diff options
author | Richard Levitte <levitte@openssl.org> | 2025-01-15 10:14:41 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2025-01-17 18:54:51 +0100 |
commit | 1df07c761b25e5aca8ecd90b81d05496631285fb (patch) | |
tree | 5d596416881459ec407ddf2d571e2d7701ec9315 /doc | |
parent | test: aAissuingDistributionPoint X.509v3 extension (diff) | |
download | openssl-master.tar.xz openssl-master.zip |
This drops OSSL_PKEY_PARAM_IMPLICIT_REJECTION - which is a meaningless
name - everywhere apart from still existing (for API stability, in
case someone uses that macro).
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26421)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man3/EVP_PKEY_decrypt.pod | 2 | ||||
-rw-r--r-- | doc/man7/provider-asym_cipher.pod | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/man3/EVP_PKEY_decrypt.pod b/doc/man3/EVP_PKEY_decrypt.pod index 3146620095..2dfcb93a1e 100644 --- a/doc/man3/EVP_PKEY_decrypt.pod +++ b/doc/man3/EVP_PKEY_decrypt.pod @@ -61,7 +61,7 @@ used private key. They had to be processed in a side-channel free way. Since version 3.2.0, the EVP_PKEY_decrypt() method when used with PKCS#1 v1.5 padding as implemented in the B<default> provider implements the implicit rejection mechanism (see -B<OSSL_PKEY_PARAM_IMPLICIT_REJECTION> in L<provider-asym_cipher(7)>). +B<OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTION> in L<provider-asym_cipher(7)>). That means it doesn't return an error when it detects an error in padding, instead it returns a pseudo-randomly generated message, removing the need of side-channel secure code from applications using OpenSSL. diff --git a/doc/man7/provider-asym_cipher.pod b/doc/man7/provider-asym_cipher.pod index 0ff33f5b70..7259fc4307 100644 --- a/doc/man7/provider-asym_cipher.pod +++ b/doc/man7/provider-asym_cipher.pod @@ -234,14 +234,14 @@ The TLS protocol version first requested by the client. The negotiated TLS protocol version. -=item "implicit-rejection" (B<OSSL_PKEY_PARAM_IMPLICIT_REJECTION>) <unsigned integer> +=item "implicit-rejection" (B<OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTION>) <unsigned integer> -Gets of sets the use of the implicit rejection mechanism for RSA PKCS#1 v1.5 +Gets or sets the use of the implicit rejection mechanism for RSA PKCS#1 v1.5 decryption. When set (non zero value), the decryption API will return a deterministically random value if the PKCS#1 v1.5 padding check fails. This makes exploitation of the Bleichenbacher significantly harder, even if the code using the RSA decryption API is not implemented in side-channel -free manner. Set by default. Requires provider support. +free manner. Set by default in OpenSSL providers. =back |