From c35b47f265d13975bf1a97626c3fa36cc0f49f92 Mon Sep 17 00:00:00 2001 From: Sean Parkinson Date: Fri, 5 Aug 2022 08:26:09 +1000 Subject: [PATCH] TLS !.3: restrict extension validity by message Extensions ServerName, SupportedGroups and ALPN must not appear in server_hello. Removed server_hello from the valid checks. --- src/tls.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/src/tls.c b/src/tls.c index 925f73f37..4d8b09ac4 100644 --- a/src/tls.c +++ b/src/tls.c @@ -12011,7 +12011,6 @@ int TLSX_Parse(WOLFSSL* ssl, const byte* input, word16 length, byte msgType, #if defined(WOLFSSL_TLS13) && defined(HAVE_SNI) if (IsAtLeastTLSv1_3(ssl->version) && msgType != client_hello && - msgType != server_hello && msgType != encrypted_extensions) { return EXT_NOT_ALLOWED; } @@ -12082,7 +12081,6 @@ int TLSX_Parse(WOLFSSL* ssl, const byte* input, word16 length, byte msgType, #if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES) if (IsAtLeastTLSv1_3(ssl->version) && msgType != client_hello && - msgType != server_hello && msgType != encrypted_extensions) { return EXT_NOT_ALLOWED; } @@ -12201,7 +12199,6 @@ int TLSX_Parse(WOLFSSL* ssl, const byte* input, word16 length, byte msgType, #if defined(WOLFSSL_TLS13) && defined(HAVE_ALPN) if (IsAtLeastTLSv1_3(ssl->version) && msgType != client_hello && - msgType != server_hello && msgType != encrypted_extensions) { return EXT_NOT_ALLOWED; }