summaryrefslogtreecommitdiffstats
path: root/crypto/x509/x509_set.c
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2020-03-09 09:05:27 +0000
committerMatt Caswell <matt@openssl.org>2020-03-11 14:56:05 +0000
commit63fa6f2e4ba7641fd5f10c70eaa0c3a4b42e124c (patch)
treecc72e2f7ac427de5ec93dfbad01b6a051721f814 /crypto/x509/x509_set.c
parent004f570821b1a92cbb733d8e03b54223231bfac3 (diff)
Revert "Stop accepting certificates signed using SHA1 at security level 1"
This reverts commit 68436f0a8964e911eb4f864bc8b31d7ca4d29585. The OMC did not vote in favour of backporting this to 1.1.1, so this change should be reverted. Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11282)
Diffstat (limited to 'crypto/x509/x509_set.c')
-rw-r--r--crypto/x509/x509_set.c14
1 files changed, 0 insertions, 14 deletions
diff --git a/crypto/x509/x509_set.c b/crypto/x509/x509_set.c
index deb7722c18..164b4e2be1 100644
--- a/crypto/x509/x509_set.c
+++ b/crypto/x509/x509_set.c
@@ -222,20 +222,6 @@ static void x509_sig_info_init(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
return;
/* Security bits: half number of bits in digest */
siginf->secbits = EVP_MD_size(md) * 4;
- /*
- * SHA1 and MD5 are known to be broken. Reduce security bits so that
- * they're no longer accepted at security level 1. The real values don't
- * really matter as long as they're lower than 80, which is our security
- * level 1.
- * https://eprint.iacr.org/2020/014 puts a chosen-prefix attack for SHA1 at
- * 2^63.4
- * https://documents.epfl.ch/users/l/le/lenstra/public/papers/lat.pdf
- * puts a chosen-prefix attack for MD5 at 2^39.
- */
- if (mdnid == NID_sha1)
- siginf->secbits = 63;
- else if (mdnid == NID_md5)
- siginf->secbits = 39;
switch (mdnid) {
case NID_sha1:
case NID_sha256: