Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2215388/?format=api
{ "id": 2215388, "url": "http://patchwork.ozlabs.org/api/patches/2215388/?format=api", "web_url": "http://patchwork.ozlabs.org/project/swupdate/patch/ZR5P278MB19111BB86B3D130C03BC3A04E148A@ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM/", "project": { "id": 58, "url": "http://patchwork.ozlabs.org/api/projects/58/?format=api", "name": "swupdate development", "link_name": "swupdate", "list_id": "swupdate.googlegroups.com", "list_email": "swupdate@googlegroups.com", "web_url": "https://github.com/sbabic/swupdate", "scm_url": "git://github.com/sbabic/swupdate", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<ZR5P278MB19111BB86B3D130C03BC3A04E148A@ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM>", "list_archive_url": null, "date": "2026-03-24T13:33:55", "name": "crypto: openssl: fix verification of parameterized RSA-PSS keys", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "a6c10e37cc32a66657bf9bef7bd9530c36fd5226", "submitter": { "id": 92958, "url": "http://patchwork.ozlabs.org/api/people/92958/?format=api", "name": "Oliver Kästner", "email": "okaestner@rosen-nxt.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/swupdate/patch/ZR5P278MB19111BB86B3D130C03BC3A04E148A@ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM/mbox/", "series": [ { "id": 497288, "url": "http://patchwork.ozlabs.org/api/series/497288/?format=api", "web_url": "http://patchwork.ozlabs.org/project/swupdate/list/?series=497288", "date": "2026-03-24T13:33:55", "name": "crypto: openssl: fix verification of parameterized RSA-PSS keys", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/497288/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2215388/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2215388/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<swupdate+bncBCCONF765YHBBS5FRLHAMGQEP2VGJAI@googlegroups.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=googlegroups.com header.i=@googlegroups.com\n header.a=rsa-sha256 header.s=20251104 header.b=EU8EXPbF;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=googlegroups.com\n (client-ip=2607:f8b0:4864:20::1038; helo=mail-pj1-x1038.google.com;\n envelope-from=swupdate+bncbcconf765yhbbs5frlhamgqep2vgjai@googlegroups.com;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from mail-pj1-x1038.google.com (mail-pj1-x1038.google.com\n [IPv6:2607:f8b0:4864:20::1038])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fg9xD45yVz1y1G\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 25 Mar 2026 00:34:07 +1100 (AEDT)", "by mail-pj1-x1038.google.com with SMTP id\n 98e67ed59e1d1-35bea322389sf2998135a91.1\n for <incoming@patchwork.ozlabs.org>;\n Tue, 24 Mar 2026 06:34:07 -0700 (PDT)", "by 2002:a17:90b:1d49:b0:35a:63d:6bd1 with SMTP id\n 98e67ed59e1d1-35bc6f9c235ls6571143a91.2.