http://bugs.gentoo.org/280591 fix from upstream http://cvs.openssl.org/chngview?cn=18260 Index: openssl/crypto/x509/x509_vfy.c RCS File: /v/openssl/cvs/openssl/crypto/x509/x509_vfy.c,v rcsdiff -q -kk '-r1.77.2.8' '-r1.77.2.9' -u '/v/openssl/cvs/openssl/crypto/x509/x509_vfy.c,v' 2>/dev/null --- a/crypto/x509/x509_vfy.c 2008/07/13 14:33:15 1.77.2.8 +++ b/crypto/x509/x509_vfy.c 2009/06/15 14:52:38 1.77.2.9 @@ -986,7 +986,11 @@ while (n >= 0) { ctx->error_depth=n; - if (!xs->valid) + + /* Skip signature check for self signed certificates. It + * doesn't add any security and just wastes time. + */ + if (!xs->valid && xs != xi) { if ((pkey=X509_get_pubkey(xi)) == NULL) { @@ -996,13 +1000,6 @@ if (!ok) goto end; } else if (X509_verify(xs,pkey) <= 0) - /* XXX For the final trusted self-signed cert, - * this is a waste of time. That check should - * optional so that e.g. 'openssl x509' can be - * used to detect invalid self-signatures, but - * we don't verify again and again in SSL - * handshakes and the like once the cert has - * been declared trusted. */ { ctx->error=X509_V_ERR_CERT_SIGNATURE_FAILURE; ctx->current_cert=xs; http://cvs.openssl.org/chngview?cn=18317 Index: openssl/crypto/evp/c_alld.c RCS File: /v/openssl/cvs/openssl/crypto/evp/c_alld.c,v rcsdiff -q -kk '-r1.7' '-r1.7.2.1' -u '/v/openssl/cvs/openssl/crypto/evp/c_alld.c,v' 2>/dev/null --- a/crypto/evp/c_alld.c 2005/04/30 21:51:40 1.7 +++ b/crypto/evp/c_alld.c 2009/07/08 08:33:26 1.7.2.1 @@ -64,9 +64,6 @@ void OpenSSL_add_all_digests(void) { -#ifndef OPENSSL_NO_MD2 - EVP_add_digest(EVP_md2()); -#endif #ifndef OPENSSL_NO_MD4 EVP_add_digest(EVP_md4()); #endif Index: openssl/ssl/ssl_algs.c RCS File: /v/openssl/cvs/openssl/ssl/ssl_algs.c,v rcsdiff -q -kk '-r1.12.2.3' '-r1.12.2.4' -u '/v/openssl/cvs/openssl/ssl/ssl_algs.c,v' 2>/dev/null --- a/ssl/ssl_algs.c 2007/04/23 23:50:21 1.12.2.3 +++ b/ssl/ssl_algs.c 2009/07/08 08:33:27 1.12.2.4 @@ -92,9 +92,6 @@ EVP_add_cipher(EVP_seed_cbc()); #endif -#ifndef OPENSSL_NO_MD2 - EVP_add_digest(EVP_md2()); -#endif #ifndef OPENSSL_NO_MD5 EVP_add_digest(EVP_md5()); EVP_add_digest_alias(SN_md5,"ssl2-md5");