|
|
@ -57,7 +57,21 @@ diff -up openssl-3.0.1/crypto/dh/dh_key.c.fips3 openssl-3.0.1/crypto/dh/dh_key.c
|
|
|
|
dh->dirty_cnt++;
|
|
|
|
dh->dirty_cnt++;
|
|
|
|
ok = 1;
|
|
|
|
ok = 1;
|
|
|
|
err:
|
|
|
|
err:
|
|
|
|
diff -up openssl-3.0.1/crypto/ec/ec_key.c.fips3 openssl-3.0.1/crypto/ec/ec_key.c
|
|
|
|
diff -up openssl-3.0.7/crypto/ec/ec_key.c.f188 openssl-3.0.7/crypto/ec/ec_key.c
|
|
|
|
|
|
|
|
--- openssl-3.0.7/crypto/ec/ec_key.c.f188 2023-11-08 10:58:05.910031253 +0100
|
|
|
|
|
|
|
|
+++ openssl-3.0.7/crypto/ec/ec_key.c 2023-11-08 10:59:42.338526883 +0100
|
|
|
|
|
|
|
|
@@ -326,6 +326,11 @@ static int ec_generate_key(EC_KEY *eckey
|
|
|
|
|
|
|
|
eckey->dirty_cnt++;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef FIPS_MODULE
|
|
|
|
|
|
|
|
+ if (ossl_ec_key_public_check(eckey, ctx) <= 0) {
|
|
|
|
|
|
|
|
+ ERR_raise(ERR_LIB_EC, EC_R_INVALID_KEY);
|
|
|
|
|
|
|
|
+ goto err;
|
|
|
|
|
|
|
|
+ }
|
|
|
|
|
|
|
|
+
|
|
|
|
|
|
|
|
pairwise_test = 1;
|
|
|
|
|
|
|
|
#endif /* FIPS_MODULE */
|
|
|
|
|
|
|
|
|
|
|
|
diff -up openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c.fips3 openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c
|
|
|
|
diff -up openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c.fips3 openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c
|
|
|
|
--- openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c.fips3 2022-07-25 13:42:46.814952053 +0200
|
|
|
|
--- openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c.fips3 2022-07-25 13:42:46.814952053 +0200
|
|
|
|
+++ openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c 2022-07-25 13:52:12.292065706 +0200
|
|
|
|
+++ openssl-3.0.1/providers/implementations/exchange/ecdh_exch.c 2022-07-25 13:52:12.292065706 +0200
|
|
|
|