Add SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST to the list of allowed smimetk_branch
authorchrisk%netscape.com
Mon, 12 Jun 2000 22:41:55 +0000
branchsmimetk_branch
changeset 359 d2cafc99bbc3f6f1610aeaba89e227c1b343fe07
parent 356 761ff0bd75415f1b7088144bcc2c7dad53f74f4c
child 360 a2900e842b0ee950e69aec220a45bdd6305ee341
push idunknown
push userunknown
push dateunknown
Add SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST to the list of allowed signature algorithms
security/nss/lib/smime/cmssiginfo.c
--- a/security/nss/lib/smime/cmssiginfo.c
+++ b/security/nss/lib/smime/cmssiginfo.c
@@ -287,16 +287,17 @@ NSS_CMSSignerInfo_Verify(NSSCMSSignerInf
      * would do the right thing (and set an error if it could not);
      * then additional algorithms could be handled by that code
      * and we would Just Work.  So this check should just be removed,
      * but not until the VFY code is better at setting errors.
      */
     switch (SECOID_GetAlgorithmTag(&(signerinfo->digestEncAlg))) {
     case SEC_OID_PKCS1_RSA_ENCRYPTION:
     case SEC_OID_ANSIX9_DSA_SIGNATURE:
+    case SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST:
 	/* ok */
 	break;
     case SEC_OID_UNKNOWN:
 	vs = NSSCMSVS_SignatureAlgorithmUnknown;
 	goto loser;
     default:
 	vs = NSSCMSVS_SignatureAlgorithmUnsupported;
 	goto loser;