mirror of https://github.com/wolfSSL/wolfssl.git
Allow `trusted_ca_keys` with TLSv1.3
It is possible that the client will provied `trusted_ca_keys` during a TLSv1.3 connection with 1.2 downgrade. wolfSSL would error with `EXT_NOT_ALLOWED`. The TLSv1.3 spec states that it can be provided and should be ignored. ZD 19936pull/8860/head
parent
0bac2c2b34
commit
5e6cb2b0b6
|
@ -16149,7 +16149,7 @@ int TLSX_Parse(WOLFSSL* ssl, const byte* input, word16 length, byte msgType,
|
|||
/* RFC 8446 4.2.4 states trusted_ca_keys is not used
|
||||
in TLS 1.3. */
|
||||
if (IsAtLeastTLSv1_3(ssl->version)) {
|
||||
return EXT_NOT_ALLOWED;
|
||||
break;
|
||||
}
|
||||
else
|
||||
#endif
|
||||
|
|
|
@ -51,7 +51,7 @@
|
|||
-v 3
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1.2
|
||||
# server TLSv1.2
|
||||
-v 3
|
||||
-l ECDHE-RSA-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
@ -60,7 +60,7 @@
|
|||
-v 4
|
||||
-H exitWithRet
|
||||
|
||||
# server TLSv1.2
|
||||
# server TLSv1.2
|
||||
-v 3
|
||||
-l ECDHE-RSA-AES256-GCM-SHA384
|
||||
-H exitWithRet
|
||||
|
@ -119,3 +119,10 @@
|
|||
-7 3
|
||||
-s
|
||||
-l ECDHE-PSK-AES128-GCM-SHA256
|
||||
|
||||
# server TLSv1.3
|
||||
-v 4
|
||||
|
||||
# client downgrade with trusted ca
|
||||
-v d
|
||||
-5
|
||||
|
|
Loading…
Reference in New Issue