HTTP: Fix OCSP error path
If addition of a peer issuer certificate fails, the certs pointer would be NULL when being passed to sk_X509_push() for peer issuer's issuer. Fix this by skipping addition of issuer's issue if issuer addition fails. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
946572ca0e
commit
bd7bb43784
1 changed files with 1 additions and 1 deletions
|
@ -1098,7 +1098,7 @@ static int ocsp_resp_cb(SSL *s, void *arg)
|
|||
sk_X509_free(certs);
|
||||
certs = NULL;
|
||||
}
|
||||
if (ctx->peer_issuer_issuer) {
|
||||
if (certs && ctx->peer_issuer_issuer) {
|
||||
cert = X509_dup(ctx->peer_issuer_issuer);
|
||||
if (cert && !sk_X509_push(certs, cert)) {
|
||||
tls_show_errors(
|
||||
|
|
Loading…
Reference in a new issue