forked from wolfSSL/wolfssl
Return error with AES-GCM and negotiated versions < TLSv1.2
This commit is contained in:
@@ -24466,6 +24466,26 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (first == CIPHER_BYTE && ssl->version.major == SSLv3_MAJOR &&
|
||||||
|
ssl->version.minor < TLSv1_2_MINOR) {
|
||||||
|
switch(second) {
|
||||||
|
case TLS_RSA_WITH_AES_128_GCM_SHA256:
|
||||||
|
case TLS_RSA_WITH_AES_256_GCM_SHA384:
|
||||||
|
case TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
|
||||||
|
case TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
|
||||||
|
case TLS_DH_anon_WITH_AES_256_GCM_SHA384:
|
||||||
|
case TLS_PSK_WITH_AES_128_GCM_SHA256:
|
||||||
|
case TLS_PSK_WITH_AES_256_GCM_SHA384:
|
||||||
|
case TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
|
||||||
|
case TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
|
||||||
|
WOLFSSL_MSG("Version of SSL does not support AES-GCM");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
#if (defined(HAVE_ECC) || defined(HAVE_CURVE25519)) && \
|
#if (defined(HAVE_ECC) || defined(HAVE_CURVE25519)) && \
|
||||||
defined(HAVE_SUPPORTED_CURVES)
|
defined(HAVE_SUPPORTED_CURVES)
|
||||||
if (!TLSX_ValidateSupportedCurves(ssl, first, second)) {
|
if (!TLSX_ValidateSupportedCurves(ssl, first, second)) {
|
||||||
|
Reference in New Issue
Block a user