forked from wolfSSL/wolfssl
Fix for handling OCSP response in non-blocking mode.
This commit is contained in:
@@ -453,6 +453,7 @@ int CheckOcspRequest(WOLFSSL_OCSP* ocsp, OcspRequest* ocspRequest,
|
||||
}
|
||||
else {
|
||||
/* cert doesn't have extAuthInfo, assuming CERT_GOOD */
|
||||
WOLFSSL_MSG("Cert has no OCSP URL, assuming CERT_GOOD");
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -1078,6 +1078,13 @@ int wolfIO_HttpProcessResponse(int sfd, const char** appStrList,
|
||||
start[len] = 0;
|
||||
}
|
||||
else {
|
||||
#ifdef WOLFSSL_NONBLOCK_OCSP
|
||||
result = wolfSSL_LastError();
|
||||
if (result == SOCKET_EWOULDBLOCK) {
|
||||
return OCSP_WANT_READ;
|
||||
}
|
||||
#endif
|
||||
|
||||
WOLFSSL_MSG("wolfIO_HttpProcessResponse recv http from peer failed");
|
||||
return -1;
|
||||
}
|
||||
|
Reference in New Issue
Block a user