1a7b91b
diff -up openssl-1.1.1/crypto/x509/x509_vfy.c.seclevel openssl-1.1.1/crypto/x509/x509_vfy.c
1a7b91b
--- openssl-1.1.1/crypto/x509/x509_vfy.c.seclevel	2018-09-11 14:48:22.000000000 +0200
68f387b
+++ openssl-1.1.1/crypto/x509/x509_vfy.c	2018-10-01 09:52:23.535298908 +0200
1a7b91b
@@ -3220,6 +3220,7 @@ static int build_chain(X509_STORE_CTX *c
1a7b91b
 }
1a7b91b
 
1a7b91b
 static const int minbits_table[] = { 80, 112, 128, 192, 256 };
1a7b91b
+static const int minbits_digest_table[] = { 80, 80, 128, 192, 256 };
1a7b91b
 static const int NUM_AUTH_LEVELS = OSSL_NELEM(minbits_table);
1a7b91b
 
1a7b91b
 /*
1a7b91b
@@ -3264,6 +3265,8 @@ static int check_sig_level(X509_STORE_CT
1a7b91b
 
1a7b91b
     if (!X509_get_signature_info(cert, NULL, NULL, &secbits, NULL))
1a7b91b
         return 0;
1a7b91b
-
1a7b91b
-    return secbits >= minbits_table[level - 1];
1a7b91b
+    /* Allow SHA1 in SECLEVEL 2 in non-FIPS mode */
1a7b91b
+    if (FIPS_mode())
1a7b91b
+        return secbits >= minbits_table[level - 1];
1a7b91b
+    return secbits >= minbits_digest_table[level - 1];
1a7b91b
 }
1a7b91b
diff -up openssl-1.1.1/doc/man3/SSL_CTX_set_security_level.pod.seclevel openssl-1.1.1/doc/man3/SSL_CTX_set_security_level.pod
1a7b91b
--- openssl-1.1.1/doc/man3/SSL_CTX_set_security_level.pod.seclevel	2018-09-11 14:48:22.000000000 +0200
68f387b
+++ openssl-1.1.1/doc/man3/SSL_CTX_set_security_level.pod	2018-10-01 09:52:23.535298908 +0200
1a7b91b
@@ -81,8 +81,10 @@ using MD5 for the MAC is also prohibited
1a7b91b
 
1a7b91b
 =item B<Level 2>
1a7b91b
 
1a7b91b
-Security level set to 112 bits of security. As a result RSA, DSA and DH keys
1a7b91b
-shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
1a7b91b
+Security level set to 112 bits of security with the exception of SHA1 allowed
1a7b91b
+for signatures.
1a7b91b
+As a result RSA, DSA and DH keys shorter than 2048 bits and ECC keys
1a7b91b
+shorter than 224 bits are prohibited.
1a7b91b
 In addition to the level 1 exclusions any cipher suite using RC4 is also
1a7b91b
 prohibited. SSL version 3 is also not allowed. Compression is disabled.
1a7b91b
 
1a7b91b
diff -up openssl-1.1.1/ssl/ssl_cert.c.seclevel openssl-1.1.1/ssl/ssl_cert.c
1a7b91b
--- openssl-1.1.1/ssl/ssl_cert.c.seclevel	2018-09-11 14:48:23.000000000 +0200
68f387b
+++ openssl-1.1.1/ssl/ssl_cert.c	2018-10-12 15:29:12.673799305 +0200
1a7b91b
@@ -983,6 +983,9 @@ static int ssl_security_default_callback
1a7b91b
             return 0;
1a7b91b
         break;
1a7b91b
     default:
1a7b91b
+        /* allow SHA1 in SECLEVEL 2 in non FIPS mode */
1a7b91b
+        if (nid == NID_sha1 && minbits == 112 && !FIPS_mode())
1a7b91b
+            break;
1a7b91b
         if (bits < minbits)
1a7b91b
             return 0;
1a7b91b
     }
143a3da
diff -up openssl-1.1.1/test/recipes/25-test_verify.t.seclevel openssl-1.1.1/test/recipes/25-test_verify.t
143a3da
--- openssl-1.1.1/test/recipes/25-test_verify.t.seclevel	2018-09-11 14:48:24.000000000 +0200
68f387b
+++ openssl-1.1.1/test/recipes/25-test_verify.t	2018-10-01 09:52:23.535298908 +0200
143a3da
@@ -342,8 +342,8 @@ ok(verify("ee-pss-sha1-cert", "sslserver
143a3da
 ok(verify("ee-pss-sha256-cert", "sslserver", ["root-cert"], ["ca-cert"], ),
143a3da
     "CA with PSS signature using SHA256");
143a3da
 
143a3da
-ok(!verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "2"),
143a3da
-    "Reject PSS signature using SHA1 and auth level 2");
143a3da
+ok(!verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "3"),
143a3da
+    "Reject PSS signature using SHA1 and auth level 3");
143a3da
 
143a3da
 ok(verify("ee-pss-sha256-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "2"),
143a3da
     "PSS signature using SHA256 and auth level 2");