Blame SPECS/openssl-1.1.1-no-weak-verify.patch

Packit Service 084de1
diff -up openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify openssl-1.1.1b/crypto/asn1/a_verify.c
Packit Service 084de1
--- openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify	2019-02-26 15:15:30.000000000 +0100
Packit Service 084de1
+++ openssl-1.1.1b/crypto/asn1/a_verify.c	2019-02-28 11:25:31.531862873 +0100
Packit Service 084de1
@@ -7,6 +7,9 @@
Packit Service 084de1
  * https://www.openssl.org/source/license.html
Packit Service 084de1
  */
Packit Service 084de1
 
Packit Service 084de1
+/* for secure_getenv */
Packit Service 084de1
+#define _GNU_SOURCE
Packit Service 084de1
+
Packit Service 084de1
 #include <stdio.h>
Packit Service 084de1
 #include <time.h>
Packit Service 084de1
 #include <sys/types.h>
Packit Service 084de1
@@ -130,6 +133,12 @@ int ASN1_item_verify(const ASN1_ITEM *it
Packit Service 084de1
         if (ret != 2)
Packit Service 084de1
             goto err;
Packit Service 084de1
         ret = -1;
Packit Service 084de1
+    } else if ((mdnid == NID_md5
Packit Service 084de1
+               && secure_getenv("OPENSSL_ENABLE_MD5_VERIFY") == NULL) ||
Packit Service 084de1
+               mdnid == NID_md4 || mdnid == NID_md2 || mdnid == NID_sha) {
Packit Service 084de1
+        ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
Packit Service 084de1
+                ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
Packit Service 084de1
+        goto err;
Packit Service 084de1
     } else {
Packit Service 084de1
         const EVP_MD *type = EVP_get_digestbynid(mdnid);
Packit Service 084de1