mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-30 22:43:08 +03:00
@ -7693,8 +7693,8 @@ unsigned int mbedtls_ssl_tls12_get_preferred_hash_for_sig_alg(
|
|||||||
{
|
{
|
||||||
if( sig_alg == MBEDTLS_SSL_TLS12_SIG_ALG_FROM_SIG_AND_HASH_ALG(
|
if( sig_alg == MBEDTLS_SSL_TLS12_SIG_ALG_FROM_SIG_AND_HASH_ALG(
|
||||||
received_sig_algs[i] ) )
|
received_sig_algs[i] ) )
|
||||||
return MBEDTLS_SSL_TLS12_HASH_ALG_FROM_SIG_AND_HASH_ALG(
|
return( MBEDTLS_SSL_TLS12_HASH_ALG_FROM_SIG_AND_HASH_ALG(
|
||||||
received_sig_algs[i] );
|
received_sig_algs[i] ) );
|
||||||
}
|
}
|
||||||
|
|
||||||
return( MBEDTLS_SSL_HASH_NONE );
|
return( MBEDTLS_SSL_HASH_NONE );
|
||||||
|
@ -3186,8 +3186,7 @@ curve_matching_done:
|
|||||||
|
|
||||||
/* For TLS 1.2, obey signature-hash-algorithm extension
|
/* For TLS 1.2, obey signature-hash-algorithm extension
|
||||||
* (RFC 5246, Sec. 7.4.1.4.1). */
|
* (RFC 5246, Sec. 7.4.1.4.1). */
|
||||||
if( sig_alg == MBEDTLS_PK_NONE ||
|
if( sig_alg == MBEDTLS_PK_NONE || md_alg == MBEDTLS_MD_NONE )
|
||||||
md_alg == MBEDTLS_MD_NONE )
|
|
||||||
{
|
{
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
|
||||||
/* (... because we choose a cipher suite
|
/* (... because we choose a cipher suite
|
||||||
|
@ -1613,7 +1613,7 @@ static int ssl_tls13_parse_certificate_request( mbedtls_ssl_context *ssl,
|
|||||||
MBEDTLS_SSL_DEBUG_MSG( 3,
|
MBEDTLS_SSL_DEBUG_MSG( 3,
|
||||||
( "found signature algorithms extension" ) );
|
( "found signature algorithms extension" ) );
|
||||||
ret = mbedtls_ssl_parse_sig_alg_ext( ssl, p,
|
ret = mbedtls_ssl_parse_sig_alg_ext( ssl, p,
|
||||||
p + extension_data_len );
|
p + extension_data_len );
|
||||||
if( ret != 0 )
|
if( ret != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
if( ! sig_alg_ext_found )
|
if( ! sig_alg_ext_found )
|
||||||
|
Reference in New Issue
Block a user