openssl/crypto/rand
Bernd Edlinger 42fa3e6669 Fix a buffer overflow in drbg_ctr_generate
This can happen if the 32-bit counter overflows
and the last block is not a multiple of 16 bytes.

Fixes #12012

[extended tests]

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Patrick Steuer <patrick.steuer@de.ibm.com>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/12016)
2020-06-03 13:15:36 +02:00
..
build.info Put sys-specific files in build.info 2020-04-16 13:52:23 +02:00
drbg_ctr.c Fix a buffer overflow in drbg_ctr_generate 2020-06-03 13:15:36 +02:00
drbg_hash.c
drbg_hmac.c Update copyright year 2020-04-23 13:55:52 +01:00
drbg_lib.c Rename FIPS_MODE to FIPS_MODULE 2020-04-28 15:37:37 +02:00
rand_crng_test.c
rand_egd.c Update copyright year 2020-04-23 13:55:52 +01:00
rand_err.c
rand_lib.c Rename FIPS_MODE to FIPS_MODULE 2020-04-28 15:37:37 +02:00
rand_local.h Rename FIPS_MODE to FIPS_MODULE 2020-04-28 15:37:37 +02:00
rand_unix.c Fix egd and devrandom source configs 2020-05-20 14:48:16 +02:00
rand_vms.c Update copyright year 2020-04-23 13:55:52 +01:00
rand_vxworks.c Amend references to "OpenSSL license" 2020-04-29 15:27:22 +02:00
rand_win.c Update copyright year 2020-05-15 14:09:49 +01:00
randfile.c