTLS) is reset
once the ChangeCipherSpec message is received. Previously, the server would
set the flag once at SSL3_ST_SR_CERT_VRFY and again at SSL3_ST_SR_FINISHED.
This would allow a second CCS to arrive and would corrupt the server state.

(Because the first CCS would latch the correct keys and subsequent CCS
messages would have to be encrypted, a MitM attacker cannot exploit this,
though.)

Thanks to Joeri de Ruiter for reporting this issue.

Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit e94a6c0ede623960728415b68650a595e48f5a43)
2014-11-20 15:17:36 +01:00
..
2012-04-16 17:43:02 +00:00
2014-10-15 04:04:55 +02:00
2013-09-18 13:46:02 +01:00
2014-10-15 08:54:26 -04:00
2009-04-21 22:20:12 +00:00
2014-02-26 15:33:10 +00:00
2014-09-24 15:54:51 +02:00
2014-10-15 04:04:55 +02:00
2013-02-06 13:56:12 +00:00
2014-01-07 15:41:11 +00:00
2014-10-15 04:04:55 +02:00
2014-10-15 04:04:55 +02:00
2014-10-15 08:54:26 -04:00
2002-07-10 07:01:54 +00:00
2014-10-15 08:54:26 -04:00
2014-08-28 18:09:05 +01:00
2014-11-20 15:17:30 +01:00
2014-10-28 17:38:23 +01:00
2014-07-04 13:42:05 +01:00
2013-09-18 13:46:02 +01:00
2014-10-15 04:04:55 +02:00
2014-08-28 18:10:21 +01:00
2009-12-27 22:59:09 +00:00
2014-08-06 20:41:53 +01:00