[gnutls-devel] GnuTLS | pubkey: avoid spurious audit messages from _gnutls_pubkey_compatible_with_sig() (!1301)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Mon Jul 27 10:41:05 CEST 2020




Petr Pavlu commented on a discussion on lib/pubkey.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/1301#note_385781509

>  	unsigned int sig_hash_size;
>  	const mac_entry_st *me;
>  	const gnutls_sign_entry_st *se;
> +	int ret;
>  
>  	se = _gnutls_sign_to_entry(sign);
>  	if (se == NULL && _gnutls_version_has_selectable_sighash(ver))
>  		return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
>  
> +	if (se != NULL) {
> +		ret = pubkey_supports_sig(pubkey, se);
> +		if (ret < 0)
> +			return gnutls_assert_val(ret);
> +	}
> +

Applied in the updated patch, thanks.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/1301#note_385781509
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20200727/725813bc/attachment.html>


More information about the Gnutls-devel mailing list