-pod-prod-05-us; Tue, 24 Mar 2026\n 06:34:02 -0700 (PDT)", "from ZR1P278CU001.outbound.protection.outlook.com\n (mail-switzerlandnorthazlp170120005.outbound.protection.outlook.com.\n [2a01:111:f403:c213::5])\n by gmr-mx.google.com with ESMTPS id\n 41be03b00d2f7-c743a7861e2si401016a12.0.2026.03.24.06.34.02\n for <swupdate@googlegroups.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 24 Mar 2026 06:34:02 -0700 (PDT)", "from ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM (2603:10a6:910:af::11)\n by GVAP278MB0761.CHEP278.PROD.OUTLOOK.COM (2603:10a6:710:47::12) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9723.31; Tue, 24 Mar\n 2026 13:33:55 +0000", "from ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM\n ([fe80::b6e6:5d77:81b1:8d9d]) by ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM\n ([fe80::b6e6:5d77:81b1:8d9d%5]) with mapi id 15.20.9723.030; Tue, 24 Mar 2026\n 13:33:55 +0000" ], "ARC-Seal": [ "i=3; a=rsa-sha256; t=1774359245; cv=pass;\n d=google.com; s=arc-20240605;\n b=ao2HYIfQEU/fbM1fXYx5HBRqPTmEixOqS89OeDP3vqurONHcdfb3iDF9JcgxbPBCOv\n HBvHmB3q7nPM1utH5efj6I6C4JuAt5ivHYy3ttCjiSCtGa/N/DwqTBtLG2hvU0HgLfRy\n EL+xmG3I8qm98t5qR4X2uPjjdszFXn8LcV2jm1kF7FwYq9xZh1X+j9kgCGllN42YbdYC\n MsezZ/UKmXovoL6cgKK9wICF/+Ch4fZwI0+RBZvEhKztNog2Rx6wV5+UgeImr8J78PHr\n EI8/SG+cpi5dCJNoeLxT8VAIR44rjHBpZtzlH3RTrS6+mrRkNBIhlxNKmIoRJ0tLQ2x0\n Cx0A==", "i=2; a=rsa-sha256; t=1774359242; cv=pass;\n d=google.com; s=arc-20240605;\n b=J+thJQ5MAGsW7bVFEGCM0WIvnn2nZVXeLq86C8z5Z1pR2A+oI+ik8wLg94Ar7bdKqI\n mU8bDTjj1D+3C6rEuWVE8ya+0laO9iLq8pk8vejHPacOT85kvad8uExq1BxwqleyYKAl\n 9Wu1zjdcfhEgQArxhDLF/LygSd7U6uOD6/WzjdABxQUQp4cSVLaPS6ErHmruDUwYCY6s\n frHmPUpGD5jYoJ02BgbAMD89Pm+TLT3aro6nqUY348vN3rxNZ77QdPBb84jp5twht7GE\n C/eSOacj9BAKajvkAdZNPfI3CYa396CPG/QgQfbcC6d8cgUCh4fVfxBpZI7+ZPXrQ+J1\n v9Nw==", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=dDCTbDx3ab153AdK+Q7vYEo0HBI13Q7/46O3w2VBtGqsAVujJ2Kv7QTckB0GblbIRABjst+p+LezLtaRYwc/O6WzBWlnRkWxaApiujiNR2G7TmUUMKw1j5aA8xVyEvtUsuUk2gk29FDRqwqFJiOgCz0OoUjOPjLhWdhOVRq0wBW7Ch22xXAwDBOOWtrnV+D4/9NtIuzJkWPzTqP+AbbOhE+3KTP7rxgxNX3VaHAzKsE7jqzGU160ZH8Kea29/4YkW3E2DvQ6XreH+jY478seUgyh5prf/q63ZEtY7t35FIBqHo1oKx2T6yIGlulpVB9Khndma874x1fgrklilzQVZQ==" ], "ARC-Message-Signature": [ "i=3; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post\n :list-id:mailing-list:precedence:reply-to:mime-version\n :content-transfer-encoding:msip_labels:content-language\n :accept-language:message-id:date:thread-index:thread-topic:subject\n :to:from:dkim-signature;\n bh=kmzyI977BeCEdiFMSqxcYGREe+1+3NO3mR0fVuac1rk=;\n fh=xiqGOrEX+ZKrll7zJ4em/4iyUHRde5hvnGpUqu1O7ro=;\n b=VQ7QooA474cpteSc8V+EOPr/Q1P2z7khmFrPswPwwxFPk4BQpTY2JP2NvNQhkKBGRX\n C0lsyOeylMv4Wm/QmID/RPldxc0y93YgjxtNMnrdTrxYRAXiMMxxx4po5VuEo0cfZizY\n xgA4u6iYoE87Hp+MP+5V/2hDNKqGCJrGxpU07c1L1QDJUCogp9QHV/IwLFwSHRN//bGs\n mJrOY0mVaIzX15iiPxliG+7/KCbWvXccLaOoGB5r/pYPNmT14aF/TZdodTb7fkPaB+7Y\n LybgCsJTw3OuGGuJ3QuqWPfz5ZCk+sUICAhQ8EQLXWWmvYsW6f+JQEygzoOTO679thTa\n 26cQ==;\n darn=patchwork.ozlabs.org", "i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=mime-version:content-transfer-encoding:msip_labels:content-language\n :accept-language:message-id:date:thread-index:thread-topic:subject\n :to:from:dkim-signature;\n bh=A4sq/CtCvDAR8HjXq59W4ZbuLud4nF7Qibp49s0jbxE=;\n fh=262T970yE3bqnMshdE4s95nQ21s3ybbkQZYvqrj76C8=;\n b=HdJwGgDnFwDR0INC5CpfRHpAUpocxsldajndA909CD2SJjc+ujFPvuqh/XRIsEaHo6\n hBUDpsD7hfDeeULiCh6rs2iprQzGb4RFkgAE9JwZYKwiR8pcJsW3tf5hkTSNWwTOMe1T\n jKjK6xIBgUzPCaJBWYJ8+H0dQsiMfY0VpnfMryRvkdJnQUw1g/p/tv1sxvHSfq3ZTsjp\n jJBb4ISwqo/johdfXUAlfRTrFCetOP4Z7IDLxtZoKaQ9lGTiVMbEGUjbC3DD+SOlz2BY\n RNs7hGuAH1ivYoMkJ3pwvOlRYzGQ/hKHZzeFKWFb43N3vk+aMXNnvc7oG+AT99afyqLe\n gjrA==;\n dara=google.com", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=A4sq/CtCvDAR8HjXq59W4ZbuLud4nF7Qibp49s0jbxE=;\n b=GIzI6RowV4jqrxZq6oP0Rj3+BIi4a8oC4lXEfOqvhV5mpusRQA99KL10IjQYIeh1UPT0mBP3BQyQy/w1O+fawUU9rgd27PQ5ZFkBN92Ik1UHRLil3s+VQcZrdrlvytnd/o+45FvriwjLPyZSfjCsqHbWyvR3WyuxVNRngv5A1VG6+I9npo3TZvaVUZBoShb7oH00VywrzUWW8keJduACE3wF6wbs2BCc25syAR+nV6f4xiB/l9oS9P8jcpAEA5EPN3cQk+Pwj6II572FzkOxNW5wwNCBgMTYqk17/z5mabgqEE8raNN4TL75q1lnpL1hfJ52fHs7J5CIsRhLwt9y2A==" ], "ARC-Authentication-Results": [ "i=3; gmr-mx.google.com;\n dkim=pass header.i=@rosen-nxt.com header.s=selector1\n header.b=\"JI/7RU6H\";\n arc=pass (i=1 spf=pass spfdomain=rosen-nxt.com dkim=pass\n dkdomain=rosen-nxt.com dmarc=pass fromdomain=rosen-nxt.com);\n spf=pass (google.com: domain of okaestner@rosen-nxt.com designates\n 2a01:111:f403:c213::5 as permitted sender)\n smtp.mailfrom=okaestner@rosen-nxt.com;\n dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE)\n header.from=rosen-nxt.com", "i=2; gmr-mx.google.com;\n dkim=pass header.i=@rosen-nxt.com header.s=selector1\n header.b=\"JI/7RU6H\";\n arc=pass (i=1 spf=pass spfdomain=rosen-nxt.com dkim=pass\n dkdomain=rosen-nxt.com dmarc=pass fromdomain=rosen-nxt.com);\n spf=pass (google.com: domain of okaestner@rosen-nxt.com designates\n 2a01:111:f403:c213::5 as permitted sender)\n smtp.mailfrom=okaestner@rosen-nxt.com;\n dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE)\n header.from=rosen-nxt.com", "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=rosen-nxt.com; dmarc=pass action=none\n header.from=rosen-nxt.com; dkim=pass header.d=rosen-nxt.com; arc=none" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=googlegroups.com; s=20251104; t=1774359245; x=1774964045;\n