Stop checking key-cert match systematically
diff --git a/ChangeLog b/ChangeLog
index 8e1434a..9f97da7 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -27,6 +27,8 @@
* Fix potential memory leak in ssl_set_psk() (found by Mansour Moufid).
Changes
+ * ssl_set_own_cert() now longers calls pk_check_pair() since the
+ performance impact was bad for some users (this was introduced in 1.3.10).
* Move from SHA-1 to SHA-256 in example programs using signatures
(suggested by Thorsten Mühlfelder).
* Remove some unneeded inclusions of header files from the standard library
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index d83ec74..77bb9ad 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -3973,7 +3973,7 @@
key_cert->cert = own_cert;
key_cert->key = pk_key;
- return( pk_check_pair( &key_cert->cert->pk, key_cert->key ) );
+ return( 0 );
}
#if defined(POLARSSL_RSA_C)
@@ -4002,7 +4002,7 @@
key_cert->cert = own_cert;
key_cert->key_own_alloc = 1;
- return( pk_check_pair( &key_cert->cert->pk, key_cert->key ) );
+ return( 0 );
}
#endif /* POLARSSL_RSA_C */
@@ -4031,7 +4031,7 @@
key_cert->cert = own_cert;
key_cert->key_own_alloc = 1;
- return( pk_check_pair( &key_cert->cert->pk, key_cert->key ) );
+ return( 0 );
}
#endif /* POLARSSL_X509_CRT_PARSE_C */