forked from wolfSSL/wolfssl
Enable strict cipher suite checking by default. Changed to enable by default and can be disabled using WOLFSSL_NO_STRICT_CIPHER_SUITE
.
This commit is contained in:
@ -18172,14 +18172,15 @@ exit_dpk:
|
|||||||
ssl->options.cipherSuite = cs1;
|
ssl->options.cipherSuite = cs1;
|
||||||
compression = input[i++];
|
compression = input[i++];
|
||||||
|
|
||||||
#ifdef WOLFSSL_STRICT_CIPHER_SUITE
|
#ifndef WOLFSSL_NO_STRICT_CIPHER_SUITE
|
||||||
{
|
{
|
||||||
word32 idx, found = 0;
|
word32 idx, found = 0;
|
||||||
/* confirm server_hello cipher suite is one sent in client_hello */
|
/* confirm server_hello cipher suite is one sent in client_hello */
|
||||||
for (idx = 0; idx < ssl->suites->suiteSz; idx += 2) {
|
for (idx = 0; idx < ssl->suites->suiteSz; idx += 2) {
|
||||||
if (ssl->suites->suites[idx] == cs0 &&
|
if (ssl->suites->suites[idx] == cs0 &&
|
||||||
ssl->suites->suites[idx+1] == cs1) {
|
ssl->suites->suites[idx+1] == cs1) {
|
||||||
found = idx;
|
found = 1;
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (!found) {
|
if (!found) {
|
||||||
@ -18187,7 +18188,7 @@ exit_dpk:
|
|||||||
return MATCH_SUITE_ERROR;
|
return MATCH_SUITE_ERROR;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif
|
#endif /* !WOLFSSL_NO_STRICT_CIPHER_SUITE */
|
||||||
|
|
||||||
if (compression != NO_COMPRESSION && !ssl->options.usingCompression) {
|
if (compression != NO_COMPRESSION && !ssl->options.usingCompression) {
|
||||||
WOLFSSL_MSG("Server forcing compression w/o support");
|
WOLFSSL_MSG("Server forcing compression w/o support");
|
||||||
|
Reference in New Issue
Block a user