Enable strict cipher suite checking by default. Changed to enable by default and can be disabled using WOLFSSL_NO_STRICT_CIPHER_SUITE
.
This commit is contained in:
parent
e75417fde1
commit
eb68ad162b
@ -18172,14 +18172,15 @@ exit_dpk:
|
||||
ssl->options.cipherSuite = cs1;
|
||||
compression = input[i++];
|
||||
|
||||
#ifdef WOLFSSL_STRICT_CIPHER_SUITE
|
||||
#ifndef WOLFSSL_NO_STRICT_CIPHER_SUITE
|
||||
{
|
||||
word32 idx, found = 0;
|
||||
/* confirm server_hello cipher suite is one sent in client_hello */
|
||||
for (idx = 0; idx < ssl->suites->suiteSz; idx += 2) {
|
||||
if (ssl->suites->suites[idx] == cs0 &&
|
||||
ssl->suites->suites[idx+1] == cs1) {
|
||||
found = idx;
|
||||
found = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (!found) {
|
||||
@ -18187,7 +18188,7 @@ exit_dpk:
|
||||
return MATCH_SUITE_ERROR;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
#endif /* !WOLFSSL_NO_STRICT_CIPHER_SUITE */
|
||||
|
||||
if (compression != NO_COMPRESSION && !ssl->options.usingCompression) {
|
||||
WOLFSSL_MSG("Server forcing compression w/o support");
|
||||
|
Loading…
Reference in New Issue
Block a user