[openssl/openssl] ea9e16: Check for EVP_MD being NULL inside ssl.
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: ea9e16d16b17d9aa1544e54e79c6438aef9b2e6e https://github.openssl.org/openssl/openssl/commit/ea9e16d16b17d9aa1544e54e79c6438aef9b2e6e Author: slontis Date: 2022-07-13 (Wed, 13 Jul 2022) Changed paths: M ssl/s3_lib.c M ssl/ssl_ciph.c M ssl/statem/extensions_srvr.c M ssl/statem/statem_clnt.c M ssl/tls13_enc.c Log Message: --- Check for EVP_MD being NULL inside ssl. Fix multiple places that could potentially segfault if memory allocations fail. e.g. ssl_load_ciphers() could fail while calling ssl_evp_md_fetch(). Found by #18355 Reviewed-by: Paul Dale Reviewed-by: Hugo Landau Reviewed-by: Dmitry Belyavskiy (Merged from https://github.com/openssl/openssl/pull/18784) (cherry picked from commit b740012f77aed97cb4b3cd8a4f1fb2f668542795)
[openssl/openssl] b74001: Check for EVP_MD being NULL inside ssl.
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: b740012f77aed97cb4b3cd8a4f1fb2f668542795 https://github.openssl.org/openssl/openssl/commit/b740012f77aed97cb4b3cd8a4f1fb2f668542795 Author: slontis Date: 2022-07-13 (Wed, 13 Jul 2022) Changed paths: M ssl/s3_lib.c M ssl/ssl_ciph.c M ssl/statem/extensions_srvr.c M ssl/statem/statem_clnt.c M ssl/tls13_enc.c Log Message: --- Check for EVP_MD being NULL inside ssl. Fix multiple places that could potentially segfault if memory allocations fail. e.g. ssl_load_ciphers() could fail while calling ssl_evp_md_fetch(). Found by #18355 Reviewed-by: Paul Dale Reviewed-by: Hugo Landau Reviewed-by: Dmitry Belyavskiy (Merged from https://github.com/openssl/openssl/pull/18784)
[openssl/openssl] f6b635: Fix memory leak in EVP_PKEY_get1_encoded_public_key.
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: f6b6356fdbee336fa2169643ca3e9ad3db19caea https://github.openssl.org/openssl/openssl/commit/f6b6356fdbee336fa2169643ca3e9ad3db19caea Author: slontis Date: 2022-07-12 (Tue, 12 Jul 2022) Changed paths: M crypto/evp/p_lib.c Log Message: --- Fix memory leak in EVP_PKEY_get1_encoded_public_key. Occurs if a failure happens after the malloc call in the second call to EVP_PKEY_get_octet_string_param(). Detected by PR #18355 Some calling code assumes that nothing is allocated in the returned pointer if there was a failure. Other calling code always trys freeing. The third case is in ecdh_cms_encrypt() where it does not check the return value. I am assuming this change is ok since the legacy path in EVP_PKEY_get1_encoded_public_key() also does not return the pointer on failure. Reviewed-by: Hugo Landau Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18739) (cherry picked from commit 4e9a4997c540e64647d4e1708a1dbda51fb59a68)
[openssl/openssl] 4e9a49: Fix memory leak in EVP_PKEY_get1_encoded_public_key.
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 4e9a4997c540e64647d4e1708a1dbda51fb59a68 https://github.openssl.org/openssl/openssl/commit/4e9a4997c540e64647d4e1708a1dbda51fb59a68 Author: slontis Date: 2022-07-12 (Tue, 12 Jul 2022) Changed paths: M crypto/evp/p_lib.c Log Message: --- Fix memory leak in EVP_PKEY_get1_encoded_public_key. Occurs if a failure happens after the malloc call in the second call to EVP_PKEY_get_octet_string_param(). Detected by PR #18355 Some calling code assumes that nothing is allocated in the returned pointer if there was a failure. Other calling code always trys freeing. The third case is in ecdh_cms_encrypt() where it does not check the return value. I am assuming this change is ok since the legacy path in EVP_PKEY_get1_encoded_public_key() also does not return the pointer on failure. Reviewed-by: Hugo Landau Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18739)
[openssl/openssl] c4a7b4: Make evp_test skip mac tests if digest or ciphers ...
