Blob Blame History Raw
diff -up ./nss/lib/ssl/ssl3con.c.use_oids ./nss/lib/ssl/ssl3con.c
--- ./nss/lib/ssl/ssl3con.c.use_oids	2016-02-24 12:01:55.488253556 -0800
+++ ./nss/lib/ssl/ssl3con.c	2016-02-24 12:09:18.099513245 -0800
@@ -4950,7 +4950,7 @@ ssl3_ComputeHandshakeHashes(sslSocket *
         rv = SECFailure;
         goto tls12_loser;
     }
-    hashes->hashAlg = hashOid->offset;
+    hashes->hashAlg = ssl3_OIDToTLSHashAlgorithm(hashOid->offset);
     PORT_Assert(hashes->hashAlg == ssl_hash_sha256 ||
                 hashes->hashAlg == ssl_hash_sha384);
     if (hashes->hashAlg != ssl_hash_sha256 &&
@@ -9581,7 +9581,7 @@ ssl3_EncodeCertificateRequestSigAlgs(ssl
         /* Note that we don't support a handshake hash with anything other than
          * SHA-256, so asking for a signature from clients for something else
          * would be inviting disaster. */
-        if (alg->hashAlg == ssl_hash_sha256 /* || alg->hashAlg == ssl_hash_sha384*/) {
+        if (alg->hashAlg == ssl_hash_sha256 || alg->hashAlg == ssl_hash_sha384) {
             buf[(*len)++] = (PRUint8)alg->hashAlg;
             buf[(*len)++] = (PRUint8)alg->sigAlg;
         }