mirror of
https://github.com/openssl/openssl.git
synced 2025-02-23 14:42:15 +08:00
When using pbkdf1 key deriviation, it is possible to request a key length larger than the maximum digest size a given digest can produce, leading to a read of random stack memory. fix it by returning an error if the requested key size n is larger than the EVP_MD_size of the digest Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23174) |
||
---|---|---|
.. | ||
asymciphers | ||
ciphers | ||
digests | ||
encode_decode | ||
exchange | ||
include/prov | ||
kdfs | ||
kem | ||
keymgmt | ||
macs | ||
rands | ||
signature | ||
storemgmt | ||
build.info |