Remove support for SSL_OP_NETSCAPE_CA_DN_BUG.
This is an ancient bug workaround for Netscape clients. The documentation talks about versions 3.x and 4.x beta. Reviewed-by: Tim Hudson <tjh@openssl.org>
This commit is contained in:
@@ -2109,8 +2109,6 @@ int ssl3_get_certificate_request(SSL *s)
|
||||
for (nc = 0; nc < llen;) {
|
||||
n2s(p, l);
|
||||
if ((l + nc + 2) > llen) {
|
||||
if ((s->options & SSL_OP_NETSCAPE_CA_DN_BUG))
|
||||
goto cont; /* netscape bugs */
|
||||
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
|
||||
SSLerr(SSL_F_SSL3_GET_CERTIFICATE_REQUEST, SSL_R_CA_DN_TOO_LONG);
|
||||
goto err;
|
||||
@@ -2119,14 +2117,9 @@ int ssl3_get_certificate_request(SSL *s)
|
||||
q = p;
|
||||
|
||||
if ((xn = d2i_X509_NAME(NULL, &q, l)) == NULL) {
|
||||
/* If netscape tolerance is on, ignore errors */
|
||||
if (s->options & SSL_OP_NETSCAPE_CA_DN_BUG)
|
||||
goto cont;
|
||||
else {
|
||||
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
|
||||
SSLerr(SSL_F_SSL3_GET_CERTIFICATE_REQUEST, ERR_R_ASN1_LIB);
|
||||
goto err;
|
||||
}
|
||||
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR);
|
||||
SSLerr(SSL_F_SSL3_GET_CERTIFICATE_REQUEST, ERR_R_ASN1_LIB);
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (q != (p + l)) {
|
||||
@@ -2144,11 +2137,6 @@ int ssl3_get_certificate_request(SSL *s)
|
||||
nc += l + 2;
|
||||
}
|
||||
|
||||
if (0) {
|
||||
cont:
|
||||
ERR_clear_error();
|
||||
}
|
||||
|
||||
/* we should setup a certificate to return.... */
|
||||
s->s3->tmp.cert_req = 1;
|
||||
s->s3->tmp.ctype_num = ctype_num;
|
||||
|
Reference in New Issue
Block a user