mirror of
https://github.com/openssl/openssl.git
synced 2024-12-15 06:01:37 +08:00
63794b048c
Fixes #11864 - The dsa keygen assumed valid p, q, g values were being passed. If this is not correct then it is possible that dsa keygen can either hang or segfault. The fix was to do a partial validation of p, q, and g inside the keygen. - Fixed a potential double free in the dsa keypair test in the case when in failed (It should never fail!). It freed internal object members without setting them to NULL. - Changed the FFC key validation to accept 1024 bit keys in non fips mode. - Added tests that use both the default provider & fips provider to test these cases. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/12176) |
||
---|---|---|
.. | ||
build.info | ||
dsa_ameth.c | ||
dsa_asn1.c | ||
dsa_backend.c | ||
dsa_check.c | ||
dsa_depr.c | ||
dsa_err.c | ||
dsa_gen.c | ||
dsa_key.c | ||
dsa_lib.c | ||
dsa_local.h | ||
dsa_meth.c | ||
dsa_ossl.c | ||
dsa_pmeth.c | ||
dsa_prn.c | ||
dsa_sign.c | ||
dsa_vrf.c |