Fix strict client chain check with TLS-1.3
authorTomas Mraz <tomas@openssl.org>
Tue, 29 Mar 2022 11:31:34 +0000 (13:31 +0200)
committerTomas Mraz <tomas@openssl.org>
Fri, 3 Jun 2022 13:51:19 +0000 (15:51 +0200)
commit89dd85430770d39cbfb15eb586c921958ca7687f
tree6d0709028bdd7aa2b2d94e7d5bcbef0627244808
parent336d92eb206946293a50db667fdc44ab7d69f8ad
Fix strict client chain check with TLS-1.3

When TLS-1.3 is used and the server does not send any CA names
the ca_dn will be NULL. sk_X509_NAME_num() returns -1 on null
argument.

Reviewed-by: Todd Short <todd.short@me.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/17986)
ssl/t1_lib.c