Fix SuiteB chain checking logic.
Reviewed-by: Matt Caswell <matt@openssl.org>
This commit is contained in:
parent
c56a50b229
commit
7255ca99df
1 changed files with 4 additions and 7 deletions
11
ssl/t1_lib.c
11
ssl/t1_lib.c
|
@ -4294,13 +4294,10 @@ int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
|
|||
if (check_flags)
|
||||
check_flags |= CERT_PKEY_SUITEB;
|
||||
ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags);
|
||||
if (ok != X509_V_OK)
|
||||
{
|
||||
if (check_flags)
|
||||
rv |= CERT_PKEY_SUITEB;
|
||||
else
|
||||
goto end;
|
||||
}
|
||||
if (ok == X509_V_OK)
|
||||
rv |= CERT_PKEY_SUITEB;
|
||||
else if (!check_flags)
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* Check all signature algorithms are consistent with
|
||||
|
|
Loading…
Reference in a new issue