mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 10:47:28 +02:00
Merge pull request #8115 from miyazakh/ocsp_tls13_client
Check Intermediate cert OCSP when using tls1.3 for client side
This commit is contained in:
@ -15232,7 +15232,13 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte* input, word32* inOutIdx,
|
|||||||
else /* skips OCSP and force CRL check */
|
else /* skips OCSP and force CRL check */
|
||||||
#endif /* HAVE_CERTIFICATE_STATUS_REQUEST_V2 */
|
#endif /* HAVE_CERTIFICATE_STATUS_REQUEST_V2 */
|
||||||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST)
|
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST)
|
||||||
if (IsAtLeastTLSv1_3(ssl->version)) {
|
if (IsAtLeastTLSv1_3(ssl->version) &&
|
||||||
|
ssl->options.side == WOLFSSL_CLIENT_END &&
|
||||||
|
ssl->status_request) {
|
||||||
|
/* We check CSR in Certificate message sent from
|
||||||
|
* Server. Server side will check client
|
||||||
|
* certificates by traditional OCSP if enabled
|
||||||
|
*/
|
||||||
ret = TLSX_CSR_InitRequest_ex(ssl->extensions,
|
ret = TLSX_CSR_InitRequest_ex(ssl->extensions,
|
||||||
args->dCert, ssl->heap, args->certIdx);
|
args->dCert, ssl->heap, args->certIdx);
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user