openssl/providers
Benjamin Kaduk 7cc5e0d283 Allow oversized buffers for provider cipher IV fetch
When we're fetching an IV, there's no need to enforce that the
provided buffer is exactly the same size as the IV we want to
write into it.  This might happen, for example, when
EVP_CIPHER_CTX_iv_noconst() passes sizeof(ctx->iv) (that is,
EVP_MAX_IV_LENGTH) for an AES-GCM cipher that uses a shorter IV.
AES-OCB and CCM were also affected.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12039)
2020-06-20 09:46:41 -07:00
..
common Create defines for TLS Group Ids 2020-06-19 10:19:32 +01:00
fips Add more complete support for libctx/propq in the EC code 2020-06-19 10:34:58 +01:00
implementations Allow oversized buffers for provider cipher IV fetch 2020-06-20 09:46:41 -07:00
build.info Fix some misunderstandings in our providers' main modules 2020-05-12 11:32:40 +02:00
defltprov.c Add the concept of "Capabilities" to the default and fips providers 2020-06-19 10:19:31 +01:00
legacyprov.c Maintain strict type discipline between the core and providers 2020-05-16 17:10:03 +01:00
nullprov.c Maintain strict type discipline between the core and providers 2020-05-16 17:10:03 +01:00