@@ -12977,10 +12977,10 @@ static int test_tls_bad_legacy_version(void)
1297712977#if defined(WOLFSSL_TLS13) && !defined(WOLFSSL_ALLOW_BAD_TLS_LEGACY_VERSION)
1297812978#if !defined(NO_WOLFSSL_SERVER) && !defined(NO_TLS) && \
1297912979 !defined(NO_FILESYSTEM) && (!defined(NO_RSA) || defined(HAVE_ECC))
12980- /* This is exactly the same as the buffer in test_tls_ext_duplicate() except
12981- * the 11th byte is set to 0x04. That change means the legacy protocol
12982- * version field is invalid. That will be caught before the dulplicate
12983- * signature algorithms extension. */
12980+ /* This buffer (prior to Extensions) is exactly the same as the buffer in
12981+ * test_tls_ext_duplicate() except the 11th byte is set to 0x04. That
12982+ * change means the legacy protocol version field is invalid. That will be
12983+ * caught before the dulplicate signature algorithms extension. */
1298412984 const unsigned char clientHelloBadLegacyVersion[] = {
1298512985 0x16, 0x03, 0x03, 0x00, 0x6a, 0x01, 0x00, 0x00,
1298612986 0x66, 0x03, 0x04, 0xf4, 0x65, 0xbd, 0x22, 0xfe,
@@ -12993,9 +12993,9 @@ static int test_tls_bad_legacy_version(void)
1299312993 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
1299412994 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x13, 0x01,
1299512995 0x00, 0x9e, 0x01, 0x00,
12996- /* Extensions - duplicate signature algorithms. */
12996+ /* Extensions */
1299712997 0x00, 0x19, 0x00, 0x0d,
12998- 0x00, 0x04, 0x00, 0x02, 0x04, 0x01, 0x00, 0x0d ,
12998+ 0x00, 0x04, 0x00, 0x02, 0x04, 0x01, 0x00, 0x15 ,
1299912999 0x00, 0x04, 0x00, 0x02, 0x04, 0x01,
1300013000 /* Supported Versions extension for TLS 1.3. */
1300113001 0x00, 0x2b,
0 commit comments