]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
wolfssl: Remove unused and non-compiling code for OCSP
authorJuliusz Sosinowicz <juliusz@wolfssl.com>
Thu, 4 Apr 2024 18:16:22 +0000 (20:16 +0200)
committerJouni Malinen <j@w1.fi>
Sun, 2 Feb 2025 17:07:35 +0000 (19:07 +0200)
OCSP is handled internally by wolfSSL.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
src/crypto/tls_wolfssl.c

index 5ee8ec0b3bba0a964a0ec84591a84602881c4401..8b05e7b063f87d0953294af4640418a6d42b5662 100644 (file)
@@ -1303,31 +1303,6 @@ static int tls_verify_cb(int preverify_ok, WOLFSSL_X509_STORE_CTX *x509_ctx)
                                       TLS_FAIL_SERVER_CHAIN_PROBE);
        }
 
-#ifdef HAVE_OCSP_WOLFSSL
-       if (depth == 0 && (conn->flags & TLS_CONN_REQUEST_OCSP) &&
-           preverify_ok) {
-               enum ocsp_result res;
-
-               res = check_ocsp_resp(conn->ssl_ctx, conn->ssl, err_cert,
-                                     conn->peer_issuer,
-                                     conn->peer_issuer_issuer);
-               if (res == OCSP_REVOKED) {
-                       preverify_ok = 0;
-                       wolfssl_tls_fail_event(conn, err_cert, err, depth, buf,
-                                              "certificate revoked",
-                                              TLS_FAIL_REVOKED);
-                       if (err == X509_V_OK)
-                               X509_STORE_CTX_set_error(
-                                       x509_ctx, X509_V_ERR_CERT_REVOKED);
-               } else if (res != OCSP_GOOD &&
-                          (conn->flags & TLS_CONN_REQUIRE_OCSP)) {
-                       preverify_ok = 0;
-                       wolfssl_tls_fail_event(conn, err_cert, err, depth, buf,
-                                              "bad certificate status response",
-                                              TLS_FAIL_UNSPECIFIED);
-               }
-       }
-#endif /* HAVE_OCSP_WOLFSSL */
        if (depth == 0 && preverify_ok && context->event_cb != NULL)
                context->event_cb(context->cb_ctx,
                                  TLS_CERT_CHAIN_SUCCESS, NULL);