Skip to content

Commit

Permalink
intermediate cert check when using tls1.3 for client side
Browse files Browse the repository at this point in the history
  • Loading branch information
miyazakh committed Oct 26, 2024
1 parent bdd6231 commit 79a9e0a
Showing 1 changed file with 7 additions and 1 deletion.
8 changes: 7 additions & 1 deletion src/internal.c
Original file line number Diff line number Diff line change
Expand Up @@ -15232,7 +15232,13 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte* input, word32* inOutIdx,
else /* skips OCSP and force CRL check */
#endif /* HAVE_CERTIFICATE_STATUS_REQUEST_V2 */
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST)
if (IsAtLeastTLSv1_3(ssl->version)) {
if (IsAtLeastTLSv1_3(ssl->version) &&
ssl->options.side == WOLFSSL_CLIENT_END &&
ssl->status_request) {
/* We check CSR in Certificate message sent from
* Server. Server side will check client
* certificates by traditional OCSP if enabled
*/
ret = TLSX_CSR_InitRequest_ex(ssl->extensions,
args->dCert, ssl->heap, args->certIdx);
}
Expand Down

0 comments on commit 79a9e0a

Please sign in to comment.