openssl/providers/implementations
Matt Caswell d23adad113 EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed
EVP_CIPHER_CTX_set_keylen() was succeeding even though a bad key length
is passed to it. This is because the set_ctx_params() were all accepting
this parameter and blindly changing the keylen even though the cipher did
not accept a variable key length. Even removing this didn't entirely
resolve the issue because set_ctx_params() functions succeed even if
passed a parameter they do not recognise.

This should fix various issues found by OSSfuzz/Cryptofuzz.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10449)
2019-11-19 13:33:54 +00:00
..
asymciphers Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00
ciphers EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed 2019-11-19 13:33:54 +00:00
digests Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
exchange Cleanup: move providers/common/include/internal/provider_args.h 2019-10-10 14:12:15 +02:00
include/prov Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00
kdfs Add KRB5KDF from RFC 3961 2019-10-23 08:32:48 +02:00
keymgmt CORE & PROV: make export of key data leaner through callback 2019-11-14 10:53:14 +01:00
macs Add ChaCha related ciphers to default provider 2019-10-16 16:18:42 +10:00
signature Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
build.info Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00