Skip to content

Commit

Permalink
Merge pull request #8356 from kareem-wolfssl/gh8355
Browse files Browse the repository at this point in the history
Properly check for signature_algorithms from the client in a TLS 1.3 server.
  • Loading branch information
SparkiDev authored Jan 14, 2025
2 parents e037e08 + 9f5c89a commit e76186f
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion src/tls13.c
Original file line number Diff line number Diff line change
Expand Up @@ -7053,7 +7053,9 @@ int DoTls13ClientHello(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
WOLFSSL_MSG("Client did not send a KeyShare extension");
ERROR_OUT(INCOMPLETE_DATA, exit_dch);
}
if (TLSX_Find(ssl->extensions, TLSX_SIGNATURE_ALGORITHMS) == NULL) {
/* Can't check ssl->extensions here as SigAlgs are unconditionally
set by TLSX_PopulateExtensions */
if (args->clSuites->hashSigAlgoSz == 0) {
WOLFSSL_MSG("Client did not send a SignatureAlgorithms extension");
ERROR_OUT(INCOMPLETE_DATA, exit_dch);
}
Expand Down

0 comments on commit e76186f

Please sign in to comment.