openssl/crypto/evp
Richard Levitte dcb982d792 EVP_*Update: ensure that input NULL with length 0 isn't passed
Even with custome ciphers, the combination in == NULL && inl == 0
should not be passed down to the backend cipher function.  The reason
is that these are the values passed by EVP_*Final, and some of the
backend cipher functions do check for these to see if a "final" call
is made.

Fixes #8675

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8676)
2019-04-10 07:52:55 +02:00
..
bio_b64.c
bio_enc.c
bio_md.c
bio_ok.c
build.info Add generic EVP method fetcher 2019-03-18 14:27:02 +01:00
c_allc.c
c_alld.c
c_allm.c blake2: backport changes to blake2s 2019-02-06 09:18:43 +00:00
cmeth_lib.c
digest.c Add a legacy provider and put MD2 in it 2019-04-09 10:24:43 +01:00
e_aes_cbc_hmac_sha1.c
e_aes_cbc_hmac_sha256.c
e_aes.c Move the AES-XTS mode duplicated key check into the init_key function rather 2019-04-05 10:55:40 +10:00
e_aria.c Fix a memory leak in ARIA GCM 2019-03-27 10:26:52 +00:00
e_bf.c
e_camellia.c
e_cast.c
e_chacha20_poly1305.c Prevent over long nonces in ChaCha20-Poly1305 2019-03-06 13:25:09 +00:00
e_des3.c
e_des.c
e_idea.c
e_null.c
e_old.c
e_rc2.c
e_rc4_hmac_md5.c
e_rc4.c
e_rc5.c
e_seed.c
e_sm4.c
e_xcbc_d.c
encode.c constify *_dup() and *i2d_*() and related functions as far as possible, introducing DECLARE_ASN1_DUP_FUNCTION 2019-03-06 16:10:09 +00:00
evp_cnf.c EVP configuration section: add 'default_properties' command 2019-04-05 15:43:37 +02:00
evp_enc.c EVP_*Update: ensure that input NULL with length 0 isn't passed 2019-04-10 07:52:55 +02:00
evp_err.c EVP_set_default_properties(): New function to set global properties 2019-04-05 15:43:37 +02:00
evp_fetch.c Use the right NID when putting a method in the store 2019-04-09 10:24:43 +01:00
evp_key.c
evp_lib.c Support EVP_MD_block_size() with providers 2019-04-03 15:50:13 +01:00
evp_locl.h Use the right NID when putting a method in the store 2019-04-09 10:24:43 +01:00
evp_pbe.c Added new EVP/KDF API. 2019-02-13 12:11:49 +01:00
evp_pkey.c constify *_dup() and *i2d_*() and related functions as far as possible, introducing DECLARE_ASN1_DUP_FUNCTION 2019-03-06 16:10:09 +00:00
kdf_lib.c Single step kdf implementation 2019-03-19 11:03:45 +00:00
m_md2.c
m_md4.c
m_md5_sha1.c
m_md5.c
m_mdc2.c
m_null.c
m_ripemd.c
m_sha1.c
m_sha3.c
m_sigver.c
m_wp.c
mac_lib.c Tolerate 0 byte input length for Update functions 2019-03-27 10:14:03 +00:00
names.c
p5_crpt2.c Adapt OPENSSL_DEBUG_PKCS5V2 to the new generic trace API 2019-03-06 11:15:14 +01:00
p5_crpt.c
p_dec.c
p_enc.c
p_lib.c Providing missing accessor to EVP_PKEY.engine 2019-03-19 10:42:33 +00:00
p_open.c Fix the allocation size in EVP_OpenInit and PEM_SignFinal 2019-04-06 10:17:19 +02:00
p_seal.c
p_sign.c
p_verify.c
pbe_scrypt.c EVP_PBE_scrypt() handles salt=NULL as salt="" 2019-03-17 19:27:37 +10:00
pkey_kdf.c The use of the likes of UINT32_MAX requires internal/numbers.h 2019-02-28 10:31:20 +01:00
pkey_mac.c Correctly check the return code of EVP_MAC_ctrl everwhere it is used 2019-03-27 14:31:56 +00:00
pmeth_fn.c
pmeth_gn.c
pmeth_lib.c constify *_dup() and *i2d_*() and related functions as far as possible, introducing DECLARE_ASN1_DUP_FUNCTION 2019-03-06 16:10:09 +00:00