diff --git a/src/ssl.c b/src/ssl.c index e3c2b9398..fc554eeed 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -35155,8 +35155,7 @@ int wolfSSL_CTX_set1_groups_list(WOLFSSL_CTX *ctx, char *list) return WOLFSSL_FAILURE; } - return wolfSSL_CTX_set_groups(ctx, groups, count) == WOLFSSL_SUCCESS ? - WOLFSSL_SUCCESS : WOLFSSL_FAILURE; + return wolfSSL_CTX_set1_groups(ctx, groups, count); } int wolfSSL_set1_groups_list(WOLFSSL *ssl, char *list) @@ -35173,8 +35172,7 @@ int wolfSSL_set1_groups_list(WOLFSSL *ssl, char *list) return WOLFSSL_FAILURE; } - return wolfSSL_set_groups(ssl, groups, count) == WOLFSSL_SUCCESS ? - WOLFSSL_SUCCESS : WOLFSSL_FAILURE; + return wolfSSL_set1_groups(ssl, groups, count); } #endif /* WOLFSSL_TLS13 */ diff --git a/tests/api.c b/tests/api.c index dc80978bb..8dbd871b7 100644 --- a/tests/api.c +++ b/tests/api.c @@ -27060,6 +27060,12 @@ static void test_wolfSSL_EVP_MD_size(void) AssertIntEQ(wolfSSL_EVP_MD_CTX_block_size(&mdCtx), WC_SHA_BLOCK_SIZE); AssertIntEQ(wolfSSL_EVP_MD_CTX_cleanup(&mdCtx), 1); + wolfSSL_EVP_MD_CTX_init(&mdCtx); + + AssertIntEQ(wolfSSL_EVP_DigestInit(&mdCtx, "SHA1"), 1); + AssertIntEQ(wolfSSL_EVP_MD_CTX_size(&mdCtx), WC_SHA_DIGEST_SIZE); + AssertIntEQ(wolfSSL_EVP_MD_CTX_block_size(&mdCtx), WC_SHA_BLOCK_SIZE); + AssertIntEQ(wolfSSL_EVP_MD_CTX_cleanup(&mdCtx), 1); #endif /* error case */ wolfSSL_EVP_MD_CTX_init(&mdCtx); diff --git a/wolfcrypt/src/evp.c b/wolfcrypt/src/evp.c index c1d2cee35..326802646 100644 --- a/wolfcrypt/src/evp.c +++ b/wolfcrypt/src/evp.c @@ -2107,6 +2107,7 @@ static const struct s_ent { #ifndef NO_SHA {WC_HASH_TYPE_SHA, NID_sha1, "SHA1"}, + {WC_HASH_TYPE_SHA, NID_sha1, "SHA"}, /* Leave for backwards compatibility */ #endif /* NO_SHA */ #ifdef WOLFSSL_SHA224 @@ -6883,7 +6884,10 @@ int wolfSSL_EVP_get_hashinfo(const WOLFSSL_EVP_MD* evp, } else #endif - { + if (XSTRNCMP("SHA1", evp, 4) == 0) { + hash = WC_HASH_TYPE_SHA; + } + else { WOLFSSL_MSG("Unknown SHA hash"); } }