From: Paul Yang Date: Mon, 25 Feb 2019 09:34:03 +0000 (+0800) Subject: Fix the default digest algorthm of SM2 X-Git-Tag: OpenSSL_1_1_1c~131 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=9c6d536f532a737216f2ae0e7d168c99ed989a0d;p=oweals%2Fopenssl.git Fix the default digest algorthm of SM2 Currently SM2 shares the ameth with EC, so the current default digest algorithm returned is SHA256. This fixes the default digest algorithm of SM2 to SM3, which is the only valid digest algorithm for SM2 signature. Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/8186) (cherry picked from commit e766f4a0531bffdab8ad2038279b755928d7a40a) --- diff --git a/crypto/ec/ec_ameth.c b/crypto/ec/ec_ameth.c index 8b363e096b..48aa80155a 100644 --- a/crypto/ec/ec_ameth.c +++ b/crypto/ec/ec_ameth.c @@ -504,7 +504,12 @@ static int ec_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) #endif case ASN1_PKEY_CTRL_DEFAULT_MD_NID: - *(int *)arg2 = NID_sha256; + if (EVP_PKEY_id(pkey) == EVP_PKEY_SM2) { + /* For SM2, the only valid digest-alg is SM3 */ + *(int *)arg2 = NID_sm3; + } else { + *(int *)arg2 = NID_sha256; + } return 1; case ASN1_PKEY_CTRL_SET1_TLS_ENCPT: