From: Tomas Mraz Date: Thu, 14 Oct 2021 09:02:36 +0000 (+0200) Subject: Raise error when invalid digest used with SM2 X-Git-Tag: openssl-3.2.0-alpha1~3465 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d5d95daba59adc41ab60ea86acd513f255fca3c0;p=thirdparty%2Fopenssl.git Raise error when invalid digest used with SM2 Otherwise commands like openssl req -newkey sm2 fail silently without reporting any error unless -sm3 option is added. Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/16833) --- diff --git a/providers/implementations/signature/sm2_sig.c b/providers/implementations/signature/sm2_sig.c index 719e7a2eb26..10a9496904c 100644 --- a/providers/implementations/signature/sm2_sig.c +++ b/providers/implementations/signature/sm2_sig.c @@ -94,9 +94,13 @@ static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) if (psm2ctx->md == NULL) /* We need an SM3 md to compare with */ psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, psm2ctx->propq); - if (psm2ctx->md == NULL - || strlen(mdname) >= sizeof(psm2ctx->mdname) + if (psm2ctx->md == NULL) + return 0; + + if (strlen(mdname) >= sizeof(psm2ctx->mdname) || !EVP_MD_is_a(psm2ctx->md, mdname)) { + ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST, "digest=%s", + mdname); return 0; }