aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_extensions.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2012-01-20 19:05:42 +0000
committerlloyd <[email protected]>2012-01-20 19:05:42 +0000
commit415efed94cb5b185ae31140285a6a5e2fef64765 (patch)
tree133f06f0a00fe635ef1803125a76cc2bf88e07f3 /src/tls/tls_extensions.cpp
parent04cf1cd6fcd56c537b5ae4d339e83df67a4094e3 (diff)
Instead of using a hardcoded value for signature_algothms, go with
policy. Only functional change here from before is we now send DSA with SHA-2. This is fine, OpenSSL does it as well and while the spec says to wait until NIST comes up with a way to prevent hash impersonation, it doesn't really make sense to avoid possible hash substitution attacks by using the weakest available hash...
Diffstat (limited to 'src/tls/tls_extensions.cpp')
-rw-r--r--src/tls/tls_extensions.cpp15
1 files changed, 0 insertions, 15 deletions
diff --git a/src/tls/tls_extensions.cpp b/src/tls/tls_extensions.cpp
index 41977f975..4fbcdbad1 100644
--- a/src/tls/tls_extensions.cpp
+++ b/src/tls/tls_extensions.cpp
@@ -365,21 +365,6 @@ MemoryVector<byte> Signature_Algorithms::serialize() const
return buf;
}
-Signature_Algorithms::Signature_Algorithms()
- {
- /*
- Declare we support everything except MD5 for RSA, and SHA-1 with DSA.
- We prefer hashes strongest (SHA-512) to weakest (SHA-1).
- */
-
- m_supported_algos.push_back(std::make_pair("SHA-512", "RSA"));
- m_supported_algos.push_back(std::make_pair("SHA-384", "RSA"));
- m_supported_algos.push_back(std::make_pair("SHA-256", "RSA"));
- m_supported_algos.push_back(std::make_pair("SHA-224", "RSA"));
- m_supported_algos.push_back(std::make_pair("SHA-1", "RSA"));
- m_supported_algos.push_back(std::make_pair("SHA-1", "DSA"));
- }
-
Signature_Algorithms::Signature_Algorithms(TLS_Data_Reader& reader,
u16bit extension_size)
{