Document the implications of setting engine-based low-level methods
authorTomas Mraz <tomas@openssl.org>
Wed, 27 Dec 2023 18:21:49 +0000 (19:21 +0100)
committerTomas Mraz <tomas@openssl.org>
Wed, 31 Jan 2024 17:41:11 +0000 (18:41 +0100)
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23063)

(cherry picked from commit dbb478a51d3f695ec713e9829a2353a0d2d61a59)

doc/man7/migration_guide.pod

index d9e4b37b2bf393318323e0fd7ab668854e1a4d87..28983ea600e5653c2e8d387e34151e399c8f8450 100644 (file)
@@ -156,6 +156,14 @@ To ensure the future compatibility, the engines should be turned to providers.
 To prefer the provider-based hardware offload, you can specify the default
 properties to prefer your provider.
 
+Setting engine-based or application-based default low-level crypto method such
+as B<RSA_METHOD> or B<EC_KEY_METHOD> is still possible and keys inside the
+default provider will use the engine-based implementation for the crypto
+operations. However B<EVP_PKEY>s created by decoding by using B<OSSL_DECODER>,
+B<PEM_> or B<d2i_> APIs will be provider-based. To create a fully legacy
+B<EVP_PKEY>s L<EVP_PKEY_set1_RSA(3)>, L<EVP_PKEY_set1_EC_KEY(3)> or similar
+functions must be used.
+
 =head3 Versioning Scheme
 
 The OpenSSL versioning scheme has changed with the OpenSSL 3.0 release. The new