diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/dsa/dsa_pmeth.c | 28 | ||||
| -rw-r--r-- | src/lib/libssl/src/crypto/dsa/dsa_pmeth.c | 28 |
2 files changed, 34 insertions, 22 deletions
diff --git a/src/lib/libcrypto/dsa/dsa_pmeth.c b/src/lib/libcrypto/dsa/dsa_pmeth.c index f013a3f6e7..73e0b9fb2a 100644 --- a/src/lib/libcrypto/dsa/dsa_pmeth.c +++ b/src/lib/libcrypto/dsa/dsa_pmeth.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: dsa_pmeth.c,v 1.7 2014/07/09 10:16:24 miod Exp $ */ | 1 | /* $OpenBSD: dsa_pmeth.c,v 1.8 2014/07/09 11:08:31 miod Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -182,9 +182,12 @@ pkey_dsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) | |||
| 182 | return 1; | 182 | return 1; |
| 183 | 183 | ||
| 184 | case EVP_PKEY_CTRL_DSA_PARAMGEN_MD: | 184 | case EVP_PKEY_CTRL_DSA_PARAMGEN_MD: |
| 185 | if (EVP_MD_type((const EVP_MD *)p2) != NID_sha1 && | 185 | switch (EVP_MD_type((const EVP_MD *)p2)) { |
| 186 | EVP_MD_type((const EVP_MD *)p2) != NID_sha224 && | 186 | case NID_sha1: |
| 187 | EVP_MD_type((const EVP_MD *)p2) != NID_sha256) { | 187 | case NID_sha224: |
| 188 | case NID_sha256: | ||
| 189 | break; | ||
| 190 | default: | ||
| 188 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); | 191 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); |
| 189 | return 0; | 192 | return 0; |
| 190 | } | 193 | } |
| @@ -192,13 +195,16 @@ pkey_dsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) | |||
| 192 | return 1; | 195 | return 1; |
| 193 | 196 | ||
| 194 | case EVP_PKEY_CTRL_MD: | 197 | case EVP_PKEY_CTRL_MD: |
| 195 | if (EVP_MD_type((const EVP_MD *)p2) != NID_sha1 && | 198 | switch (EVP_MD_type((const EVP_MD *)p2)) { |
| 196 | EVP_MD_type((const EVP_MD *)p2) != NID_dsa && | 199 | case NID_sha1: |
| 197 | EVP_MD_type((const EVP_MD *)p2) != NID_dsaWithSHA && | 200 | case NID_dsa: |
| 198 | EVP_MD_type((const EVP_MD *)p2) != NID_sha224 && | 201 | case NID_dsaWithSHA: |
| 199 | EVP_MD_type((const EVP_MD *)p2) != NID_sha256 && | 202 | case NID_sha224: |
| 200 | EVP_MD_type((const EVP_MD *)p2) != NID_sha384 && | 203 | case NID_sha256: |
| 201 | EVP_MD_type((const EVP_MD *)p2) != NID_sha512) { | 204 | case NID_sha384: |
| 205 | case NID_sha512: | ||
| 206 | break; | ||
| 207 | default: | ||
| 202 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); | 208 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); |
| 203 | return 0; | 209 | return 0; |
| 204 | } | 210 | } |
diff --git a/src/lib/libssl/src/crypto/dsa/dsa_pmeth.c b/src/lib/libssl/src/crypto/dsa/dsa_pmeth.c index f013a3f6e7..73e0b9fb2a 100644 --- a/src/lib/libssl/src/crypto/dsa/dsa_pmeth.c +++ b/src/lib/libssl/src/crypto/dsa/dsa_pmeth.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: dsa_pmeth.c,v 1.7 2014/07/09 10:16:24 miod Exp $ */ | 1 | /* $OpenBSD: dsa_pmeth.c,v 1.8 2014/07/09 11:08:31 miod Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -182,9 +182,12 @@ pkey_dsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) | |||
| 182 | return 1; | 182 | return 1; |
| 183 | 183 | ||
| 184 | case EVP_PKEY_CTRL_DSA_PARAMGEN_MD: | 184 | case EVP_PKEY_CTRL_DSA_PARAMGEN_MD: |
| 185 | if (EVP_MD_type((const EVP_MD *)p2) != NID_sha1 && | 185 | switch (EVP_MD_type((const EVP_MD *)p2)) { |
| 186 | EVP_MD_type((const EVP_MD *)p2) != NID_sha224 && | 186 | case NID_sha1: |
| 187 | EVP_MD_type((const EVP_MD *)p2) != NID_sha256) { | 187 | case NID_sha224: |
| 188 | case NID_sha256: | ||
| 189 | break; | ||
| 190 | default: | ||
| 188 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); | 191 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); |
| 189 | return 0; | 192 | return 0; |
| 190 | } | 193 | } |
| @@ -192,13 +195,16 @@ pkey_dsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) | |||
| 192 | return 1; | 195 | return 1; |
| 193 | 196 | ||
| 194 | case EVP_PKEY_CTRL_MD: | 197 | case EVP_PKEY_CTRL_MD: |
| 195 | if (EVP_MD_type((const EVP_MD *)p2) != NID_sha1 && | 198 | switch (EVP_MD_type((const EVP_MD *)p2)) { |
| 196 | EVP_MD_type((const EVP_MD *)p2) != NID_dsa && | 199 | case NID_sha1: |
| 197 | EVP_MD_type((const EVP_MD *)p2) != NID_dsaWithSHA && | 200 | case NID_dsa: |
| 198 | EVP_MD_type((const EVP_MD *)p2) != NID_sha224 && | 201 | case NID_dsaWithSHA: |
| 199 | EVP_MD_type((const EVP_MD *)p2) != NID_sha256 && | 202 | case NID_sha224: |
| 200 | EVP_MD_type((const EVP_MD *)p2) != NID_sha384 && | 203 | case NID_sha256: |
| 201 | EVP_MD_type((const EVP_MD *)p2) != NID_sha512) { | 204 | case NID_sha384: |
| 205 | case NID_sha512: | ||
| 206 | break; | ||
| 207 | default: | ||
| 202 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); | 208 | DSAerr(DSA_F_PKEY_DSA_CTRL, DSA_R_INVALID_DIGEST_TYPE); |
| 203 | return 0; | 209 | return 0; |
| 204 | } | 210 | } |