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: c4a7b4ce8990e71f1c881c9f9d24a851deddf0c7 https://github.openssl.org/openssl/openssl/commit/c4a7b4ce8990e71f1c881c9f9d24a851deddf0c7 Author: slontis Date: 2022-07-11 (Mon, 11 Jul 2022) Changed paths: M test/evp_test.c Log Message: --- Make evp_test skip mac tests if digest or ciphers are disabled. Fixes test error in #18714 This only happens currently during minimal builds. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18737) (cherry picked from commit c8a016cac44d5402df3106f46c9725aa1b480e40)
[openssl/openssl] c8a016: Make evp_test skip mac tests if digest or ciphers ...
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: c8a016cac44d5402df3106f46c9725aa1b480e40 https://github.openssl.org/openssl/openssl/commit/c8a016cac44d5402df3106f46c9725aa1b480e40 Author: slontis Date: 2022-07-11 (Mon, 11 Jul 2022) Changed paths: M test/evp_test.c Log Message: --- Make evp_test skip mac tests if digest or ciphers are disabled. Fixes test error in #18714 This only happens currently during minimal builds. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18737)
[openssl/openssl] 6495ca: Fix bn_gcd code to check return value when calling...
Branch: refs/heads/OpenSSL_1_1_1-stable Home: https://github.openssl.org/openssl/openssl Commit: 6495cab1c876ad80ce983d848ccaa1dc286a63e1 https://github.openssl.org/openssl/openssl/commit/6495cab1c876ad80ce983d848ccaa1dc286a63e1 Author: slontis Date: 2022-07-05 (Tue, 05 Jul 2022) Changed paths: M crypto/bn/bn_gcd.c Log Message: --- Fix bn_gcd code to check return value when calling BN_one() BN_one() uses the expand function which calls malloc which may fail. All other places that reference BN_one() check the return value. The issue is triggered by a memory allocation failure. Detected by PR #18355 Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18697) (cherry picked from commit 7fe7cc57af3db1e497877f0329ba17609b2efc8b)
[openssl/openssl] c6b5c0: Fix bn_gcd code to check return value when calling...
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: c6b5c00c0e6a95eb68b936e0a2a55741717c642a https://github.openssl.org/openssl/openssl/commit/c6b5c00c0e6a95eb68b936e0a2a55741717c642a Author: slontis Date: 2022-07-05 (Tue, 05 Jul 2022) Changed paths: M crypto/bn/bn_gcd.c Log Message: --- Fix bn_gcd code to check return value when calling BN_one() BN_one() uses the expand function which calls malloc which may fail. All other places that reference BN_one() check the return value. The issue is triggered by a memory allocation failure. Detected by PR #18355 Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18697) (cherry picked from commit 7fe7cc57af3db1e497877f0329ba17609b2efc8b)
[openssl/openssl] 7fe7cc: Fix bn_gcd code to check return value when calling...
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 7fe7cc57af3db1e497877f0329ba17609b2efc8b https://github.openssl.org/openssl/openssl/commit/7fe7cc57af3db1e497877f0329ba17609b2efc8b Author: slontis Date: 2022-07-05 (Tue, 05 Jul 2022) Changed paths: M crypto/bn/bn_gcd.c Log Message: --- Fix bn_gcd code to check return value when calling BN_one() BN_one() uses the expand function which calls malloc which may fail. All other places that reference BN_one() check the return value. The issue is triggered by a memory allocation failure. Detected by PR #18355 Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18697)
[openssl/openssl] 9c6b98: Documentation update for EVP_set_default_properties
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 9c6b986b4a8d5222d82ebd0c81f51ce527232ae3 https://github.openssl.org/openssl/openssl/commit/9c6b986b4a8d5222d82ebd0c81f51ce527232ae3 Author: slontis Date: 2022-07-01 (Fri, 01 Jul 2022) Changed paths: M doc/man3/EVP_set_default_properties.pod Log Message: --- Documentation update for EVP_set_default_properties Explicitly state that it is not thread safe. Fixes #18613 Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz Reviewed-by: Hugo Landau (Merged from https://github.com/openssl/openssl/pull/18678) (cherry picked from commit 5c535e4692a5a4f2ec7691de4efc6290193a0882)
