- Fixed new logic on certificate chains in x509parse_verify()
diff --git a/library/x509parse.c b/library/x509parse.c
index 919be65..7d88a0c 100644
--- a/library/x509parse.c
+++ b/library/x509parse.c
@@ -1584,7 +1584,7 @@
pathlen = 1;
- while( cur->version != 0 )
+ while( cur != NULL && cur->version != 0 )
{
if( cur->ca_istrue == 0 ||
crt->issuer_raw.len != cur->subject_raw.len ||
@@ -1612,7 +1612,7 @@
/*
* Atempt to validate topmost cert with our CA chain.
*/
- while( trust_ca->version != 0 )
+ while( trust_ca != NULL && trust_ca->version != 0 )
{
if( crt->issuer_raw.len != trust_ca->subject_raw.len ||
memcmp( crt->issuer_raw.p, trust_ca->subject_raw.p,