Skip to content

Commit 25ffeb1

Browse files
committed
Fix another EVP_DigestVerify() instance
Following on from the previous commit this fixes another instance where we need to treat a -ve return from EVP_DigestVerify() as a bad signature. Reviewed-by: Rich Salz <[email protected]> (Merged from openssl#3756)
1 parent cfba067 commit 25ffeb1

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

ssl/statem/statem_lib.c

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -459,10 +459,7 @@ MSG_PROCESS_RETURN tls_process_cert_verify(SSL *s, PACKET *pkt)
459459
}
460460
} else {
461461
j = EVP_DigestVerify(mctx, data, len, hdata, hdatalen);
462-
if (j < 0) {
463-
SSLerr(SSL_F_TLS_PROCESS_CERT_VERIFY, ERR_R_EVP_LIB);
464-
goto f_err;
465-
} else if (j == 0) {
462+
if (j <= 0) {
466463
al = SSL_AD_DECRYPT_ERROR;
467464
SSLerr(SSL_F_TLS_PROCESS_CERT_VERIFY, SSL_R_BAD_SIGNATURE);
468465
goto f_err;

0 commit comments

Comments
 (0)