Skip to content

Commit c71a4dd

Browse files
authored
Merge pull request wolfSSL#9662 from AlexLanzano/tls1.2-empty-cert-fix
[TLS 1.2, TLS 1.3] Fail immediately if server sends empty certificate message for TLS 1.2 and beyond
2 parents 4ce6c4c + bdc525d commit c71a4dd

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

src/internal.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15608,14 +15608,14 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte* input, word32* inOutIdx,
1560815608
/* Empty certificate message. */
1560915609
if ((ssl->options.side == WOLFSSL_SERVER_END) &&
1561015610
(ssl->options.mutualAuth || (ssl->options.failNoCert &&
15611-
IsAtLeastTLSv1_3(ssl->version)))) {
15611+
IsAtLeastTLSv1_2(ssl)))) {
1561215612
WOLFSSL_MSG("No peer cert from Client");
1561315613
ret = NO_PEER_CERT;
1561415614
WOLFSSL_ERROR_VERBOSE(ret);
1561515615
DoCertFatalAlert(ssl, ret);
1561615616
}
1561715617
else if ((ssl->options.side == WOLFSSL_CLIENT_END) &&
15618-
IsAtLeastTLSv1_3(ssl->version)) {
15618+
IsAtLeastTLSv1_2(ssl)) {
1561915619
WOLFSSL_MSG("No peer cert from Server");
1562015620
ret = NO_PEER_CERT;
1562115621
WOLFSSL_ERROR_VERBOSE(ret);

0 commit comments

Comments
 (0)