Fix for possible seg fault with anonymous cipher mode enabled. Do not perform signature/verify when using anon_cipher.

This commit is contained in:
David Garske
2016-07-14 15:58:35 -07:00
parent 9a9a98ac82
commit aa9b1e964c

View File

@ -16593,6 +16593,7 @@ int DoSessionTicket(WOLFSSL* ssl,
}
#endif
if (!ssl->options.usingAnon_cipher) {
/* Determine hash type */
if (IsAtLeastTLSv1_2(ssl)) {
output[idx++] = ssl->suites->hashAlgo;
@ -16739,6 +16740,7 @@ int DoSessionTicket(WOLFSSL* ssl,
}
#endif /* NO_RSA */
} /* switch (ssl->suites->sigAlgo) */
} /* !ssl->options.usingAnon_cipher */
break;
}
@ -16821,6 +16823,7 @@ int DoSessionTicket(WOLFSSL* ssl,
#ifndef NO_RSA
case rsa_sa_algo:
{
if (!ssl->options.usingAnon_cipher) {
/* check for signature faults */
ret = VerifyRsaSign(ssl,
output + idx,
@ -16828,6 +16831,7 @@ int DoSessionTicket(WOLFSSL* ssl,
ssl->buffers.sig.buffer,
ssl->buffers.sig.length,
(RsaKey*)ssl->sigKey);
}
break;
}
#endif