Mathias Axelsson found a case where we free()d the server certificate twice!

This commit is contained in:
Daniel Stenberg 2003-11-15 10:00:20 +00:00
parent a701f3dddf
commit dfe0118033
1 changed files with 0 additions and 2 deletions

View File

@ -863,7 +863,6 @@ static CURLcode verifyhost(struct connectdata *conn)
if(data->set.ssl.verifyhost > 1) {
failf(data,
"SSL: unable to obtain common name from peer certificate");
X509_free(conn->ssl.server_cert);
return CURLE_SSL_PEER_CERTIFICATE;
}
else {
@ -880,7 +879,6 @@ static CURLcode verifyhost(struct connectdata *conn)
if(data->set.ssl.verifyhost > 1) {
failf(data, "SSL: certificate subject name '%s' does not match "
"target host name '%s'", peer_CN, conn->hostname);
X509_free(conn->ssl.server_cert);
return CURLE_SSL_PEER_CERTIFICATE;
}
else