Annotate a bug.
Submitted by: Reviewed by: PR:
This commit is contained in:
parent
5b1b044606
commit
8051996a5b
@ -1652,7 +1652,19 @@ static int ssl3_get_client_certificate(SSL *s)
|
|||||||
if (s->session->peer != NULL)
|
if (s->session->peer != NULL)
|
||||||
X509_free(s->session->peer);
|
X509_free(s->session->peer);
|
||||||
s->session->peer=sk_X509_shift(sk);
|
s->session->peer=sk_X509_shift(sk);
|
||||||
|
|
||||||
|
/* FIXME: s->session->cert could be a SSL_CTX's struct cert_st!
|
||||||
|
* struct cert_st is used for too many purposes. It makes
|
||||||
|
* sense to use the same structure in both SSL_CTX and SSL,
|
||||||
|
* but then don't put any per-connection data in it. */
|
||||||
|
#if 0 /* This could become a workaround, but it would still be utterly ugly */
|
||||||
|
if (!ssl_cert_instantiate(&s->cert, s->ctx->default_cert))
|
||||||
|
{
|
||||||
|
handle the error;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
s->session->cert->cert_chain=sk;
|
s->session->cert->cert_chain=sk;
|
||||||
|
|
||||||
sk=NULL;
|
sk=NULL;
|
||||||
|
|
||||||
ret=1;
|
ret=1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user