[openssl/openssl] 5c535e: Documentation update for EVP_set_default_properties
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 5c535e4692a5a4f2ec7691de4efc6290193a0882 https://github.openssl.org/openssl/openssl/commit/5c535e4692a5a4f2ec7691de4efc6290193a0882 Author: slontis Date: 2022-06-30 (Thu, 30 Jun 2022) Changed paths: M doc/man3/EVP_set_default_properties.pod Log Message: --- Documentation update for EVP_set_default_properties Explicitly state that it is not thread safe. Fixes #18613 Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz Reviewed-by: Hugo Landau (Merged from https://github.com/openssl/openssl/pull/18678)
[openssl/openssl] bf2f9e: Fix memory leak in cmp_calc_protection()
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: bf2f9e8b3117bbc2f4528bc91cf23b7ae689324c https://github.openssl.org/openssl/openssl/commit/bf2f9e8b3117bbc2f4528bc91cf23b7ae689324c Author: slontis Date: 2022-06-29 (Wed, 29 Jun 2022) Changed paths: M crypto/cmp/cmp_protect.c Log Message: --- Fix memory leak in cmp_calc_protection() Triggered by a memory allocation failure. Detected by PR #18355 Reviewed-by: Paul Dale Reviewed-by: David von Oheimb (Merged from https://github.com/openssl/openssl/pull/18670)
[openssl/openssl] 74c929: Fix memory leak in cmp_calc_protection()
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 74c929d00dce3a4755164859c600aabb3838a87b https://github.openssl.org/openssl/openssl/commit/74c929d00dce3a4755164859c600aabb3838a87b Author: slontis Date: 2022-06-29 (Wed, 29 Jun 2022) Changed paths: M crypto/cmp/cmp_protect.c Log Message: --- Fix memory leak in cmp_calc_protection() Triggered by a memory allocation failure. Detected by PR #18355 Reviewed-by: Paul Dale Reviewed-by: David von Oheimb (Merged from https://github.com/openssl/openssl/pull/18670)
[openssl/openssl] 47741c: kdf objects missing a return if malloc fails.
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 47741c539f70b26389268fdbc9b160b3a174bbca https://github.openssl.org/openssl/openssl/commit/47741c539f70b26389268fdbc9b160b3a174bbca Author: slontis Date: 2022-06-28 (Tue, 28 Jun 2022) Changed paths: M providers/implementations/kdfs/tls1_prf.c M providers/implementations/kdfs/x942kdf.c Log Message: --- kdf objects missing a return if malloc fails. I have searched through all references of ERR_R_MALLOC_FAILURE for any other instances.. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Hugo Landau (Merged from https://github.com/openssl/openssl/pull/18638) (cherry picked from commit 7260709e9ef155c8b3fccaa32e8ba496a3059905)
[openssl/openssl] 726070: kdf objects missing a return if malloc fails.
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 7260709e9ef155c8b3fccaa32e8ba496a3059905 https://github.openssl.org/openssl/openssl/commit/7260709e9ef155c8b3fccaa32e8ba496a3059905 Author: slontis Date: 2022-06-28 (Tue, 28 Jun 2022) Changed paths: M providers/implementations/kdfs/tls1_prf.c M providers/implementations/kdfs/x942kdf.c Log Message: --- kdf objects missing a return if malloc fails. I have searched through all references of ERR_R_MALLOC_FAILURE for any other instances.. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Hugo Landau (Merged from https://github.com/openssl/openssl/pull/18638)
[openssl/openssl] a99b37: Fix memory leak in ossl_rsa_fromdata.
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: a99b372157561560da526e212a5c6a74e1cd2d82 https://github.openssl.org/openssl/openssl/commit/a99b372157561560da526e212a5c6a74e1cd2d82 Author: slontis Date: 2022-06-28 (Tue, 28 Jun 2022) Changed paths: M crypto/rsa/rsa_backend.c Log Message: --- Fix memory leak in ossl_rsa_fromdata. Occurs if a malloc failure happens inside collect_numbers() Reported via #18365 Reviewed-by: Matt Caswell Reviewed-by: Bernd Edlinger Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18646) (cherry picked from commit 28adea95975c3ea53fc590efda35dee13efd4767)
[openssl/openssl] 28adea: Fix memory leak in ossl_rsa_fromdata.
