Fix SuiteB chain checking logic.
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 7255ca99df
)
This commit is contained in:
parent
03d14f5887
commit
8d325d1d36
11
ssl/t1_lib.c
11
ssl/t1_lib.c
@ -4240,13 +4240,10 @@ int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
|
||||
if (check_flags)
|
||||
check_flags |= CERT_PKEY_SUITEB;
|
||||
ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags);
|
||||
if (ok != X509_V_OK)
|
||||
{
|
||||
if (check_flags)
|
||||
rv |= CERT_PKEY_SUITEB;
|
||||
else
|
||||
goto end;
|
||||
}
|
||||
if (ok == X509_V_OK)
|
||||
rv |= CERT_PKEY_SUITEB;
|
||||
else if (!check_flags)
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* Check all signature algorithms are consistent with
|
||||
|
Loading…
Reference in New Issue
Block a user