Fix kerberos ciphersuite bugs introduced with PR:1336.
[openssl.git] / ssl / s3_clnt.c
index 278be82294cde73236c1d9c8c4262a2b2088e4d5..d98c7f998f1459a16b19dbcdcf720803d1e17a5d 100644 (file)
@@ -821,7 +821,9 @@ int ssl3_get_server_certificate(SSL *s)
 
        if (!ok) return((int)n);
 
-       if (s->s3->tmp.message_type == SSL3_MT_SERVER_KEY_EXCHANGE)
+       if ((s->s3->tmp.message_type == SSL3_MT_SERVER_KEY_EXCHANGE) ||
+               ((s->s3->tmp.new_cipher->algorithms & SSL_aKRB5) && 
+               (s->s3->tmp.message_type == SSL3_MT_SERVER_DONE)))
                {
                s->s3->tmp.reuse_message=1;
                return(1);
@@ -2292,18 +2294,18 @@ int ssl3_check_cert_and_algorithm(SSL *s)
 
        sc=s->session->sess_cert;
 
-       if (sc == NULL)
-               {
-               SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,ERR_R_INTERNAL_ERROR);
-               goto err;
-               }
-
        algs=s->s3->tmp.new_cipher->algorithms;
 
        /* we don't have a certificate */
        if (algs & (SSL_aDH|SSL_aNULL|SSL_aKRB5))
                return(1);
 
+       if (sc == NULL)
+               {
+               SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,ERR_R_INTERNAL_ERROR);
+               goto err;
+               }
+
 #ifndef OPENSSL_NO_RSA
        rsa=s->session->sess_cert->peer_rsa_tmp;
 #endif