From 5ee3046bc9b8517bb6de5eda34f03ee907f9ff16 Mon Sep 17 00:00:00 2001 From: lloyd Date: Wed, 28 Dec 2011 16:08:42 +0000 Subject: Working though hacking client verify (server side only). Only supports TLS 1.0/1.1, SSLv3 uses a different hash format. Only RSA certs tested so far. --- src/tls/cert_ver.cpp | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src/tls/cert_ver.cpp') diff --git a/src/tls/cert_ver.cpp b/src/tls/cert_ver.cpp index 0d8256e5e..4203e2542 100644 --- a/src/tls/cert_ver.cpp +++ b/src/tls/cert_ver.cpp @@ -1,6 +1,6 @@ /* * Certificate Verify Message -* (C) 2004-2010 Jack Lloyd +* (C) 2004-2011 Jack Lloyd * * Released under the terms of the Botan license */ @@ -20,7 +20,7 @@ namespace Botan { */ Certificate_Verify::Certificate_Verify(RandomNumberGenerator& rng, Record_Writer& writer, - HandshakeHash& hash, + TLS_Handshake_Hash& hash, const Private_Key* priv_key) { std::string padding = ""; @@ -71,7 +71,7 @@ void Certificate_Verify::deserialize(const MemoryRegion& buf) * Verify a Certificate Verify message */ bool Certificate_Verify::verify(const X509_Certificate& cert, - HandshakeHash& hash) + TLS_Handshake_Hash& hash) { // FIXME: duplicate of Server_Key_Exchange::verify @@ -92,7 +92,7 @@ bool Certificate_Verify::verify(const X509_Certificate& cert, " is invalid/unknown for TLS signatures"); PK_Verifier verifier(*key, padding, format); - return verifier.verify_message(hash.final(), signature); + return verifier.verify_message(hash.get_contents(), signature); } } -- cgit v1.2.3