Blame SOURCES/openssl-1.0.1e-cve-2015-7575.patch

e9d757
diff -up openssl-1.0.1e/ssl/t1_lib.c.no-md5-tls openssl-1.0.1e/ssl/t1_lib.c
e9d757
--- openssl-1.0.1e/ssl/t1_lib.c.no-md5-tls	2015-12-04 09:51:39.000000000 +0100
e9d757
+++ openssl-1.0.1e/ssl/t1_lib.c	2015-12-21 14:09:35.239084727 +0100
e9d757
@@ -390,19 +390,11 @@ static unsigned char tls12_sigalgs[] = {
e9d757
 #ifndef OPENSSL_NO_SHA
e9d757
 	tlsext_sigalg(TLSEXT_hash_sha1)
e9d757
 #endif
e9d757
-#ifndef OPENSSL_NO_MD5
e9d757
-	tlsext_sigalg_rsa(TLSEXT_hash_md5)
e9d757
-#endif
e9d757
 };
e9d757
 
e9d757
 int tls12_get_req_sig_algs(SSL *s, unsigned char *p)
e9d757
 	{
e9d757
 	size_t slen = sizeof(tls12_sigalgs);
e9d757
-#ifdef OPENSSL_FIPS
e9d757
-	/* If FIPS mode don't include MD5 which is last */
e9d757
-	if (FIPS_mode())
e9d757
-		slen -= 2;
e9d757
-#endif
e9d757
 	if (p)
e9d757
 		memcpy(p, tls12_sigalgs, slen);
e9d757
 	return (int)slen;
e9d757
@@ -2413,14 +2405,6 @@ const EVP_MD *tls12_get_hash(unsigned ch
e9d757
 	{
e9d757
 	switch(hash_alg)
e9d757
 		{
e9d757
-#ifndef OPENSSL_NO_MD5
e9d757
-		case TLSEXT_hash_md5:
e9d757
-#ifdef OPENSSL_FIPS
e9d757
-		if (FIPS_mode())
e9d757
-			return NULL;
e9d757
-#endif
e9d757
-		return EVP_md5();
e9d757
-#endif
e9d757
 #ifndef OPENSSL_NO_SHA
e9d757
 		case TLSEXT_hash_sha1:
e9d757
 		return EVP_sha1();