darn=patchwork.ozlabs.org;\n h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post\n :list-id:mailing-list:precedence:reply-to\n :x-original-authentication-results:x-original-sender:mime-version\n :content-transfer-encoding:msip_labels:content-language\n :accept-language:message-id:date:thread-index:thread-topic:subject\n :to:from:from:to:cc:subject:date:message-id:reply-to;\n bh=kmzyI977BeCEdiFMSqxcYGREe+1+3NO3mR0fVuac1rk=;\n b=EU8EXPbFz1lZai/K+L73JAAfp9KKP2VrUug09QVoLNKe4r80rc2DQU86Y3Y5/DK3Gx\n z7dFeKDAtrkYq1CXtcsPXk41KSTJdLHvwBikJsg8+n/kVJ4lbN64kWnbsy7hW4t1sFA8\n rw4DapuIjne63qt90zD9CjwGKh2Ul+q1b8hdHAk85WX9MCtM/dWUlqeYlBan7jSBms6Z\n z+aqUjF12/5iOwZM5uD3fZ8gOmsJYkXDi5w857VWvlUWagNrdS60t1uV07KANsMD4Q/m\n 6bU7F/8MJgTjXYxlzdw2E18y0kuUe+Ypr58WsCGreaB8Ox+XC98Js4HAqeP99Y1RQY27\n 7HLA==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1774359245; x=1774964045;\n h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post\n :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to\n :x-original-authentication-results:x-original-sender:mime-version\n :content-transfer-encoding:msip_labels:content-language\n :accept-language:message-id:date:thread-index:thread-topic:subject\n :to:from:x-beenthere:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=kmzyI977BeCEdiFMSqxcYGREe+1+3NO3mR0fVuac1rk=;\n b=Z6OawLiif1e9G7keVrKlhTY9UoSeQq0HwBoBPwrb2JXCQvBwjzcGPYNZQzneYr4ONm\n lEUpZ1i0IC4ykIOPAJv7kPd2IioZNhD0B9PJD9KyqncZVr8H7oTBmJ7S89bK+eRjqGRy\n iURkL8acCl/XvDey3120r8TtgjJpO7jU08SbX12HlFAZC/gihH2dXTP9BpsSGb2x0FlH\n Z/jB0QxuKC1h0Ba1QPBUMC0wPM5JLXFd1qGSHK1gFTSeN5Wau7lP1UCOVUd90B6r/Xcw\n QYBZ8mOgcyfa5JHlz1QdIJiRoS1vGy06zwxqFd8oVSQmz17xydMdMxSSqkWFYR0WFLEO\n HSgA==", "X-Forwarded-Encrypted": "i=3;\n AJvYcCVH8NLWVEhvSGT8KryLFdj0hENUzXTBegVg9+bS5nekuddBoFkkB7OUTHgKDIIQ4E2vQoZaGMDiLw==@patchwork.ozlabs.org", "X-Gm-Message-State": "AOJu0YyTCj1pQ112Ze385YZQw6rK/tJeGJR+QVUvUFGW7ieXNj16ngsj\n\tZpUNwSNtwDFJovtGlltmjw1Fv8L5EtgJ92PFltR9yqcSdyEnY90AsEC5", "X-Received": [ "by 2002:a17:90b:390d:b0:35b:9ab6:1d4e with SMTP id\n 98e67ed59e1d1-35bd2cfe940mr12946673a91.28.1774359244944;\n Tue, 24 Mar 2026 06:34:04 -0700 (PDT)", "by 2002:a05:6a20:94ca:b0:39b:ba95:b128 with SMTP id\n adf61e73a8af0-39bcebc24e2mr13881741637.50.1774359242476;\n Tue, 24 Mar 2026 06:34:02 -0700 (PDT)" ], "X-BeenThere": "swupdate@googlegroups.com;\n h=\"AYAyTiLSMvxONU+RoWtxNd5HlpV1/YHjDDb53TjSJSo6wjx1Rw==\"", "Received-SPF": "pass (google.com: domain of okaestner@rosen-nxt.com designates\n 2a01:111:f403:c213::5 as permitted sender) client-ip=2a01:111:f403:c213::5;", "From": "\"'Oliver Kaestner' via swupdate\" <swupdate@googlegroups.com>", "To": "\"swupdate@googlegroups.com\" <swupdate@googlegroups.com>", "Subject": "[swupdate] [PATCH] crypto: openssl: fix verification of parameterized\n RSA-PSS keys", "Thread-Topic": "[PATCH] crypto: openssl: fix verification of parameterized\n RSA-PSS keys", "Thread-Index": "AQHcu5KIGPCqKqAqXE6H7zx1JB94OA==", "Date": "Tue, 24 Mar 2026 13:33:55 +0000", "Message-ID": "\n <ZR5P278MB19111BB86B3D130C03BC3A04E148A@ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM>", "Accept-Language": "en-US", "Content-Language": "en-US", "X-MS-Has-Attach": "", "X-MS-TNEF-Correlator": "", "msip_labels": "", "x-codetwoprocessed": "true", "x-codetwo-clientsignature-inserted": "true", "x-ms-publictraffictype": "Email", "x-ms-traffictypediagnostic": "ZR5P278MB1911:EE_|GVAP278MB0761:EE_", "x-ms-office365-filtering-correlation-id": "e9e80865-0961-42a5-12ed-08de89a9ff16", "x-ms-exchange-atpmessageproperties": "SA", "x-ms-exchange-senderadcheck": "1", "x-ms-exchange-antispam-relay": "0", "x-microsoft-antispam": "\n BCL:0;ARA:13230040|1800799024|376014|366016|55112099003|38070700021|56012099003|18002099003;", "x-microsoft-antispam-message-info": "\n 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", "x-forefront-antispam-report": "\n CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(55112099003)(38070700021)(56012099003)(18002099003);DIR:OUT;SFP:1102;", "x-ms-exchange-antispam-messagedata-chunkcount": "1", "x-ms-exchange-antispam-messagedata-0": "=?iso-8859-1?q?GN1Oid46Q0ZgBK9mh7wqGu7?=\n\t=?iso-8859-1?q?G2ferg/NLe8WMsr3DPlAg2sK+GVnPvOY9iqAxXW1rH6/CIIEp9mmm1dwde/H?=\n\t=?iso-8859-1?q?g+DIeM5we185RZxE92IFTQBO1YgSFDc+tEvwU7pS/MzztXyMecaePNcK0mM6?=\n\t=?iso-8859-1?q?eX4UQk+GEm0o+PzvZzkknbUkHYu0F9l9ThTAoGcfi0RbvqOdrnXmxHsiBvqb?=\n\t=?iso-8859-1?q?OzAnWbTgUVQjuEUhwvxda2EmAiI/cWyu3I2FmxyJ9vtiaE1kYyPxNXkUcuov?=\n\t=?iso-8859-1?q?1WgnCX+YXD3by6ZVHqqmEeXj5uUQS+FKkFsOlor9FfIYe6Gdjp5F6e25F95d?=\n\t=?iso-8859-1?q?C2YArTVWAQt+TuNtDg/HML009FGk1OZIg2El6XzuPlsAWczaAzlnsBT0OZvy?=\n\t=?iso-8859-1?q?frcCmVlJ0mEbbV0KnAwYadyvUxqOCbS+nGUk+zwCA/UfNsv5Hql9KUdL0Cnj?=\n\t=?iso-8859-1?q?Izl4OzbYW+cGU/oZ8172LfT+NdB3D7dRXzg/iCNghrCI8lpB9ChCNgDQxxlN?=\n\t=?iso-8859-1?q?ek8W7SA9RAFuKFA22qqVgNCLLdy8U1GXS1WfiVwpUALdOPrRWjZGfn/IZv21?=\n\t=?iso-8859-1?q?eGvvB99uTG2pYTNmdJzZNzkG3PkEco/E15wNbGeUWZ7YW1Ui0Vg9HHLq5duN?=\n\t=?iso-8859-1?q?nZhefaDsT9uKON+JNgxNU1tD1M8eamniaeZ9Cg8vr0Rm4JqeMZzI8fQEe2Bw?=\n\t=?iso-8859-1?q?x/CfftWCs0fLGgsELE4gBBOWOLBXqWKB+f1ubOQrtj9wyjV/2sUVIvYr6tXP?=\n\t=?iso-8859-1?q?XXKyyjMBa3kR0hftEQgOE4Spn8uZGXJlysuIe7w9PxxG+deszHBbuhpP8TkH?=\n\t=?iso-8859-1?q?TayJx3aHdmAQ/JH08RGsWBLxgfwBgn/0zu2DSTE+sqI0dFfvqWNzcl0yh+0j?=\n\t=?iso-8859-1?q?EG8XuNGENs4/GM/QVvBvmmgNbIyUDKIS0YGED6ALfZUrPp3yzMTY8n339AlL?=\n\t=?iso-8859-1?q?h4ZYJfpEhemyyrkXFwqCJX7ST/6gL5SMNbDfsOk3HEVRWX2+r+A7xc9iK2/R?=\n\t=?iso-8859-1?q?Uon2mfs183+c/5FISMhnnUNNJkWN5UOCWKHdMoDcUitucnruz5F7bXssIyht?