openssl/providers/common
Matt Caswell d23adad113 EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed
EVP_CIPHER_CTX_set_keylen() was succeeding even though a bad key length
is passed to it. This is because the set_ctx_params() were all accepting
this parameter and blindly changing the keylen even though the cipher did
not accept a variable key length. Even removing this didn't entirely
resolve the issue because set_ctx_params() functions succeed even if
passed a parameter they do not recognise.

This should fix various issues found by OSSfuzz/Cryptofuzz.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10449)
2019-11-19 13:33:54 +00:00
..
ciphers EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed 2019-11-19 13:33:54 +00:00
digests Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
include/prov EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed 2019-11-19 13:33:54 +00:00
build.info Rename providers/common/provlib.c to nid_to_name.c 2019-11-10 05:05:06 +01:00
nid_to_name.c Rename providers/common/provlib.c to nid_to_name.c 2019-11-10 05:05:06 +01:00
provider_err.c Implement provider support for Asym Ciphers 2019-11-14 09:29:46 +00:00
provider_util.c [KDF] Add feedback-mode and CMAC support to KBKDF 2019-10-17 12:45:03 +10:00