Blame SOURCES/net-snmp-5.8-digest-from-ECC.patch

6af263
From a1968db524e087a36a19a351b89bf6f1633819aa Mon Sep 17 00:00:00 2001
6af263
From: minfrin <minfrin@users.noreply.github.com>
6af263
Date: Tue, 5 Jan 2021 23:17:14 +0000
6af263
Subject: [PATCH] Add support for digests detected from ECC certificates
6af263
6af263
Previously, the digest could be detected on RSA certificates only. This
6af263
patch adds detection for ECC certificates.
6af263
6af263
[ bvanassche: changed _htmap2 into a two-dimensional array and renamed _htmap2
6af263
  back to _htmap ]
6af263
---
6af263
 snmplib/snmp_openssl.c | 60 +++++++++++++++++++++++++++++++++++-------
6af263
 1 file changed, 50 insertions(+), 10 deletions(-)
6af263
6af263
diff --git a/snmplib/snmp_openssl.c b/snmplib/snmp_openssl.c
6af263
index c092a007af..432cb5c27c 100644
6af263
--- a/snmplib/snmp_openssl.c
6af263
+++ b/snmplib/snmp_openssl.c
6af263
@@ -521,18 +521,54 @@ netsnmp_openssl_cert_dump_extensions(X509 *ocert)
6af263
     }
6af263
 }
6af263
 
6af263
-static int _htmap[NS_HASH_MAX + 1] = {
6af263
-    0, NID_md5WithRSAEncryption, NID_sha1WithRSAEncryption,
6af263
-    NID_sha224WithRSAEncryption, NID_sha256WithRSAEncryption,
6af263
-    NID_sha384WithRSAEncryption, NID_sha512WithRSAEncryption };
6af263
+static const struct {
6af263
+    uint16_t nid;
6af263
+    uint16_t ht;
6af263
+} _htmap[] = {
6af263
+    { 0, NS_HASH_NONE },
6af263
+#ifdef NID_md5WithRSAEncryption
6af263
+    { NID_md5WithRSAEncryption, NS_HASH_MD5 },
6af263
+#endif
6af263
+#ifdef NID_sha1WithRSAEncryption
6af263
+    { NID_sha1WithRSAEncryption, NS_HASH_SHA1 },
6af263
+#endif
6af263
+#ifdef NID_ecdsa_with_SHA1
6af263
+    { NID_ecdsa_with_SHA1, NS_HASH_SHA1 },
6af263
+#endif
6af263
+#ifdef NID_sha224WithRSAEncryption
6af263
+    { NID_sha224WithRSAEncryption, NS_HASH_SHA224 },
6af263
+#endif
6af263
+#ifdef NID_ecdsa_with_SHA224
6af263
+    { NID_ecdsa_with_SHA224, NS_HASH_SHA224 },
6af263
+#endif
6af263
+#ifdef NID_sha256WithRSAEncryption
6af263
+    { NID_sha256WithRSAEncryption, NS_HASH_SHA256 },
6af263
+#endif
6af263
+#ifdef NID_ecdsa_with_SHA256
6af263
+    { NID_ecdsa_with_SHA256, NS_HASH_SHA256 },
6af263
+#endif
6af263
+#ifdef NID_sha384WithRSAEncryption
6af263
+    { NID_sha384WithRSAEncryption, NS_HASH_SHA384 },
6af263
+#endif
6af263
+#ifdef NID_ecdsa_with_SHA384
6af263
+    { NID_ecdsa_with_SHA384, NS_HASH_SHA384 },
6af263
+#endif
6af263
+#ifdef NID_sha512WithRSAEncryption
6af263
+    { NID_sha512WithRSAEncryption, NS_HASH_SHA512 },
6af263
+#endif
6af263
+#ifdef NID_ecdsa_with_SHA512
6af263
+    { NID_ecdsa_with_SHA512, NS_HASH_SHA512 },
6af263
+#endif
6af263
+};
6af263
 
6af263
 int
6af263
 _nid2ht(int nid)
6af263
 {
6af263
     int i;
6af263
-    for (i=1; i<= NS_HASH_MAX; ++i) {
6af263
-        if (nid == _htmap[i])
6af263
-            return i;
6af263
+
6af263
+    for (i = 0; i < sizeof(_htmap) / sizeof(_htmap[0]); i++) {
6af263
+        if (_htmap[i].nid == nid)
6af263
+            return _htmap[i].ht;
6af263
     }
6af263
     return 0;
6af263
 }
6af263
@@ -541,9 +577,13 @@ _nid2ht(int nid)
6af263
 int
6af263
 _ht2nid(int ht)
6af263
 {
6af263
-    if ((ht < 0) || (ht > NS_HASH_MAX))
6af263
-        return 0;
6af263
-    return _htmap[ht];
6af263
+    int i;
6af263
+
6af263
+    for (i = 0; i < sizeof(_htmap) / sizeof(_htmap[0]); i++) {
6af263
+        if (_htmap[i].ht == ht)
6af263
+            return _htmap[i].nid;
6af263
+    }
6af263
+    return 0;
6af263
 }
6af263
 #endif /* NETSNMP_FEATURE_REMOVE_OPENSSL_HT2NID */
6af263
 
6af263