Mathias Axelsson found a case where we free()d the server certificate twice!
This commit is contained in:
parent
a701f3dddf
commit
dfe0118033
@ -863,7 +863,6 @@ static CURLcode verifyhost(struct connectdata *conn)
|
|||||||
if(data->set.ssl.verifyhost > 1) {
|
if(data->set.ssl.verifyhost > 1) {
|
||||||
failf(data,
|
failf(data,
|
||||||
"SSL: unable to obtain common name from peer certificate");
|
"SSL: unable to obtain common name from peer certificate");
|
||||||
X509_free(conn->ssl.server_cert);
|
|
||||||
return CURLE_SSL_PEER_CERTIFICATE;
|
return CURLE_SSL_PEER_CERTIFICATE;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -880,7 +879,6 @@ static CURLcode verifyhost(struct connectdata *conn)
|
|||||||
if(data->set.ssl.verifyhost > 1) {
|
if(data->set.ssl.verifyhost > 1) {
|
||||||
failf(data, "SSL: certificate subject name '%s' does not match "
|
failf(data, "SSL: certificate subject name '%s' does not match "
|
||||||
"target host name '%s'", peer_CN, conn->hostname);
|
"target host name '%s'", peer_CN, conn->hostname);
|
||||||
X509_free(conn->ssl.server_cert);
|
|
||||||
return CURLE_SSL_PEER_CERTIFICATE;
|
return CURLE_SSL_PEER_CERTIFICATE;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
Loading…
x
Reference in New Issue
Block a user