summaryrefslogtreecommitdiffstats
path: root/crypto/core_namemap.c
diff options
context:
space:
mode:
authorBenjamin Kaduk <bkaduk@akamai.com>2020-06-01 12:31:55 -0700
committerBenjamin Kaduk <kaduk@mit.edu>2020-06-20 09:46:41 -0700
commit7cc5e0d283800c757e46d1476273d271120aa38d (patch)
tree85a647dca5e7125f20bc3dff00efe621aba70490 /crypto/core_namemap.c
parent320d96a32c16de1adbf11f76819fe738f24665b1 (diff)
Allow oversized buffers for provider cipher IV fetch
When we're fetching an IV, there's no need to enforce that the provided buffer is exactly the same size as the IV we want to write into it. This might happen, for example, when EVP_CIPHER_CTX_iv_noconst() passes sizeof(ctx->iv) (that is, EVP_MAX_IV_LENGTH) for an AES-GCM cipher that uses a shorter IV. AES-OCB and CCM were also affected. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12039)
Diffstat (limited to 'crypto/core_namemap.c')
0 files changed, 0 insertions, 0 deletions