Use the right alert for bad CA lists.
Bug: 245 Change-Id: I6bfaf2dbe4996219773742a88c401d6cfffe3a3d Reviewed-on: https://boringssl-review.googlesource.com/28284 Commit-Queue: David Benjamin <davidben@google.com> Commit-Queue: Steven Valdez <svaldez@google.com> Reviewed-by: Steven Valdez <svaldez@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
3babc86d0f
commit
418cdc4df4
@ -663,7 +663,7 @@ UniquePtr<STACK_OF(CRYPTO_BUFFER)> ssl_parse_client_CA_list(SSL *ssl,
|
||||
}
|
||||
|
||||
if (!ssl->ctx->x509_method->check_client_CA_list(ret.get())) {
|
||||
*out_alert = SSL_AD_INTERNAL_ERROR;
|
||||
*out_alert = SSL_AD_DECODE_ERROR;
|
||||
OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR);
|
||||
return nullptr;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user