TLS: Report OCSP rejection cases when no valid response if found
This adds a CTRL-EVENT-EAP-TLS-CERT-ERROR and CTRL-EVENT-EAP-STATUS messages with 'bad certificate status response' for cases where no valid OCSP response was received, but the network profile requires OCSP to be used. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
f163ed8bae
commit
8ba8c01d0c
1 changed files with 10 additions and 0 deletions
|
@ -889,11 +889,21 @@ static int tls_process_certificate_status(struct tlsv1_client *conn, u8 ct,
|
|||
goto skip;
|
||||
tls_alert(conn, TLS_ALERT_LEVEL_FATAL,
|
||||
TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE);
|
||||
if (conn->server_cert)
|
||||
tls_cert_chain_failure_event(
|
||||
conn, 0, conn->server_cert,
|
||||
TLS_FAIL_UNSPECIFIED,
|
||||
"bad certificate status response");
|
||||
return -1;
|
||||
case TLS_OCSP_INVALID:
|
||||
if (!(conn->flags & TLS_CONN_REQUIRE_OCSP))
|
||||
goto skip; /* ignore - process as if no response */
|
||||
tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_DECODE_ERROR);
|
||||
if (conn->server_cert)
|
||||
tls_cert_chain_failure_event(
|
||||
conn, 0, conn->server_cert,
|
||||
TLS_FAIL_UNSPECIFIED,
|
||||
"bad certificate status response");
|
||||
return -1;
|
||||
case TLS_OCSP_GOOD:
|
||||
wpa_printf(MSG_DEBUG, "TLSv1: OCSP response good");
|
||||
|
|
Loading…
Reference in a new issue