The branch OpenSSL_1_0_2-stable has been updated
       via  3ade92e785bb3777c92332f88e23f6ce906ee260 (commit)
      from  45f4761fdbb7b47a92ee5ed94e5485fb6218f3f5 (commit)


- Log -----------------------------------------------------------------
commit 3ade92e785bb3777c92332f88e23f6ce906ee260
Author: Rich Salz <rs...@openssl.org>
Date:   Sat Oct 22 03:53:47 2016 -0400

    Correctly find all critical CRL extensions
    
    Unhandled critical CRL extensions were not detected if they appeared
    after the handled ones.  (GitHub issue 1757).  Thanks to John Chuah
    for reporting this.
    
    Reviewed-by: Richard Levitte <levi...@openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/1769)

-----------------------------------------------------------------------

Summary of changes:
 crypto/asn1/x_crl.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/crypto/asn1/x_crl.c b/crypto/asn1/x_crl.c
index 0279503..c78ded8 100644
--- a/crypto/asn1/x_crl.c
+++ b/crypto/asn1/x_crl.c
@@ -254,6 +254,7 @@ static int crl_cb(int operation, ASN1_VALUE **pval, const 
ASN1_ITEM *it,
 
         for (idx = 0; idx < sk_X509_EXTENSION_num(exts); idx++) {
             int nid;
+
             ext = sk_X509_EXTENSION_value(exts, idx);
             nid = OBJ_obj2nid(ext->object);
             if (nid == NID_freshest_crl)
@@ -263,7 +264,7 @@ static int crl_cb(int operation, ASN1_VALUE **pval, const 
ASN1_ITEM *it,
                 if ((nid == NID_issuing_distribution_point)
                     || (nid == NID_authority_key_identifier)
                     || (nid == NID_delta_crl))
-                    break;;
+                    continue;
                 crl->flags |= EXFLAG_CRITICAL;
                 break;
             }
_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to