Remove the hard-coded SHA-1 exception for sigalgs.
This is completely a no-op as currently tls12_get_psigalgs always returns a hardcoded list which always includes SHA-1. But if this were to be made configurable in the future, we should reject SHA-1 when configured to do so. Change-Id: I7ab188eeff850d1e5f70b9522304812bab2d941a Reviewed-on: https://boringssl-review.googlesource.com/6411 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
5d5e39f5d2
commit
788be4a3f4
@ -697,8 +697,7 @@ int tls12_check_peer_sigalg(const EVP_MD **out_md, int *out_alert, SSL *s,
|
||||
}
|
||||
}
|
||||
|
||||
/* Allow fallback to SHA-1. */
|
||||
if (i == sent_sigslen && hash != TLSEXT_hash_sha1) {
|
||||
if (i == sent_sigslen) {
|
||||
OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_SIGNATURE_TYPE);
|
||||
*out_alert = SSL_AD_ILLEGAL_PARAMETER;
|
||||
return 0;
|
||||
|
Loading…
Reference in New Issue
Block a user