forked from wolfSSL/wolfssl
Merge pull request #2336 from kaleb-himes/ZD-5388-OCSP-STATUS-UNHONORED
Honor the status from peer and do not do internal OCSP lookup regardless
This commit is contained in:
40
src/tls.c
40
src/tls.c
@@ -2835,15 +2835,8 @@ static word16 TLSX_CSR_GetSize(CertificateStatusRequest* csr, byte isRequest)
|
||||
}
|
||||
#endif
|
||||
#if defined(WOLFSSL_TLS13) && !defined(NO_WOLFSSL_SERVER)
|
||||
if (!isRequest && csr->ssl->options.tls1_3) {
|
||||
if (csr->response.buffer == NULL) {
|
||||
OcspRequest* request = &csr->request.ocsp;
|
||||
int ret = CreateOcspResponse(csr->ssl, &request, &csr->response);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
}
|
||||
if (!isRequest && csr->ssl->options.tls1_3)
|
||||
return OPAQUE8_LEN + OPAQUE24_LEN + csr->response.length;
|
||||
}
|
||||
#endif
|
||||
|
||||
return size;
|
||||
@@ -2952,6 +2945,13 @@ static int TLSX_CSR_Parse(WOLFSSL* ssl, byte* input, word16 length,
|
||||
if (ssl->options.tls1_3) {
|
||||
word32 resp_length;
|
||||
word32 offset = 0;
|
||||
|
||||
/* Get the new extension potentially created above. */
|
||||
extension = TLSX_Find(ssl->extensions, TLSX_STATUS_REQUEST);
|
||||
csr = extension ? (CertificateStatusRequest*)extension->data : NULL;
|
||||
if (csr == NULL)
|
||||
return MEMORY_ERROR;
|
||||
|
||||
ret = 0;
|
||||
if (OPAQUE8_LEN + OPAQUE24_LEN > length)
|
||||
ret = BUFFER_ERROR;
|
||||
@@ -3032,6 +3032,24 @@ static int TLSX_CSR_Parse(WOLFSSL* ssl, byte* input, word16 length,
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return ret; /* throw error */
|
||||
|
||||
#if defined(WOLFSSL_TLS13) && !defined(NO_WOLFSSL_SERVER)
|
||||
if (ssl->options.tls1_3) {
|
||||
OcspRequest* request;
|
||||
TLSX* extension = TLSX_Find(ssl->extensions, TLSX_STATUS_REQUEST);
|
||||
CertificateStatusRequest* csr = extension ?
|
||||
(CertificateStatusRequest*)extension->data : NULL;
|
||||
if (csr == NULL)
|
||||
return MEMORY_ERROR;
|
||||
|
||||
request = &csr->request.ocsp;
|
||||
ret = CreateOcspResponse(ssl, &request, &csr->response);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
if (csr->response.buffer)
|
||||
TLSX_SetResponse(ssl, TLSX_STATUS_REQUEST);
|
||||
}
|
||||
else
|
||||
#endif
|
||||
TLSX_SetResponse(ssl, TLSX_STATUS_REQUEST);
|
||||
ssl->status_request = status_type;
|
||||
#endif
|
||||
@@ -10420,8 +10438,12 @@ int TLSX_Parse(WOLFSSL* ssl, byte* input, word16 length, byte msgType,
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_TLS13
|
||||
if (IsAtLeastTLSv1_3(ssl->version))
|
||||
if (IsAtLeastTLSv1_3(ssl->version) &&
|
||||
msgType != client_hello &&
|
||||
msgType != certificate_request &&
|
||||
msgType != certificate) {
|
||||
break;
|
||||
}
|
||||
#endif
|
||||
ret = CSR_PARSE(ssl, input + offset, size, isRequest);
|
||||
break;
|
||||
|
@@ -5127,6 +5127,7 @@ static int SendTls13Certificate(WOLFSSL* ssl)
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
extSz = 0;
|
||||
ret = TLSX_WriteResponse(ssl, ssl->buffers.certExts->buffer,
|
||||
certificate, &extSz);
|
||||
if (ret < 0)
|
||||
|
Reference in New Issue
Block a user