mirror of
https://github.com/open62541/open62541.git
synced 2025-06-03 04:00:21 +00:00
fix(plugin): Proper error handling when checking all CRLs
If a chain of Certificate Authorities (CAs) longer than one is present, all CRL checks on the additional CAs were bypassed. This resulted in the potential acceptance of certificates that have been revoked or have expired CRLs.
This commit is contained in:
parent
317819b7d3
commit
9b6848a7e8
@ -532,6 +532,8 @@ UA_CertificateVerification_Verify (void * verificationContext,
|
||||
opensslRet = X509_STORE_CTX_get_error (storeCtx);
|
||||
if (opensslRet == X509_V_ERR_UNABLE_TO_GET_CRL) {
|
||||
ret = UA_STATUSCODE_BADCERTIFICATEISSUERREVOCATIONUNKNOWN;
|
||||
} else {
|
||||
ret = UA_X509_Store_CTX_Error_To_UAError (opensslRet);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user