boringssl/crypto/digest
David Benjamin d2242407bb Don't accept signature OIDs in EVP_get_digestby{nid,obj}.
This is a remnant of signature EVP_MDs. Detach them from
EVP_get_digestby{nid,obj}. Nothing appears to rely on this for those two
functions. Alas, Node.js appears to rely on it for EVP_get_digestbyname,
so keep that working.

This avoids causing every consumer's parsing to be unintentionally lax.
It also means fewer OIDs to transcribe when detaching the last of
libcrypto from the legacy ASN.1 stack and its giant OID table.

Note this is an externally visible change. There was one consumer I had
to fix, but otherwise everything handled things incorrectly due to this
quirk, so it seemed better to just fix the API rather than fork off a
second set.

Change-Id: I705e073bc05d946e71cd1c38acfa5e3c6b0a22b4
Reviewed-on: https://boringssl-review.googlesource.com/13058
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2017-01-05 23:30:48 +00:00
..
CMakeLists.txt
digest_test.cc Don't accept signature OIDs in EVP_get_digestby{nid,obj}. 2017-01-05 23:30:48 +00:00
digest.c Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00
digests.c Don't accept signature OIDs in EVP_get_digestby{nid,obj}. 2017-01-05 23:30:48 +00:00
internal.h
md32_common.h Work around language and compiler bug in memcpy, etc. 2016-12-21 20:34:47 +00:00