diff options
-rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_ossl.c | 12 |
1 files changed, 1 insertions, 11 deletions
diff --git a/src/lib/libcrypto/ecdsa/ecs_ossl.c b/src/lib/libcrypto/ecdsa/ecs_ossl.c index b8a0344753..728c07d8bb 100644 --- a/src/lib/libcrypto/ecdsa/ecs_ossl.c +++ b/src/lib/libcrypto/ecdsa/ecs_ossl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecs_ossl.c,v 1.43 2023/07/02 13:18:54 tb Exp $ */ | 1 | /* $OpenBSD: ecs_ossl.c,v 1.44 2023/07/02 13:26:36 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Nils Larsch for the OpenSSL project | 3 | * Written by Nils Larsch for the OpenSSL project |
4 | */ | 4 | */ |
@@ -378,16 +378,6 @@ ossl_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len, | |||
378 | break; | 378 | break; |
379 | } while (1); | 379 | } while (1); |
380 | 380 | ||
381 | /* | ||
382 | * Ensure that the signature generated can be verified. This ensures | ||
383 | * that our implementation is correct, while also potentially detecting | ||
384 | * some forms of side-channel attacks. | ||
385 | */ | ||
386 | if (ECDSA_do_verify(dgst, dgst_len, ret, eckey) <= 0) { | ||
387 | ECDSAerror(ERR_R_EC_LIB); | ||
388 | goto err; | ||
389 | } | ||
390 | |||
391 | ok = 1; | 381 | ok = 1; |
392 | 382 | ||
393 | err: | 383 | err: |