summaryrefslogtreecommitdiff
path: root/lib/privkey.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2019-06-10 22:12:09 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2019-06-10 22:27:56 +0200
commit2f6defa1733c237ec0cff3b296e999653e41c156 (patch)
tree0224e712bad4e78ca8a1a5d2b2d8d969a82ec919 /lib/privkey.c
parentab6fc5a3251e8467d2e5ed3fa576488e102b6b03 (diff)
downloadgnutls-2f6defa1733c237ec0cff3b296e999653e41c156.tar.gz
gnutls_privkey_sign_hash2: accept the GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA flagtmp-fix-raw-flag-in-newapi
Previously this flag was ignored, although documented not to. This patch also enables the tests sign-verify-newapi and sign-verify-data-newapi which were supposed to test this interface, but were never enabled. This was caught by Andreas Metzler. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'lib/privkey.c')
-rw-r--r--lib/privkey.c16
1 files changed, 12 insertions, 4 deletions
diff --git a/lib/privkey.c b/lib/privkey.c
index 8b3e3557c2..8e353c5e5f 100644
--- a/lib/privkey.c
+++ b/lib/privkey.c
@@ -1207,7 +1207,8 @@ gnutls_privkey_sign_data2(gnutls_privkey_t signer,
*
* The flags may be %GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA or %GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS.
* In the former case this function will ignore @hash_algo and perform a raw PKCS1 signature,
- * and in the latter an RSA-PSS signature will be generated.
+ * and in the latter an RSA-PSS signature will be generated. Note that the flag
+ * %GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA is supported since 3.6.9.
*
* Note that, not all algorithm support signing already hashed data. When
* signing with Ed25519, gnutls_privkey_sign_data() should be used.
@@ -1228,9 +1229,16 @@ gnutls_privkey_sign_hash2(gnutls_privkey_t signer,
gnutls_x509_spki_st params;
const gnutls_sign_entry_st *se;
- se = _gnutls_sign_to_entry(algo);
- if (unlikely(se == NULL))
- return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
+ if (flags & GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA) {
+ /* the corresponding signature algorithm is SIGN_RSA_RAW,
+ * irrespective of hash algorithm. */
+ se = _gnutls_sign_to_entry(GNUTLS_SIGN_RSA_RAW);
+ } else {
+ se = _gnutls_sign_to_entry(algo);
+ if (unlikely(se == NULL))
+ return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
+
+ }
ret = _gnutls_privkey_get_spki_params(signer, &params);
if (ret < 0) {