Version
5.1.1
Description
wolfSSL server is configured to validate client certificate. Client presents a certificate signed with RSA/SHA1.
NO_OLD_TLS is specified, which cancels out SHA1. But it's brought back with WOLFSSL_ALLOW_TLS_SHA1.
DoCertificateVerify fails: after call to wc_EncodeSignature following XMEMCMP fails with non-zero result.
Looks like some conditional parts of the code check for both flags (like !NO_OLD_TLS || WOLFSSL_ALLOW_TLS_SHA1), but some other SHA-related parts only check for NO_OLD_TLS, so some parts of the code don't get executed (example: HashRaw in internal.c)
Version
5.1.1
Description
wolfSSL server is configured to validate client certificate. Client presents a certificate signed with RSA/SHA1.
NO_OLD_TLS is specified, which cancels out SHA1. But it's brought back with WOLFSSL_ALLOW_TLS_SHA1.
DoCertificateVerify fails: after call to wc_EncodeSignature following XMEMCMP fails with non-zero result.
Looks like some conditional parts of the code check for both flags (like !NO_OLD_TLS || WOLFSSL_ALLOW_TLS_SHA1), but some other SHA-related parts only check for NO_OLD_TLS, so some parts of the code don't get executed (example: HashRaw in internal.c)