Skip to content

Conversation

@SparkiDev
Copy link
Contributor

@SparkiDev SparkiDev commented Sep 30, 2025

Description

Order of preference, based on algorithms compiled in, to use with HMAC for TLS 1.3 cookie:

  1. SHA-256
  2. SHA-384
  3. SHA-512
  4. SM3

Make code compile and unittest pass when SHA-256 not compiled in. Certificates used for testing require SHA-256 so handshake testing fails.

Fixes zd#20505

Testing

How did you test?

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

@SparkiDev SparkiDev self-assigned this Sep 30, 2025
@SparkiDev SparkiDev force-pushed the tls13_cookie_hash branch 2 times, most recently from 39782ef to b048acb Compare September 30, 2025 03:12
@SparkiDev
Copy link
Contributor Author

retest this please

Unable to create live FilePath for wolf-linux-cloud-node-j9hb60; wolf-linux-cloud-node-j9hb60 was marked offline: Connection was broken

Order of preference, based on algorithms compiled in, to use with HMAC
for TLS 1.3 cookie:
  1. SHA-256
  2. SHA-384
  3. SHA-512
  4. SM3

Make code compile and unittest pass when SHA-256 not compiled in.
Certificates used for testing require SHA-256 so handshake testing
fails.
@SparkiDev
Copy link
Contributor Author

retest this please

hudson.remoting.Channel$CallSiteStackTrace: Remote call to boz-amd

@SparkiDev SparkiDev assigned wolfSSL-Bot and unassigned SparkiDev Oct 6, 2025
@SparkiDev SparkiDev requested a review from wolfSSL-Bot October 6, 2025 23:13
@dgarske dgarske merged commit b3031d2 into wolfSSL:master Oct 7, 2025
338 of 340 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants