Resolved.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development
On 11/29/2012 08:18 PM, Stephen Henson via RT wrote:
Thanks for the report, I've applied a fix.
I've not applied the second part of the patch because then the return
variable ret is set to the return value of X509_verify_cert() which is
intentional.
Steve.
Hi and thanks for the fast reply.
Thanks for the report, I've applied a fix.
I've not applied the second part of the patch because then the return
variable ret is set to the return value of X509_verify_cert() which is
intentional.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now
Greetings!
What state does this bug have?
Thank you!
On Thu, Apr 26, 2012 at 9:19 PM, jean-etienne.schwa...@bull.net via RT
r...@openssl.org wrote:
Hello,
openssl 0.9.8a until 1.0.1b
OCPS_basic_verify return a positive value when X509_STORE_CTX_init failed,
and, in this case, we can
Hello,
openssl 0.9.8a until 1.0.1b
OCPS_basic_verify return a positive value when X509_STORE_CTX_init failed,
and, in this case, we can trust an unverified OCSP response.
The following path correct this.
Thanks for all the good job
Jean-Etienne Schwartz
Hello,
openssl 0.9.8a until 1.0.1b