Skip to content

Commit

Permalink
openssl: verifystatus: only use the OCSP work-around <= 1.0.2a
Browse files Browse the repository at this point in the history
URL: http://curl.haxx.se/mail/lib-2015-03/0205.html
Reported-by: Alessandro Ghedini
  • Loading branch information
bagder committed Mar 24, 2015
1 parent 7e6ca87 commit bd9ac3c
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions lib/vtls/openssl.c
Expand Up @@ -1360,6 +1360,7 @@ static CURLcode verifystatus(struct connectdata *conn,
ch = SSL_get_peer_cert_chain(connssl->handle);
st = SSL_CTX_get_cert_store(connssl->ctx);

#if (OPENSSL_VERSION_NUMBER <= 0x1000201fL) /* Fixed after 1.0.2a */
/* The authorized responder cert in the OCSP response MUST be signed by the
peer cert's issuer (see RFC6960 section 4.2.2.2). If that's a root cert,
no problem, but if it's an intermediate cert OpenSSL has a bug where it
Expand All @@ -1383,6 +1384,7 @@ static CURLcode verifystatus(struct connectdata *conn,
}
}
}
#endif

if(OCSP_basic_verify(br, ch, st, 0) <= 0) {
failf(data, "OCSP response verification failed");
Expand Down

0 comments on commit bd9ac3c

Please sign in to comment.