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 28adea95975c3ea53fc590efda35dee13efd4767 https://github.openssl.org/openssl/openssl/commit/28adea95975c3ea53fc590efda35dee13efd4767 Author: slontis Date: 2022-06-28 (Tue, 28 Jun 2022) Changed paths: M crypto/rsa/rsa_backend.c Log Message: --- Fix memory leak in ossl_rsa_fromdata. Occurs if a malloc failure happens inside collect_numbers() Reported via #18365 Reviewed-by: Matt Caswell Reviewed-by: Bernd Edlinger Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18646)
[openssl/openssl] 2b84a6: RSA keygen fixes
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 2b84a620d299b9614ab59342eb2911617b1bb3c3 https://github.openssl.org/openssl/openssl/commit/2b84a620d299b9614ab59342eb2911617b1bb3c3 Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/bn/bn_rsa_fips186_4.c Log Message: --- RSA keygen fixes Fixes #18321 Increase the iteration factor used when 'Computing a Probable Prime Factor Based on Auxiliary Primes' from 5 to 20. This matches the algorithm update made in FIPS 186-5. Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) (cherry picked from commit ad7e0fd550a9eb2946edf38003ebc6d5b988dac7) Commit: d5a749b883eb7bcf8bbf28d8be1ef64353b4f7aa https://github.openssl.org/openssl/openssl/commit/d5a749b883eb7bcf8bbf28d8be1ef64353b4f7aa Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/rsa/rsa_gen.c Log Message: --- RSA Keygen update - When using the default provider fallback to default multiprime keygen if e is < 65537 Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) (cherry picked from commit 27c1cfd7653b7204af3301f93ccd2a3decfc309b) Commit: 7b92153cfb8ffe1c90ac0a02be8e8d271b342caa https://github.openssl.org/openssl/openssl/commit/7b92153cfb8ffe1c90ac0a02be8e8d271b342caa Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/bn/bn_err.c M crypto/bn/bn_rsa_fips186_4.c M crypto/err/openssl.txt M include/crypto/bnerr.h M include/openssl/bnerr.h Log Message: --- RSA keygen update: Raise an error if no prime candidate q is found. Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) (cherry picked from commit d2399d8cd29f56e6614f0b3db4e7e563a745902a) Compare: https://github.openssl.org/openssl/openssl/compare/e8c886104f94...7b92153cfb8f
[openssl/openssl] ad7e0f: RSA keygen fixes
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: ad7e0fd550a9eb2946edf38003ebc6d5b988dac7 https://github.openssl.org/openssl/openssl/commit/ad7e0fd550a9eb2946edf38003ebc6d5b988dac7 Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/bn/bn_rsa_fips186_4.c Log Message: --- RSA keygen fixes Fixes #18321 Increase the iteration factor used when 'Computing a Probable Prime Factor Based on Auxiliary Primes' from 5 to 20. This matches the algorithm update made in FIPS 186-5. Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) Commit: 27c1cfd7653b7204af3301f93ccd2a3decfc309b https://github.openssl.org/openssl/openssl/commit/27c1cfd7653b7204af3301f93ccd2a3decfc309b Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/rsa/rsa_gen.c Log Message: --- RSA Keygen update - When using the default provider fallback to default multiprime keygen if e is < 65537 Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) Commit: d2399d8cd29f56e6614f0b3db4e7e563a745902a https://github.openssl.org/openssl/openssl/commit/d2399d8cd29f56e6614f0b3db4e7e563a745902a Author: slontis Date: 2022-06-13 (Mon, 13 Jun 2022) Changed paths: M crypto/bn/bn_err.c M crypto/bn/bn_rsa_fips186_4.c M crypto/err/openssl.txt M include/crypto/bnerr.h M include/openssl/bnerr.h Log Message: --- RSA keygen update: Raise an error if no prime candidate q is found. Reviewed-by: Bernd Edlinger Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18429) Compare: https://github.openssl.org/openssl/openssl/compare/a644cb7c1c19...d2399d8cd29f
[openssl/openssl] 89e326: Add Windows VERSIONINFO resource to fips provider ...
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 89e326951c7f8b5bdff645168a1cfc38b7b522ce https://github.openssl.org/openssl/openssl/commit/89e326951c7f8b5bdff645168a1cfc38b7b522ce Author: slontis Date: 2022-06-02 (Thu, 02 Jun 2022) Changed paths: M providers/build.info Log Message: --- Add Windows VERSIONINFO resource to fips provider dll. Fixes #18388 This just looks like an omission, as this is added to libcrypto and libssl Reviewed-by: Richard Levitte Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Todd Short (Merged from https://github.com/openssl/openssl/pull/18416) (cherry picked from commit 18f0870d39eb055c8c67af8025fd1b9e01ce6a43) Commit: 6fd014f32257b63a0b17e5793faab3e70c979851 https://github.openssl.org/openssl/openssl/commit/6fd014f32257b63a0b17e5793faab3e70c979851 Author: slontis Date: 2022-06-02 (Thu, 02 Jun 2022) Changed paths: M providers/build.info Log Message: --- Add VERSIONINFO resource to legacy provider if it is not builtin Reviewed-by: Richard Levitte Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Todd Short (Merged from https://github.com/openssl/openssl/pull/18416) (cherry picked from commit 9510661400470d357c74c5c4d0ff01c7b813b974) Compare: https://github.openssl.org/openssl/openssl/compare/5bc6a962fd86...6fd014f32257
[openssl/openssl] 18f087: Add Windows VERSIONINFO resource to fips provider ...
