diff options
author | Werner Koch <[email protected]> | 2020-08-13 09:19:22 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2020-08-13 09:19:22 +0000 |
commit | 53d84f98157070f24dc861f1a75980474d074ddb (patch) | |
tree | 0009f8fa9c96a9ecbb3a66637fc062dc66fc5cd9 /g10/sign.c | |
parent | doc: Add a list of RFCS to DETAIL. (diff) | |
download | gnupg-53d84f98157070f24dc861f1a75980474d074ddb.tar.gz gnupg-53d84f98157070f24dc861f1a75980474d074ddb.zip |
gpg: Ignore personal_digest_prefs for ECDSA keys.
* g10/sign.c (hash_for): Simplify hash algo selection for ECDSA.
--
GnuPG-bug-id: 5021
Signed-off-by: Werner Koch <[email protected]>
Diffstat (limited to 'g10/sign.c')
-rw-r--r-- | g10/sign.c | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/g10/sign.c b/g10/sign.c index bc46444f6..9fa11c564 100644 --- a/g10/sign.c +++ b/g10/sign.c @@ -597,7 +597,7 @@ openpgp_card_v1_p (PKT_public_key *pk) } - +/* Get a matching hash algorithm for DSA and ECDSA. */ static int match_dsa_hash (unsigned int qbytes) { @@ -674,9 +674,13 @@ hash_for (PKT_public_key *pk) 160-bit hash unless --enable-dsa2 is set, in which case act like a new DSA key that just happens to have a 160-bit q (i.e. allow truncation). If q is not 160, by definition it - must be a new DSA key. */ + must be a new DSA key. We ignore the personal_digest_prefs + for ECDSA because they should always macth the curve and + truncated hashes are not useful either. Even worse, + smartcards may reject non matching hash lengths for curves + (e.g. using SHA-512 with brainpooolP385r1 on a Yubikey). */ - if (opt.personal_digest_prefs) + if (pk->pubkey_algo == PUBKEY_ALGO_DSA && opt.personal_digest_prefs) { prefitem_t *prefs; |