Correctly handle CertificateRequest with empty DN list in <= TLS 1.1

This commit is contained in:
Paul Bakker 2013-01-22 13:45:33 +01:00
parent f626e1dd28
commit 9c94cddeae
2 changed files with 7 additions and 4 deletions

View file

@ -4,6 +4,8 @@ PolarSSL ChangeLog
Bugfix
* Memory leak when using RSA_PKCS_V21 operations fixed
* Handle future version properly in ssl_write_certificate_request()
* Correctly handle CertificateRequest message in client for <= TLS 1.1
without DN list
= Version 1.2.3 released 2012-11-26
Bugfix

View file

@ -894,7 +894,7 @@ static int ssl_parse_certificate_request( ssl_context *ssl )
{
int ret;
unsigned char *buf, *p;
size_t n = 0;
size_t n = 0, m = 0;
size_t cert_type_len = 0, sig_alg_len = 0, dn_len = 0;
SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
@ -976,6 +976,7 @@ static int ssl_parse_certificate_request( ssl_context *ssl )
| ( buf[6 + n] ) );
p = buf + 7 + n;
m += 2;
n += sig_alg_len;
if( ssl->in_hslen < 6 + n )
@ -985,11 +986,11 @@ static int ssl_parse_certificate_request( ssl_context *ssl )
}
}
dn_len = ( ( buf[7 + n] << 8 )
| ( buf[8 + n] ) );
dn_len = ( ( buf[5 + m + n] << 8 )
| ( buf[6 + m + n] ) );
n += dn_len;
if( ssl->in_hslen != 9 + n )
if( ssl->in_hslen != 7 + m + n )
{
SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST );