diff options
author | tb <> | 2024-11-12 22:50:06 +0000 |
---|---|---|
committer | tb <> | 2024-11-12 22:50:06 +0000 |
commit | fee58a01d3e38dbf53d13d5b43fb040439348421 (patch) | |
tree | 4090f9fd0252fcc655b896c428e7d97f0418050b /src/lib/libcrypto/ec/ecp_methods.c | |
parent | 75f4be60ac5d9cb4638dd4ad5d17de6e694f650c (diff) | |
download | openbsd-fee58a01d3e38dbf53d13d5b43fb040439348421.tar.gz openbsd-fee58a01d3e38dbf53d13d5b43fb040439348421.tar.bz2 openbsd-fee58a01d3e38dbf53d13d5b43fb040439348421.zip |
The subject of a certificate is not optional
A certificate must have a subject, so X509_get_subject_name() cannot
return NULL on a correctly parsed certificate, even if the subject is
empty (which is allowed). So if X509_get_subject_name() returns NULL,
error instead of silently ignoring it in tls_check_common_name().
This is currently no issue. Where it matters, the match against the
common name will fail later, so we fail closed anyway.
ok jsing
Diffstat (limited to 'src/lib/libcrypto/ec/ecp_methods.c')
0 files changed, 0 insertions, 0 deletions