=\n\t=?iso-8859-1?q?v8w7ppywEGor7n7gFlhvZNFXuAZoIxSuwmMMFkCeEqirr5iE9393baMRSDwC?=\n\t=?iso-8859-1?q?PQc95YV8BGLUV9GL10d4Hilh1MACrIvzsZrI2Aegtad1xqImiOxu3riZ2Dw5?=\n\t=?iso-8859-1?q?9vYPNjt2wi2krx5gfLyLCsoDDmoMRF38F128jkB3D66XyVLzlZw6U+sWSKs4?=\n\t=?iso-8859-1?q?v45aT5D9FfHdOPC/ZIyJb3QNpnPSrwAsh2TUcPuJUlUjubc6oxXKN5z0Fx9Q?=\n\t=?iso-8859-1?q?YbOl/wuB8r2PoE+5+F9biyrL1Vs5PTkWMqAC4NjEdKVn9mpcRWA/HnOib5nM?=\n\t=?iso-8859-1?q?wGU8CxrlAWtrha/mXZMcom8u6Iv6AaGdyHqqE6maxICmHQxqPHI1BPjYzxAH?=\n\t=?iso-8859-1?q?6uKzzZfxFTwje35hZSILrHSsgGesfj1EU9GcE+pJvAEkrG8PBPL4AK32VsnZ?=\n\t=?iso-8859-1?q?TWfC7CcKXqznEHfsi2WbXHuWsO+nGvjDFnjto/JCLOVH+7ExLJ4OrULhgN2P?=\n\t=?iso-8859-1?q?dGoDtphoSdbzUYE3fCYWyLUWXMkDGmF3dmOiVu0lZjF4JIg0b2V4uH1F/erS?=\n\t=?iso-8859-1?q?jukW4z80PumCnj8y84rLgsBoL44Y3TQ/Kg4AmNIo3nyx+uJslPkQ2mcvEPsa?=\n\t=?iso-8859-1?q?1Fc3mD9hI+Q6zW/jFbMEKLv+ZEuiXPkyoW39m0uY06bXyT3nZnlorJnImyWY?=\n\t=?iso-8859-1?q?wY4K2hTDHl9gUcZK6M18e/Slw?=", "Content-Type": "text/plain; charset=\"UTF-8\"", "Content-Transfer-Encoding": "quoted-printable", "MIME-Version": "1.0", "X-OriginatorOrg": "rosen-nxt.com", "X-MS-Exchange-CrossTenant-AuthAs": "Internal", "X-MS-Exchange-CrossTenant-AuthSource": "ZR5P278MB1911.CHEP278.PROD.OUTLOOK.COM", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e9e80865-0961-42a5-12ed-08de89a9ff16", "X-MS-Exchange-CrossTenant-originalarrivaltime": "24 Mar 2026 13:33:55.4873\n (UTC)", "X-MS-Exchange-CrossTenant-fromentityheader": "Hosted", "X-MS-Exchange-CrossTenant-id": "ff126ac9-146d-44a5-92e2-dcd1bf29806f", "X-MS-Exchange-CrossTenant-mailboxtype": "HOSTED", "X-MS-Exchange-CrossTenant-userprincipalname": "\n fhwCWPhQDc+wsJLAvPh8k81Pm54ycfsZiKF8vsRsEEQ37XbpYo9rqhS62zYTZHzGtKudf8WUQ8/IZWTvqtgkxg==", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "GVAP278MB0761", "X-Original-Sender": "okaestner@rosen-nxt.com", "X-Original-Authentication-Results": "gmr-mx.google.com; dkim=pass\n header.i=@rosen-nxt.com header.s=selector1 header.b=\"JI/7RU6H\";\n arc=pass (i=1 spf=pass spfdomain=rosen-nxt.com dkim=pass\n dkdomain=rosen-nxt.com dmarc=pass fromdomain=rosen-nxt.com); spf=pass\n (google.com: domain of okaestner@rosen-nxt.com designates\n 2a01:111:f403:c213::5\n as permitted sender) smtp.mailfrom=okaestner@rosen-nxt.com; dmarc=pass\n (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=rosen-nxt.com", "X-Original-From": "Oliver Kaestner <okaestner@rosen-nxt.com>", "Reply-To": "Oliver Kaestner <okaestner@rosen-nxt.com>", "Precedence": "list", "Mailing-list": "list swupdate@googlegroups.com;\n contact swupdate+owners@googlegroups.com", "List-ID": "<swupdate.googlegroups.com>", "X-Spam-Checked-In-Group": "swupdate@googlegroups.com", "X-Google-Group-Id": "605343134186", "List-Post": "<https://groups.google.com/group/swupdate/post>,\n <mailto:swupdate@googlegroups.com>", "List-Help": "<https://groups.google.com/support/>,\n <mailto:swupdate+help@googlegroups.com>", "List-Archive": "<https://groups.google.com/group/swupdate", "List-Subscribe": "<https://groups.google.com/group/swupdate/subscribe>,\n <mailto:swupdate+subscribe@googlegroups.com>", "List-Unsubscribe": "\n <mailto:googlegroups-manage+605343134186+unsubscribe@googlegroups.com>,\n <https://groups.google.com/group/swupdate/subscribe>" }, "content": "Do not set RSA_PSS_SALTLEN_AUTO during verification.\n\nThis fails for parameterized RSASSA-PSS keys, where the public key\nencodes any restrictions, e.g. for the digest algorithm, or salt length.\n\nSetting RSA_PSS_SALTLEN_AUTO explicitly is unnecessary for verification\nas the length will be auto-detected by default [1]:\n\n> EVP_PKEY_CTX_set_rsa_pss_saltlen() sets the RSA PSS salt length to\n> saltlen. As its name implies it is only supported for PSS padding.\n> If this function is not called then the salt length is maximized up\n> to the digest length when signing and auto detection when verifying.\n\nBut setting this value also causes the verification to fail for\nparameterized keys as the OpenSSL docs note [2]:\n\n> The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro is used to set the salt\n> length. If the key has usage restrictions then an error is returned\n> if an attempt is made to set the salt length below the minimum value.\n> It is otherwise similar to the RSA operation except detection of the\n> salt length (using RSA_PSS_SALTLEN_AUTO) is not supported for\n> verification if the key has usage restrictions.\n\nSo remove that call and let OpenSSL do the right thing automatically.\n\n[1] https://docs.openssl.org/3.5/man3/EVP_PKEY_CTX_ctrl/#rsa-parameters\n[2] https://docs.openssl.org/3.5/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_md\n\nLink: https://groups.google.com/g/swupdate/c/FMRY6rtuKW8\nSigned-off-by: Oliver Kästner <okaestner@rosen-nxt.com>\n---\n crypto/swupdate_rsa_verify_openssl.c | 5 -----\n 1 file changed, 5 deletions(-)", "diff": "diff --git a/crypto/swupdate_rsa_verify_openssl.c b/crypto/swupdate_rsa_verify_openssl.c\nindex fac102ce..195a0f44 100644\n--- a/crypto/swupdate_rsa_verify_openssl.c\n+++ b/crypto/swupdate_rsa_verify_openssl.c\n@@ -71,11 +71,6 @@ static int dgst_verify_init(struct openssl_digest *dgst)\n \t\t\tERROR(\"EVP_PKEY_CTX_set_rsa_padding failed, error 0x%lx\", ERR_get_error());\n \t\t\treturn -EFAULT; /* failed */\n \t\t}\n-\t\trc = EVP_PKEY_CTX_set_rsa_pss_saltlen(dgst->ckey, -2);\n-\t\tif (rc <= 0) {\n-\t\t\tERROR(\"EVP_PKEY_CTX_set_rsa_pss_saltlen failed, error 0x%lx\", ERR_get_error());\n-\t\t\treturn -EFAULT; /* failed */\n-\t\t}\n \t}\n \n \treturn 0;\n", "prefixes": [] }