Do not fail if ctx dup does not succeed
authorSimo Sorce <simo@redhat.com>
Fri, 24 Feb 2023 00:51:27 +0000 (19:51 -0500)
committerPauli <pauli@openssl.org>
Tue, 14 Mar 2023 21:42:52 +0000 (08:42 +1100)
commit0fc00fc0e3867fc5f95fab1046ad7d2a85db06f8
tree91ef7e2a84349602a3763855227e75754a1e8ac3
parentdba97d4c7142621fb279ef2074cd5c0a04eca7d3
Do not fail if ctx dup does not succeed

If the ctx was *really* needed we'll probably fail later with an error
anyway, so no point in failing immediately.

Document that this behavior is dependent on the provider used to
implement the signature/verification.

Signed-off-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/20375)
crypto/evp/m_sigver.c
crypto/evp/p_sign.c
crypto/evp/p_verify.c
doc/man3/EVP_DigestSignInit.pod
doc/man3/EVP_DigestVerifyInit.pod
doc/man3/EVP_SignInit.pod
doc/man3/EVP_VerifyInit.pod