summaryrefslogtreecommitdiff
path: root/lib/libssl/s3_pkt.c
diff options
context:
space:
mode:
authorMarkus Friedl <markus@cvs.openbsd.org>2009-11-10 09:09:41 +0000
committerMarkus Friedl <markus@cvs.openbsd.org>2009-11-10 09:09:41 +0000
commit1dbb7b9fd5969436ffc25e60b75b520785aa6898 (patch)
tree1b2c712faa095661b71f852d1e33c3ac2808463a /lib/libssl/s3_pkt.c
parent4a9fe09da4598f230a59a95872414a867d29fe08 (diff)
pull Ben Lauries blind prefix injection fix for CVE-2009-3555 from
openssl 0.9.8l; crank minor version; ok djm@ deraadt@; initially from jsg@
Diffstat (limited to 'lib/libssl/s3_pkt.c')
-rw-r--r--lib/libssl/s3_pkt.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/lib/libssl/s3_pkt.c b/lib/libssl/s3_pkt.c
index 9476dcddf6e..b98b84044fd 100644
--- a/lib/libssl/s3_pkt.c
+++ b/lib/libssl/s3_pkt.c
@@ -985,6 +985,7 @@ start:
if (SSL_is_init_finished(s) &&
!(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
+ (s->s3->flags & SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION) &&
!s->s3->renegotiate)
{
ssl3_renegotiate(s);
@@ -1117,7 +1118,8 @@ start:
if ((s->s3->handshake_fragment_len >= 4) && !s->in_handshake)
{
if (((s->state&SSL_ST_MASK) == SSL_ST_OK) &&
- !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
+ !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
+ (s->s3->flags & SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION))
{
#if 0 /* worked only because C operator preferences are not as expected (and
* because this is not really needed for clients except for detecting