Skip to content

Conversation

rcatolino
Copy link
Contributor

Fixes #114260
I simply moved the EVP_PKEY_CTX_set_signature_md call before the EVP_PKEY_CTX_set_rsa_padding call, in order to prevent the openssl signature context from defaulting to SHA1 in the set_rsa_padding phase, as SHA1 is not supported in fips mode.

@rcatolino
Copy link
Contributor Author

@dotnet-policy-service agree [company="OVHCloud"]

@rcatolino
Copy link
Contributor Author

@dotnet-policy-service agree company="OVHCloud"

@bartonjs bartonjs merged commit 850b0ba into dotnet:main Apr 12, 2025
96 of 99 checks passed
@github-actions github-actions bot locked and limited conversation to collaborators May 12, 2025
@dotnet dotnet unlocked this conversation May 18, 2025
@vcsjones
Copy link
Member

/backport to release/9.0-staging

Copy link
Contributor

Started backporting to release/9.0-staging: https://github.com/dotnet/runtime/actions/runs/15096596111

@vcsjones
Copy link
Member

/backport to release/8.0-staging

Copy link
Contributor

Started backporting to release/8.0-staging: https://github.com/dotnet/runtime/actions/runs/15096599543

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
area-System.Security community-contribution Indicates that the PR has been added by a community member
Projects
None yet
Development

Successfully merging this pull request may close these issues.

openssl error digest not allowed on RSA PSS signature in fips mode
3 participants