openssl/providers/implementations
Benjamin Kaduk 20c2876f24 Increase HKDF_MAXBUF from 1024 to 2048
We've encountered some scenarios that need to use more than 1 kB of
data as the HKDF-Expand() "info" argument (which, per RFC 5869,
contains "optional context and application specific information").

Since HKDF_MAXBUF is used to size an array in the HKDF_PKEY_CTX
structure, this adds 1 kB of memory footprint to each EVP_PKEY_CTX
used for HKDF.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14649)
2021-03-30 16:40:28 -07:00
..
asymciphers rsa: fix coverity 1472658: resource leak 2021-03-20 10:08:00 +10:00
ciphers Add ossl_provider symbols 2021-03-18 17:52:38 +10:00
digests Add ossl_ symbols for sm3 and sm4 2021-03-18 17:52:37 +10:00
encode_decode RSA-PSS: When printing parameters, always print the trailerfield ASN.1 value 2021-03-26 11:25:48 +01:00
exchange Add ossl_ ecx symbols 2021-03-18 17:52:37 +10:00
include/prov Add ossl_rand symbols 2021-03-18 17:52:37 +10:00
kdfs Increase HKDF_MAXBUF from 1024 to 2048 2021-03-30 16:40:28 -07:00
kem prov: update KEM to support params on init() 2021-03-12 08:27:11 +10:00
keymgmt Fix change in behaviour of EVP_PKEY_CTRL_RSA_KEYGEN_BITS 2021-03-30 19:22:33 +02:00
macs Fix a TODO(3.0) in the siphash code 2021-03-17 10:16:21 +10:00
rands Fix a missing rand -> ossl_rand rename 2021-03-18 16:52:38 +01:00
signature sm2: fix coverity 1467503: explicit null dereference 2021-03-26 08:44:04 +10:00
storemgmt STORE: Use the same error avoidance criteria as for the DER->key decoder 2021-03-19 16:46:39 +01:00
build.info Add KEM (Key encapsulation mechanism) support to providers 2020-09-19 18:08:46 +10:00