diff options
author | Richard Levitte <levitte@openssl.org> | 2025-01-15 10:14:41 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2025-01-17 18:54:51 +0100 |
commit | 1df07c761b25e5aca8ecd90b81d05496631285fb (patch) | |
tree | 5d596416881459ec407ddf2d571e2d7701ec9315 /doc/man3/EVP_PKEY_decrypt.pod | |
parent | test: aAissuingDistributionPoint X.509v3 extension (diff) | |
download | openssl-1df07c761b25e5aca8ecd90b81d05496631285fb.tar.xz openssl-1df07c761b25e5aca8ecd90b81d05496631285fb.zip |
This drops OSSL_PKEY_PARAM_IMPLICIT_REJECTION - which is a meaningless
name - everywhere apart from still existing (for API stability, in
case someone uses that macro).
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26421)
Diffstat (limited to 'doc/man3/EVP_PKEY_decrypt.pod')
-rw-r--r-- | doc/man3/EVP_PKEY_decrypt.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man3/EVP_PKEY_decrypt.pod b/doc/man3/EVP_PKEY_decrypt.pod index 3146620095..2dfcb93a1e 100644 --- a/doc/man3/EVP_PKEY_decrypt.pod +++ b/doc/man3/EVP_PKEY_decrypt.pod @@ -61,7 +61,7 @@ used private key. They had to be processed in a side-channel free way. Since version 3.2.0, the EVP_PKEY_decrypt() method when used with PKCS#1 v1.5 padding as implemented in the B<default> provider implements the implicit rejection mechanism (see -B<OSSL_PKEY_PARAM_IMPLICIT_REJECTION> in L<provider-asym_cipher(7)>). +B<OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTION> in L<provider-asym_cipher(7)>). That means it doesn't return an error when it detects an error in padding, instead it returns a pseudo-randomly generated message, removing the need of side-channel secure code from applications using OpenSSL. |