summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorBob Beck <beck@cvs.openbsd.org>2021-08-30 06:51:37 +0000
committerBob Beck <beck@cvs.openbsd.org>2021-08-30 06:51:37 +0000
commit0bdc7da30b17647b901121a51f62335f01c56f33 (patch)
treea63995a56686de7dd2f4ddfc9690e2cf3dda5d23 /lib
parent72a6016102cb9ccd5d95a9361d913aba4203a763 (diff)
Fix Jan's regress in openssl/x509 to do what it says it does,
then fix the only thing it still has complaints about which is that we don't return the leaf version of the error code when we can't verify the leaf (as opposed to the rest of the chain) ok jan@ tb@
Diffstat (limited to 'lib')
-rw-r--r--lib/libcrypto/x509/x509_verify.c16
1 files changed, 11 insertions, 5 deletions
diff --git a/lib/libcrypto/x509/x509_verify.c b/lib/libcrypto/x509/x509_verify.c
index 051a04c1be9..51108bbe72b 100644
--- a/lib/libcrypto/x509/x509_verify.c
+++ b/lib/libcrypto/x509/x509_verify.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: x509_verify.c,v 1.45 2021/08/29 17:13:15 beck Exp $ */
+/* $OpenBSD: x509_verify.c,v 1.46 2021/08/30 06:51:36 beck Exp $ */
/*
* Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org>
*
@@ -132,8 +132,11 @@ x509_verify_chain_append(struct x509_verify_chain *chain, X509 *cert,
* We've just added the issuer for the previous certificate,
* clear its error if appropriate.
*/
- if (idx > 1 && chain->cert_errors[idx - 1] ==
- X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY)
+ if (idx > 1 &&
+ (chain->cert_errors[idx - 1] ==
+ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY ||
+ chain->cert_errors[idx - 1] ==
+ X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE))
chain->cert_errors[idx - 1] = X509_V_OK;
return 1;
@@ -406,7 +409,9 @@ x509_verify_ctx_add_chain(struct x509_verify_ctx *ctx,
/* Clear a get issuer failure for a root certificate. */
if (chain->cert_errors[depth] ==
- X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY)
+ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY ||
+ chain->cert_errors[depth] ==
+ X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE)
chain->cert_errors[depth] = X509_V_OK;
if (!x509_verify_ctx_validate_legacy_chain(ctx, chain, depth))
@@ -596,7 +601,8 @@ x509_verify_build_chains(struct x509_verify_ctx *ctx, X509 *cert,
return;
count = ctx->chains_count;
- ctx->error = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY;
+ ctx->error = depth == 0 ? X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE :
+ X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY;
ctx->error_depth = depth;
if (ctx->xsc != NULL) {
/*