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 18f0870d39eb055c8c67af8025fd1b9e01ce6a43 https://github.openssl.org/openssl/openssl/commit/18f0870d39eb055c8c67af8025fd1b9e01ce6a43 Author: slontis Date: 2022-06-02 (Thu, 02 Jun 2022) Changed paths: M providers/build.info Log Message: --- Add Windows VERSIONINFO resource to fips provider dll. Fixes #18388 This just looks like an omission, as this is added to libcrypto and libssl Reviewed-by: Richard Levitte Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Todd Short (Merged from https://github.com/openssl/openssl/pull/18416) Commit: 9510661400470d357c74c5c4d0ff01c7b813b974 https://github.openssl.org/openssl/openssl/commit/9510661400470d357c74c5c4d0ff01c7b813b974 Author: slontis Date: 2022-06-02 (Thu, 02 Jun 2022) Changed paths: M providers/build.info Log Message: --- Add VERSIONINFO resource to legacy provider if it is not builtin Reviewed-by: Richard Levitte Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale Reviewed-by: Todd Short (Merged from https://github.com/openssl/openssl/pull/18416) Compare: https://github.openssl.org/openssl/openssl/compare/48b571fe771f...951066140047
[openssl/openssl] b40c75: Add documentation for key validation that indicate...
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: b40c753b6e09eb6df06c161cdf771c704898b050 https://github.openssl.org/openssl/openssl/commit/b40c753b6e09eb6df06c161cdf771c704898b050 Author: slontis Date: 2022-05-09 (Mon, 09 May 2022) Changed paths: M doc/man3/DSA_sign.pod M doc/man3/ECDSA_SIG_new.pod M doc/man3/EC_GROUP_copy.pod M doc/man3/EVP_DigestSignInit.pod M doc/man3/EVP_DigestVerifyInit.pod M doc/man3/EVP_PKEY_check.pod M doc/man7/EVP_KDF-PBKDF2.pod M doc/man7/EVP_PKEY-DH.pod M doc/man7/EVP_PKEY-DSA.pod M doc/man7/EVP_PKEY-EC.pod M doc/man7/EVP_PKEY-FFC.pod M doc/man7/EVP_PKEY-RSA.pod M doc/man7/OSSL_PROVIDER-FIPS.pod M doc/man7/OSSL_PROVIDER-default.pod M doc/man7/fips_module.pod M doc/man7/migration_guide.pod Log Message: --- Add documentation for key validation that indicates the difference between the EVP_PKEY_XXX_check() calls for the default and fips providers. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18235) (cherry picked from commit 0b3d2594d060dc19269d3740ad672f065ec6398a)
[openssl/openssl] 0b3d25: Add documentation for key validation that indicate...
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 0b3d2594d060dc19269d3740ad672f065ec6398a https://github.openssl.org/openssl/openssl/commit/0b3d2594d060dc19269d3740ad672f065ec6398a Author: slontis Date: 2022-05-09 (Mon, 09 May 2022) Changed paths: M doc/man3/DSA_sign.pod M doc/man3/ECDSA_SIG_new.pod M doc/man3/EC_GROUP_copy.pod M doc/man3/EVP_DigestSignInit.pod M doc/man3/EVP_DigestVerifyInit.pod M doc/man3/EVP_PKEY_check.pod M doc/man7/EVP_KDF-PBKDF2.pod M doc/man7/EVP_PKEY-DH.pod M doc/man7/EVP_PKEY-DSA.pod M doc/man7/EVP_PKEY-EC.pod M doc/man7/EVP_PKEY-FFC.pod M doc/man7/EVP_PKEY-RSA.pod M doc/man7/OSSL_PROVIDER-FIPS.pod M doc/man7/OSSL_PROVIDER-default.pod M doc/man7/fips_module.pod M doc/man7/migration_guide.pod Log Message: --- Add documentation for key validation that indicates the difference between the EVP_PKEY_XXX_check() calls for the default and fips providers. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/18235)