forked from wolfSSL/wolfssl
Merge pull request #8356 from kareem-wolfssl/gh8355
Properly check for signature_algorithms from the client in a TLS 1.3 server.
This commit is contained in:
@ -7053,7 +7053,9 @@ int DoTls13ClientHello(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
||||
WOLFSSL_MSG("Client did not send a KeyShare extension");
|
||||
ERROR_OUT(INCOMPLETE_DATA, exit_dch);
|
||||
}
|
||||
if (TLSX_Find(ssl->extensions, TLSX_SIGNATURE_ALGORITHMS) == NULL) {
|
||||
/* Can't check ssl->extensions here as SigAlgs are unconditionally
|
||||
set by TLSX_PopulateExtensions */
|
||||
if (args->clSuites->hashSigAlgoSz == 0) {
|
||||
WOLFSSL_MSG("Client did not send a SignatureAlgorithms extension");
|
||||
ERROR_OUT(INCOMPLETE_DATA, exit_dch);
|
||||
}
|
||||
|
Reference in New Issue
Block a user