diff options
author | Theo Buehler <tb@cvs.openbsd.org> | 2023-07-02 13:26:37 +0000 |
---|---|---|
committer | Theo Buehler <tb@cvs.openbsd.org> | 2023-07-02 13:26:37 +0000 |
commit | def0dc35e0d75ea668b007faf26b5ee717b133e2 (patch) | |
tree | 9c57ad0accd0d7360e1b8332329466bce3747ea9 /lib/libcrypto | |
parent | 8ee1519364ae8ca01a0ae54d39c409f22aa91807 (diff) |
Revert hunk accidentally committed in r1.39
Diffstat (limited to 'lib/libcrypto')
-rw-r--r-- | lib/libcrypto/ecdsa/ecs_ossl.c | 12 |
1 files changed, 1 insertions, 11 deletions
diff --git a/lib/libcrypto/ecdsa/ecs_ossl.c b/lib/libcrypto/ecdsa/ecs_ossl.c index b8a03447531..728c07d8bbe 100644 --- a/lib/libcrypto/ecdsa/ecs_ossl.c +++ b/lib/libcrypto/ecdsa/ecs_ossl.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ecs_ossl.c,v 1.43 2023/07/02 13:18:54 tb Exp $ */ +/* $OpenBSD: ecs_ossl.c,v 1.44 2023/07/02 13:26:36 tb Exp $ */ /* * Written by Nils Larsch for the OpenSSL project */ @@ -378,16 +378,6 @@ ossl_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len, break; } while (1); - /* - * Ensure that the signature generated can be verified. This ensures - * that our implementation is correct, while also potentially detecting - * some forms of side-channel attacks. - */ - if (ECDSA_do_verify(dgst, dgst_len, ret, eckey) <= 0) { - ECDSAerror(ERR_R_EC_LIB); - goto err; - } - ok = 1; err: |