05821b0ee3
We check the length for MD5+SHA1 but not the normal cases. Instead, EVP_PKEY_sign externally checks the length (largely because the silly RSA-PSS padding function forces it). We especially should be checking the length for these because otherwise the prefix built into the ASN.1 prefix is wrong. The primary motivation is to avoid putting EVP_PKEY inside the FIPS module. This means all logic for supported algorithms should live in crypto/rsa. This requires fixing up the verify_recover logic and some tests, including bcm.c's KAT bits. (evp_tests.txt is now this odd mixture of EVP-level and RSA-level error codes. A follow-up change will add new APIs for RSA-PSS which will allow p_rsa.c to be trimmed down and make things consistent.) Change-Id: I29158e9695b28e8632b06b449234a5dded35c3e7 Reviewed-on: https://boringssl-review.googlesource.com/15824 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
aes | ||
bn | ||
des | ||
digest | ||
hmac | ||
md4 | ||
md5 | ||
modes | ||
rand | ||
sha | ||
ar.go | ||
bcm.c | ||
CMakeLists.txt | ||
const.go | ||
delocate.go | ||
delocate.h | ||
FIPS.md | ||
inject-hash.go | ||
intcheck1.png | ||
intcheck2.png | ||
intcheck3.png | ||
is_fips.c |