summaryrefslogtreecommitdiff
path: root/lib/tls13-sig.c
diff options
context:
space:
mode:
authorDaiki Ueno <ueno@gnu.org>2020-11-06 09:54:54 +0100
committerDaiki Ueno <ueno@gnu.org>2020-11-06 09:54:54 +0100
commit69e8ce64330a73e6a00c35dac8c36018083e0287 (patch)
tree6b8fba284d840d80ee0ca679e783df9d4a331c39 /lib/tls13-sig.c
parent4511d0cebd3b37d7878139fd9c6e2fda68707169 (diff)
downloadgnutls-69e8ce64330a73e6a00c35dac8c36018083e0287.tar.gz
tls-sig: defer allowed sigalg check to gnutls_pubkey_verify_data2
This reverts 485f2551e68d1b4ee70be2960f0a241b4a2b9fb9. After the new configuration file has been introduced, the allowed algorithms are checked after this part. Signed-off-by: Daiki Ueno <ueno@gnu.org>
Diffstat (limited to 'lib/tls13-sig.c')
-rw-r--r--lib/tls13-sig.c8
1 files changed, 2 insertions, 6 deletions
diff --git a/lib/tls13-sig.c b/lib/tls13-sig.c
index b14390e353..a52295faca 100644
--- a/lib/tls13-sig.c
+++ b/lib/tls13-sig.c
@@ -122,12 +122,8 @@ _gnutls13_handshake_verify_data(gnutls_session_t session,
p.data = buf.data;
p.size = buf.length;
- /* Here we intentionally enable flag GNUTLS_VERIFY_ALLOW_BROKEN
- * because we have checked whether the currently used signature
- * algorithm is allowed in the session. */
- ret = gnutls_pubkey_verify_data2(cert->pubkey, se->id,
- verify_flags|GNUTLS_VERIFY_ALLOW_BROKEN,
- &p, signature);
+ ret = gnutls_pubkey_verify_data2(cert->pubkey, se->id, verify_flags, &p,
+ signature);
if (ret < 0) {
gnutls_assert();
goto cleanup;