openssl/providers/implementations
Matt Caswell 0bc193dd05 Ensure EVP_MAC_update() passes the length even if it is 0
We leave it up to the EVP_MAC implemenations what to do with an update
where the data length is 0. In the TLS HMAC implemenation this is still
signficant.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12732)
2020-09-03 09:40:52 +01:00
..
asymciphers
ciphers Fix stitched ciphersuites in TLS1.0 2020-08-20 17:02:34 +01:00
digests
encode_decode Add the correct enum value for DSA public key serialization 2020-08-31 14:49:16 +10:00
exchange
include/prov Include "legacy" in the name of the various MAC bridge functions 2020-08-29 17:40:12 +10:00
kdfs Fix coverity CID #1465794 - Uninitialized pointer read in x942_encode_otherinfo() 2020-08-24 11:19:28 +10:00
keymgmt Include "legacy" in the name of the various MAC bridge functions 2020-08-29 17:40:12 +10:00
macs Ensure EVP_MAC_update() passes the length even if it is 0 2020-09-03 09:40:52 +01:00
rands rand: add a note about a potentially misleading code analyzer warning. 2020-08-28 08:43:07 +10:00
signature Enable PKEY MAC bridge signature algs to take ctx params 2020-09-03 09:40:52 +01:00
build.info Rename OSSL_SERIALIZER / OSSL_DESERIALIZER to OSSL_ENCODE / OSSL_DECODE 2020-08-21 09:23:58 +02:00