Przeglądaj źródła

Use the right alert for bad CA lists.

Bug: 245
Change-Id: I6bfaf2dbe4996219773742a88c401d6cfffe3a3d
Reviewed-on: https://boringssl-review.googlesource.com/28284
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Reviewed-by: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
kris/onging/CECPQ3_patch15
David Benjamin 6 lat temu
committed by CQ bot account: commit-bot@chromium.org
rodzic
commit
418cdc4df4
1 zmienionych plików z 1 dodań i 1 usunięć
  1. +1
    -1
      ssl/ssl_cert.cc

+ 1
- 1
ssl/ssl_cert.cc Wyświetl plik

@@ -663,7 +663,7 @@ UniquePtr<STACK_OF(CRYPTO_BUFFER)> ssl_parse_client_CA_list(SSL *ssl,
}

if (!ssl->ctx->x509_method->check_client_CA_list(ret.get())) {
*out_alert = SSL_AD_INTERNAL_ERROR;
*out_alert = SSL_AD_DECODE_ERROR;
OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR);
return nullptr;
}


Ładowanie…
Anuluj
Zapisz