openssl/providers/implementations
Matt Caswell 4b9c750be8 Make sure we handle input NULL with length 0
If we call EVP_EncryptUpdate/EVP_DecryptUpdate with length 0 we should
be able to handle it. Most importantly we shouldn't get different
results if we do this compared to if we don't!

An exception is made for CCM mode which has special handling for this in
the low level cipher function.

Fixes #8675

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/10530)
2019-11-29 10:41:06 +00:00
..
asymciphers Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00
ciphers Make sure we handle input NULL with length 0 2019-11-29 10:41:06 +00:00
digests PROV: Avoid NULL dereference in SHA3 dup call. 2019-11-22 15:20:54 +10:00
exchange Cleanup: move providers/common/include/internal/provider_args.h 2019-10-10 14:12:15 +02:00
include/prov Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00
kdfs kdfs: make free calls check for NULL. 2019-11-22 15:19:28 +10:00
keymgmt CORE & PROV: make export of key data leaner through callback 2019-11-14 10:53:14 +01:00
macs Add ChaCha related ciphers to default provider 2019-10-16 16:18:42 +10:00
signature Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
build.info Move RSA Asym cipher code to the default provider 2019-11-14 09:29:46 +00:00