mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-01 19:54:40 +02:00
Added debug message when signature/algorithm list is truncated.
This commit is contained in:
@@ -22774,8 +22774,11 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||||||
return BUFFER_ERROR;
|
return BUFFER_ERROR;
|
||||||
|
|
||||||
clSuites.hashSigAlgoSz = hashSigAlgoSz;
|
clSuites.hashSigAlgoSz = hashSigAlgoSz;
|
||||||
if (clSuites.hashSigAlgoSz > WOLFSSL_MAX_SIGALGO)
|
if (clSuites.hashSigAlgoSz > WOLFSSL_MAX_SIGALGO) {
|
||||||
|
WOLFSSL_MSG("ClientHello SigAlgo list exceeds max, "
|
||||||
|
"truncating");
|
||||||
clSuites.hashSigAlgoSz = WOLFSSL_MAX_SIGALGO;
|
clSuites.hashSigAlgoSz = WOLFSSL_MAX_SIGALGO;
|
||||||
|
}
|
||||||
|
|
||||||
XMEMCPY(clSuites.hashSigAlgo, &input[i],
|
XMEMCPY(clSuites.hashSigAlgo, &input[i],
|
||||||
clSuites.hashSigAlgoSz);
|
clSuites.hashSigAlgoSz);
|
||||||
|
@@ -4908,8 +4908,10 @@ static int TLSX_SignatureAlgorithms_Parse(WOLFSSL *ssl, byte* input,
|
|||||||
|
|
||||||
/* truncate hashSigAlgo list if too long */
|
/* truncate hashSigAlgo list if too long */
|
||||||
suites->hashSigAlgoSz = len;
|
suites->hashSigAlgoSz = len;
|
||||||
if (suites->hashSigAlgoSz > WOLFSSL_MAX_SIGALGO)
|
if (suites->hashSigAlgoSz > WOLFSSL_MAX_SIGALGO) {
|
||||||
|
WOLFSSL_MSG("TLSX SigAlgo list exceeds max, truncating");
|
||||||
suites->hashSigAlgoSz = WOLFSSL_MAX_SIGALGO;
|
suites->hashSigAlgoSz = WOLFSSL_MAX_SIGALGO;
|
||||||
|
}
|
||||||
XMEMCPY(suites->hashSigAlgo, input, suites->hashSigAlgoSz);
|
XMEMCPY(suites->hashSigAlgo, input, suites->hashSigAlgoSz);
|
||||||
|
|
||||||
return TLSX_SignatureAlgorithms_MapPss(ssl, input, len);
|
return TLSX_SignatureAlgorithms_MapPss(ssl, input, len);
|
||||||
|
Reference in New Issue
Block a user