Loading crypto/dsa/dsa_key.c +1 −2 Original line number Diff line number Diff line Loading @@ -85,8 +85,7 @@ static int fips_check_dsa(DSA *dsa) pk.type = EVP_PKEY_DSA; pk.pkey.dsa = dsa; if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), 0, NULL)) if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, NULL, 0, NULL)) { FIPSerr(FIPS_F_FIPS_CHECK_DSA,FIPS_R_PAIRWISE_TEST_FAILED); fips_set_selftest_fail(); Loading crypto/rsa/rsa_gen.c +3 −3 Original line number Diff line number Diff line Loading @@ -94,11 +94,11 @@ int fips_check_rsa(RSA *rsa) /* Perform pairwise consistency signature test */ if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_PKCS1_PADDING, NULL) NULL, 0, NULL, RSA_PKCS1_PADDING, NULL) || !fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_X931_PADDING, NULL) NULL, 0, NULL, RSA_X931_PADDING, NULL) || !fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_PKCS1_PSS_PADDING, NULL)) NULL, 0, NULL, RSA_PKCS1_PSS_PADDING, NULL)) goto err; /* Now perform pairwise consistency encrypt/decrypt test */ ctbuf = OPENSSL_malloc(RSA_size(rsa)); Loading fips/fips.c +3 −0 Original line number Diff line number Diff line Loading @@ -454,6 +454,9 @@ int fips_pkey_signature_test(EVP_PKEY *pkey, if (tbslen == -1) tbslen = strlen((char *)tbs); if (digest == NULL) digest = EVP_sha256(); if (!FIPS_digestinit(&mctx, digest)) goto error; if (!FIPS_digestupdate(&mctx, tbs, tbslen)) Loading Loading
crypto/dsa/dsa_key.c +1 −2 Original line number Diff line number Diff line Loading @@ -85,8 +85,7 @@ static int fips_check_dsa(DSA *dsa) pk.type = EVP_PKEY_DSA; pk.pkey.dsa = dsa; if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), 0, NULL)) if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, NULL, 0, NULL)) { FIPSerr(FIPS_F_FIPS_CHECK_DSA,FIPS_R_PAIRWISE_TEST_FAILED); fips_set_selftest_fail(); Loading
crypto/rsa/rsa_gen.c +3 −3 Original line number Diff line number Diff line Loading @@ -94,11 +94,11 @@ int fips_check_rsa(RSA *rsa) /* Perform pairwise consistency signature test */ if (!fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_PKCS1_PADDING, NULL) NULL, 0, NULL, RSA_PKCS1_PADDING, NULL) || !fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_X931_PADDING, NULL) NULL, 0, NULL, RSA_X931_PADDING, NULL) || !fips_pkey_signature_test(&pk, tbs, -1, NULL, 0, EVP_sha1(), RSA_PKCS1_PSS_PADDING, NULL)) NULL, 0, NULL, RSA_PKCS1_PSS_PADDING, NULL)) goto err; /* Now perform pairwise consistency encrypt/decrypt test */ ctbuf = OPENSSL_malloc(RSA_size(rsa)); Loading
fips/fips.c +3 −0 Original line number Diff line number Diff line Loading @@ -454,6 +454,9 @@ int fips_pkey_signature_test(EVP_PKEY *pkey, if (tbslen == -1) tbslen = strlen((char *)tbs); if (digest == NULL) digest = EVP_sha256(); if (!FIPS_digestinit(&mctx, digest)) goto error; if (!FIPS_digestupdate(&mctx, tbs, tbslen)) Loading