-
Notifications
You must be signed in to change notification settings - Fork 894
Open
Description
Version
v5.8.2
Description
When a TLS 1.3 client sends secp256r1 in its initial ClientHello key_share, and the server responds with a HelloRetryRequest that (incorrectly) requests the same group secp256r1 again, wolfSSL logs the error message:
TLS handshake failed: The Key Share data contains group that wasn't in Client Hello
The current message is misleading — it suggests the group was absent from ClientHello, while the actual violation is that it was already present.
It should instead correctly indicate that the group was in ClientHello.key_share, for clarity and correctness.
The expected error message should be:
TLS handshake failed: The Key Share data in HelloRetryRequest message contains group that was in ClientHello.
Steps to Reproduce
- Build and run wolfSSL with TLS 1.3 enabled (./configure --enable-tls13 --enable-debug).
- Client sends ClientHello with secp256r1 in key_share.
- Server responds with HelloRetryRequest selecting secp256r1 again (which violates the spec).
- Client fails handshake and logs the error message.
Environment
- wolfSSL version: e.g. 5.8.2
- OS / platform: macOS (Sequoia 15.2) with arm64 (Apple M2)
- Compiler version: Apple clang version 17.0.0
Metadata
Metadata
Assignees
Labels
No labels