Blame SPECS/openssl-1.1.1-no-weak-verify.patch
|
Packit Service |
084de1 |
diff -up openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify openssl-1.1.1b/crypto/asn1/a_verify.c
|
|
Packit Service |
084de1 |
--- openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify 2019-02-26 15:15:30.000000000 +0100
|
|
Packit Service |
084de1 |
+++ openssl-1.1.1b/crypto/asn1/a_verify.c 2019-02-28 11:25:31.531862873 +0100
|
|
Packit Service |
084de1 |
@@ -7,6 +7,9 @@
|
|
Packit Service |
084de1 |
* https://www.openssl.org/source/license.html
|
|
Packit Service |
084de1 |
*/
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
+/* for secure_getenv */
|
|
Packit Service |
084de1 |
+#define _GNU_SOURCE
|
|
Packit Service |
084de1 |
+
|
|
Packit Service |
084de1 |
#include <stdio.h>
|
|
Packit Service |
084de1 |
#include <time.h>
|
|
Packit Service |
084de1 |
#include <sys/types.h>
|
|
Packit Service |
084de1 |
@@ -130,6 +133,12 @@ int ASN1_item_verify(const ASN1_ITEM *it
|
|
Packit Service |
084de1 |
if (ret != 2)
|
|
Packit Service |
084de1 |
goto err;
|
|
Packit Service |
084de1 |
ret = -1;
|
|
Packit Service |
084de1 |
+ } else if ((mdnid == NID_md5
|
|
Packit Service |
084de1 |
+ && secure_getenv("OPENSSL_ENABLE_MD5_VERIFY") == NULL) ||
|
|
Packit Service |
084de1 |
+ mdnid == NID_md4 || mdnid == NID_md2 || mdnid == NID_sha) {
|
|
Packit Service |
084de1 |
+ ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
|
|
Packit Service |
084de1 |
+ ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
|
|
Packit Service |
084de1 |
+ goto err;
|
|
Packit Service |
084de1 |
} else {
|
|
Packit Service |
084de1 |
const EVP_MD *type = EVP_get_digestbynid(mdnid);
|
|
Packit Service |
084de1 |
|