SSL: Loading bad private key

Fix ProcessBufferTryDecodeRsa and ProcessBufferTryDecodeEcc to only
clear error when key format isn't known.
This commit is contained in:
Sean Parkinson
2024-02-28 21:47:45 +10:00
parent 6500444b26
commit b53cc0e98c

View File

@ -6543,7 +6543,10 @@ static int ProcessBufferTryDecodeRsa(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
"not enabled to try");
ret = WOLFSSL_BAD_FILE;
#else
ret = 0; /* continue trying other algorithms */
if (*keyFormat == 0) {
/* Format unknown so keep trying. */
ret = 0; /* continue trying other algorithms */
}
#endif
}
else {
@ -6616,7 +6619,10 @@ static int ProcessBufferTryDecodeRsa(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
"not enabled to try");
ret = WOLFSSL_BAD_FILE;
#else
ret = 0; /* continue trying other algorithms */
if (*keyFormat == 0) {
/* Format unknown so keep trying. */
ret = 0; /* continue trying other algorithms */
}
#endif
}
else {
@ -6728,7 +6734,7 @@ static int ProcessBufferTryDecodeEcc(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
*resetSuites = 1;
}
}
else {
else if (*keyFormat == 0) {
ret = 0; /* continue trying other algorithms */
}
@ -6809,7 +6815,7 @@ static int ProcessBufferTryDecodeEd25519(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
}
}
}
else {
else if (*keyFormat == 0) {
ret = 0; /* continue trying other algorithms */
}