diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-03-21 09:36:18 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-03-21 12:11:19 +0100 |
commit | 47ba3b7b0f60ed0796250178d6cb847d8907c9c6 (patch) | |
tree | e5df81dbeaef6feb0511b543c0c35e036eb193fa /lib/cert-session.c | |
parent | 80253f81c86383cc14ff092550bce35eccd40b89 (diff) | |
download | gnutls-47ba3b7b0f60ed0796250178d6cb847d8907c9c6.tar.gz |
handshake: reset cert request state on handshake init
That addresses a bug which on client side on case of an initial
handshake with a client certificate, we continue to send this
certificate even if on rehandshake we were not requested with on.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'lib/cert-session.c')
-rw-r--r-- | lib/cert-session.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/lib/cert-session.c b/lib/cert-session.c index 19c84e5f1e..a2315389ef 100644 --- a/lib/cert-session.c +++ b/lib/cert-session.c @@ -143,14 +143,15 @@ int gnutls_certificate_get_peers_subkey_id(gnutls_session_t session, * gnutls_certificate_client_get_request_status: * @session: is a gnutls session * - * Get whether client certificate is requested or not. + * Get whether client certificate was requested on the last + * handshake or not. * * Returns: 0 if the peer (server) did not request client * authentication or 1 otherwise. **/ int gnutls_certificate_client_get_request_status(gnutls_session_t session) { - return session->key.crt_requested; + return session->internals.crt_requested; } /** |