gnutls-commit
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[SCM] GNU gnutls branch, master, updated. gnutls_2_11_6-140-gb2f736f


From: Nikos Mavrogiannopoulos
Subject: [SCM] GNU gnutls branch, master, updated. gnutls_2_11_6-140-gb2f736f
Date: Wed, 09 Feb 2011 22:35:58 +0000

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU gnutls".

http://git.savannah.gnu.org/cgit/gnutls.git/commit/?id=b2f736f2cb38c6804368b2570ffbbfc151d1a61d

The branch, master has been updated
       via  b2f736f2cb38c6804368b2570ffbbfc151d1a61d (commit)
      from  262b70150677f2eeabbd05a54fb087821170b94e (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit b2f736f2cb38c6804368b2570ffbbfc151d1a61d
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Wed Feb 9 23:35:45 2011 +0100

    Allow DSA2 even in protocols before TLS 1.2.

-----------------------------------------------------------------------

Summary of changes:
 NEWS             |    6 ++++++
 lib/gnutls_sig.c |    8 --------
 2 files changed, 6 insertions(+), 8 deletions(-)

diff --git a/NEWS b/NEWS
index ba01bd7..9faf22c 100644
--- a/NEWS
+++ b/NEWS
@@ -5,6 +5,12 @@ See the end for copying conditions.
 
 * Version 2.99.0 (unreleased)
 
+** libgnutls: SRP and PSK are no longer set on the default priorities. 
+They have to be explicitly set.
+
+** libgnutls: During handshake message verification using DSS
+use the hash algorithm required by it.
+
 ** libgnutls: gnutls_recv() return GNUTLS_E_PREMATURE_TERMINATION
 on unexpected EOF, instead of GNUTLS_E_UNEXPECTED_PACKET_LENGTH.
 
diff --git a/lib/gnutls_sig.c b/lib/gnutls_sig.c
index a4c3f20..287865f 100644
--- a/lib/gnutls_sig.c
+++ b/lib/gnutls_sig.c
@@ -133,14 +133,6 @@ gnutls_protocol_t ver = gnutls_protocol_get_version 
(session);
     { /* override */
       *hash_algo = _gnutls_dsa_q_to_hash (cert->params[1]);
 
-      if (!_gnutls_version_has_selectable_sighash (ver) && *hash_algo != 
GNUTLS_DIG_SHA1)
-        {
-          /* In TLS < 1.2 one cannot use anything but SHA1
-           */
-          gnutls_assert();
-          return GNUTLS_E_INVALID_REQUEST;
-        }
-      
       ret = _gnutls_session_sign_algo_requested(session, 
_gnutls_x509_pk_to_sign (GNUTLS_PK_DSA, *hash_algo));
       if (ret < 0)
         return gnutls_assert_val(ret);


hooks/post-receive
-- 
GNU gnutls



reply via email to

[Prev in Thread] Current Thread [Next in Thread]