openssl/providers/common/ciphers
Matt Caswell 4b9c750be8 Make sure we handle input NULL with length 0
If we call EVP_EncryptUpdate/EVP_DecryptUpdate with length 0 we should
be able to handle it. Most importantly we shouldn't get different
results if we do this compared to if we don't!

An exception is made for CCM mode which has special handling for this in
the low level cipher function.

Fixes #8675

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/10530)
2019-11-29 10:41:06 +00:00
..
block.c Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
build.info Providers: move all ciphers 2019-10-10 14:12:15 +02:00
cipher_ccm_hw.c Providers: move all ciphers 2019-10-10 14:12:15 +02:00
cipher_ccm.c Providers: fix OSSL_FUNC_CIPHER_CIPHER functions 2019-10-11 15:55:36 +02:00
cipher_common_hw.c Providers: move all ciphers 2019-10-10 14:12:15 +02:00
cipher_common.c Make sure we handle input NULL with length 0 2019-11-29 10:41:06 +00:00
cipher_gcm_hw.c Providers: move all ciphers 2019-10-10 14:12:15 +02:00
cipher_gcm.c Make sure we handle input NULL with length 0 2019-11-29 10:41:06 +00:00
cipher_local.h Providers: move all ciphers 2019-10-10 14:12:15 +02:00