Skip to content

Commit dd12e5a

Browse files
committed
Fix WOLFSSL_SYS_CA_CERTS bug that accepted intermediate CA certs with invalid
signatures. Also adds --sys-ca-certs to client in unit.test to detect regressions
1 parent a3bf7a6 commit dd12e5a

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

src/internal.c

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14223,7 +14223,9 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte* input, word32* inOutIdx,
1422314223
/* If we are using native Apple CA validation, it is okay
1422414224
* for a CA cert to fail validation here, as we will verify
1422514225
* the entire chain when we hit the peer (leaf) cert */
14226-
if (ssl->ctx->doAppleNativeCertValidationFlag) {
14226+
if ((ssl->ctx->doAppleNativeCertValidationFlag)
14227+
&& (ret == ASN_NO_SIGNER_E)) {
14228+
1422714229
WOLFSSL_MSG("Bypassing errors to allow for Apple native"
1422814230
" CA validation");
1422914231
ret = 0; /* clear errors and continue */

0 commit comments

Comments
 (0)