Blame SOURCES/nss-3.66-disable-signature-policies.patch

1b57e1
diff -up ./lib/pk11wrap/pk11pars.c.no_signature_policy ./lib/pk11wrap/pk11pars.c
1b57e1
--- ./lib/pk11wrap/pk11pars.c.no_signature_policy	2021-06-03 10:08:49.988118880 -0700
1b57e1
+++ ./lib/pk11wrap/pk11pars.c	2021-06-03 10:16:26.059935708 -0700
1b57e1
@@ -391,12 +391,9 @@ static const oidValDef signOptList[] = {
18ce8e
     /* Signatures */
18ce8e
     { CIPHER_NAME("DSA"), SEC_OID_ANSIX9_DSA_SIGNATURE,
18ce8e
       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE },
18ce8e
-    { CIPHER_NAME("RSA-PKCS"), SEC_OID_PKCS1_RSA_ENCRYPTION,
18ce8e
-      NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE },
18ce8e
-    { CIPHER_NAME("RSA-PSS"), SEC_OID_PKCS1_RSA_PSS_SIGNATURE,
18ce8e
-      NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE },
18ce8e
-    { CIPHER_NAME("ECDSA"), SEC_OID_ANSIX962_EC_PUBLIC_KEY,
18ce8e
-      NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE },
1b57e1
+    { CIPHER_NAME("RSA-PKCS"), SEC_OID_PKCS1_RSA_ENCRYPTION, 0},
1b57e1
+    { CIPHER_NAME("RSA-PSS"), SEC_OID_PKCS1_RSA_PSS_SIGNATURE, 0},
1b57e1
+    { CIPHER_NAME("ECDSA"), SEC_OID_ANSIX962_EC_PUBLIC_KEY, 0},
18ce8e
 };
18ce8e
 
18ce8e
 typedef struct {
1b57e1
@@ -412,7 +409,7 @@ static const algListsDef algOptLists[] =
18ce8e
     { macOptList, PR_ARRAY_SIZE(macOptList), "MAC", PR_FALSE },
18ce8e
     { cipherOptList, PR_ARRAY_SIZE(cipherOptList), "CIPHER", PR_FALSE },
18ce8e
     { kxOptList, PR_ARRAY_SIZE(kxOptList), "OTHER-KX", PR_FALSE },
18ce8e
-    { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_FALSE },
18ce8e
+    { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_TRUE },
18ce8e
 };
18ce8e
 
18ce8e
 static const optionFreeDef sslOptList[] = {
18ce8e
diff -up ./tests/ssl/sslpolicy.txt.policy_revert ./tests/ssl/sslpolicy.txt
18ce8e
--- ./tests/ssl/sslpolicy.txt.policy_revert	2020-11-04 10:31:20.837715397 -0800
18ce8e
+++ ./tests/ssl/sslpolicy.txt	2020-11-04 10:33:19.598357223 -0800
18ce8e
@@ -193,7 +193,9 @@
18ce8e
   1 noECC  SSL3   d    disallow=all_allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly Narrow
18ce8e
   1 noECC  SSL3   d    disallow=all_allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly
18ce8e
   0 noECC  SSL3   d    disallow=dsa Disallow DSA Signatures Explicitly
18ce8e
-  1 noECC  SSL3   d    disallow=rsa-pkcs Disallow RSA PKCS 1 Signatures Explicitly
18ce8e
+# rsa-pkcs, rsa-pss, and ecdsa policy checking reverted in rhel8 for binary
18ce8e
+# compatibility reasons
18ce8e
+#  1 noECC  SSL3   d    disallow=rsa-pkcs Disallow RSA PKCS 1 Signatures Explicitly
18ce8e
 # test default settings
18ce8e
 # NOTE: tstclient will attempt to overide the defaults, so we detect we
18ce8e
 # were successful by locking in our settings