Skip to content

Commit

Permalink
create new cert_store before reloading CAs and CRLs
Browse files Browse the repository at this point in the history
  • Loading branch information
Fabian Mauchle committed Mar 24, 2017
1 parent 3d9be84 commit 402cc31
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 0 deletions.
1 change: 1 addition & 0 deletions ChangeLog
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Changes between 1.6.8 and the master branch
- Don't use a smaller pthread stack size than what's allowed.
- Don't follow NULL the pointer at debug level 5 (RADSECPROXY-68).
- Avoid a deadlock situation with dynamic servers (RADSECPROXY-73).
- Completely reload CAs and CRLs with cacheExpiry (RADSECPROXY-50).

2016-09-21 1.6.8
Bug fixes:
Expand Down
1 change: 1 addition & 0 deletions tlscommon.c
Original file line number Diff line number Diff line change
Expand Up @@ -153,6 +153,7 @@ static int tlsaddcacrl(SSL_CTX *ctx, struct tls *conf) {
X509_STORE *x509_s;
unsigned long error;

SSL_CTX_set_cert_store(ctx, X509_STORE_new());
if (!SSL_CTX_load_verify_locations(ctx, conf->cacertfile, conf->cacertpath)) {
while ((error = ERR_get_error()))
debug(DBG_ERR, "SSL: %s", ERR_error_string(error, NULL));
Expand Down

0 comments on commit 402cc31

Please sign in to comment.