openssl/crypto/dsa
Shane Lontis 63794b048c Add multiple fixes for ffc key generation using invalid p,q,g parameters.
Fixes #11864

- The dsa keygen assumed valid p, q, g values were being passed. If this is not correct then it is
  possible that dsa keygen can either hang or segfault.
  The fix was to do a partial validation of p, q, and g inside the keygen.
- Fixed a potential double free in the dsa keypair test in the case when in failed (It should never fail!).
  It freed internal object members without setting them to NULL.
- Changed the FFC key validation to accept 1024 bit keys in non fips mode.
- Added tests that use both the default provider & fips provider to test these cases.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/12176)
2020-07-09 13:43:10 +10:00
..
build.info
dsa_ameth.c
dsa_asn1.c
dsa_backend.c
dsa_check.c Add ACVP fips module tests 2020-06-17 11:33:16 +10:00
dsa_depr.c
dsa_err.c
dsa_gen.c Fix CID-1464802 2020-06-30 11:52:15 +10:00
dsa_key.c Add multiple fixes for ffc key generation using invalid p,q,g parameters. 2020-07-09 13:43:10 +10:00
dsa_lib.c
dsa_local.h
dsa_meth.c
dsa_ossl.c
dsa_pmeth.c Add ACVP fips module tests 2020-06-17 11:33:16 +10:00
dsa_prn.c
dsa_sign.c
dsa_vrf.c