x509_rsa_ctx_to_pss returns an error when trying to make an X509_ALGOR for an arbitrary RSA-PSS salt length. This dates to the initial commit and isn't in OpenSSL, so I imagine this was an attempt to ratchet down on RSA-PSS parameter proliferation. If the caller explicitly passes in md_size, rather than using the -1 convenience value, we currently fail. Allow those too and add an error to the error queue so it is easier to diagnose. Change-Id: Ia738142e48930ef5a916cad5326f15f64d766ba5 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/43824 Reviewed-by: Adam Langley <agl@google.com> Commit-Queue: David Benjamin <davidben@google.com>chromium-5359
parent
8591d539b5
commit
17e530c43c
2 changed files with 21 additions and 1 deletions
Loading…
Reference in new issue