mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-08-06 15:17:01 +02:00
BUG/MINOR: ssl: Missing ssl_conf pointer check when checking ocsp update inconsistencies
The ssl_conf might be NULL when processing ocsp_update option in crt-lists. This patch fixes GitHub issue #1995. It does not need to be backported.
This commit is contained in:
parent
71237a1457
commit
8c99081d38
@ -615,7 +615,7 @@ int crtlist_parse_file(char *file, struct bind_conf *bind_conf, struct proxy *cu
|
||||
entry_dup->crtlist = newlist;
|
||||
if (ckchs->data->ocsp_update_mode != SSL_SOCK_OCSP_UPDATE_DFLT || entry->ssl_conf) {
|
||||
if ((!entry->ssl_conf && ckchs->data->ocsp_update_mode == SSL_SOCK_OCSP_UPDATE_ON)
|
||||
|| ckchs->data->ocsp_update_mode != entry->ssl_conf->ocsp_update) {
|
||||
|| (entry->ssl_conf && ckchs->data->ocsp_update_mode != entry->ssl_conf->ocsp_update)) {
|
||||
memprintf(err, "%sIncompatibilities found in OCSP update mode for certificate %s\n", err && *err ? *err : "", crt_path);
|
||||
cfgerr |= ERR_ALERT;
|
||||
}
|
||||
@ -647,7 +647,7 @@ int crtlist_parse_file(char *file, struct bind_conf *bind_conf, struct proxy *cu
|
||||
entry->crtlist = newlist;
|
||||
if (ckchs->data->ocsp_update_mode != SSL_SOCK_OCSP_UPDATE_DFLT || entry->ssl_conf) {
|
||||
if ((!entry->ssl_conf && ckchs->data->ocsp_update_mode == SSL_SOCK_OCSP_UPDATE_ON)
|
||||
|| ckchs->data->ocsp_update_mode != entry->ssl_conf->ocsp_update) {
|
||||
|| (entry->ssl_conf && ckchs->data->ocsp_update_mode != entry->ssl_conf->ocsp_update)) {
|
||||
memprintf(err, "%sIncompatibilities found in OCSP update mode for certificate %s\n", err && *err ? *err : "", crt_path);
|
||||
cfgerr |= ERR_ALERT;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user