diff options
| author | beck <> | 2018-11-10 01:19:09 +0000 |
|---|---|---|
| committer | beck <> | 2018-11-10 01:19:09 +0000 |
| commit | a63c042c294065378076f342043234c8efa620b2 (patch) | |
| tree | 7a38d18aacac062bf470573f237552369c229a80 /src/lib/libssl/ssl_sigalgs.c | |
| parent | da35d1b222c4d16415d4e8a784a03c57b1bc56ed (diff) | |
| download | openbsd-a63c042c294065378076f342043234c8efa620b2.tar.gz openbsd-a63c042c294065378076f342043234c8efa620b2.tar.bz2 openbsd-a63c042c294065378076f342043234c8efa620b2.zip | |
Stop keeping track of sigalgs by guessing it from digest and pkey,
just keep the sigalg around so we can remember what we actually
decided to use.
ok jsing@
Diffstat (limited to 'src/lib/libssl/ssl_sigalgs.c')
| -rw-r--r-- | src/lib/libssl/ssl_sigalgs.c | 21 |
1 files changed, 5 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_sigalgs.c b/src/lib/libssl/ssl_sigalgs.c index 3f82117dcf..5259ea676a 100644 --- a/src/lib/libssl/ssl_sigalgs.c +++ b/src/lib/libssl/ssl_sigalgs.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.3 2018/11/09 05:43:39 beck Exp $ */ | 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.4 2018/11/10 01:19:09 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018, Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -143,7 +143,7 @@ const struct ssl_sigalg sigalgs[] = { | |||
| 143 | .value = SIGALG_RSA_PKCS1_SHA1, | 143 | .value = SIGALG_RSA_PKCS1_SHA1, |
| 144 | .key_type = EVP_PKEY_RSA, | 144 | .key_type = EVP_PKEY_RSA, |
| 145 | .pkey_idx = SSL_PKEY_RSA_SIGN, | 145 | .pkey_idx = SSL_PKEY_RSA_SIGN, |
| 146 | .md = EVP_sha1, | 146 | .md = EVP_md5_sha1, |
| 147 | }, | 147 | }, |
| 148 | { | 148 | { |
| 149 | .value = SIGALG_ECDSA_SHA1, | 149 | .value = SIGALG_ECDSA_SHA1, |
| @@ -187,8 +187,8 @@ ssl_sigalg_lookup(uint16_t sigalg) | |||
| 187 | return NULL; | 187 | return NULL; |
| 188 | } | 188 | } |
| 189 | 189 | ||
| 190 | const EVP_MD * | 190 | const struct ssl_sigalg * |
| 191 | ssl_sigalg_md(uint16_t sigalg, uint16_t *values, size_t len) | 191 | ssl_sigalg(uint16_t sigalg, uint16_t *values, size_t len) |
| 192 | { | 192 | { |
| 193 | const struct ssl_sigalg *sap; | 193 | const struct ssl_sigalg *sap; |
| 194 | int i; | 194 | int i; |
| @@ -199,23 +199,12 @@ ssl_sigalg_md(uint16_t sigalg, uint16_t *values, size_t len) | |||
| 199 | } | 199 | } |
| 200 | if (values[i] == sigalg) { | 200 | if (values[i] == sigalg) { |
| 201 | if ((sap = ssl_sigalg_lookup(sigalg)) != NULL) | 201 | if ((sap = ssl_sigalg_lookup(sigalg)) != NULL) |
| 202 | return sap->md(); | 202 | return sap; |
| 203 | } | 203 | } |
| 204 | 204 | ||
| 205 | return NULL; | 205 | return NULL; |
| 206 | } | 206 | } |
| 207 | 207 | ||
| 208 | int | ||
| 209 | ssl_sigalg_pkey_check(uint16_t sigalg, EVP_PKEY *pk) | ||
| 210 | { | ||
| 211 | const struct ssl_sigalg *sap; | ||
| 212 | |||
| 213 | if ((sap = ssl_sigalg_lookup(sigalg)) != NULL) | ||
| 214 | return sap->key_type == pk->type; | ||
| 215 | |||
| 216 | return 0; | ||
| 217 | } | ||
| 218 | |||
| 219 | uint16_t | 208 | uint16_t |
| 220 | ssl_sigalg_value(const EVP_PKEY *pk, const EVP_MD *md) | 209 | ssl_sigalg_value(const EVP_PKEY *pk, const EVP_MD *md) |
| 221 | { | 210 | { |
