openssl/providers/common/include/prov
Matt Caswell d23adad113 EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed
EVP_CIPHER_CTX_set_keylen() was succeeding even though a bad key length
is passed to it. This is because the set_ctx_params() were all accepting
this parameter and blindly changing the keylen even though the cipher did
not accept a variable key length. Even removing this didn't entirely
resolve the issue because set_ctx_params() functions succeed even if
passed a parameter they do not recognise.

This should fix various issues found by OSSfuzz/Cryptofuzz.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10449)
2019-11-19 13:33:54 +00:00
..
cipher_aead.h Remove EVP_CIPH_FLAG_CUSTOM_CIPHER in all our providers 2019-10-11 15:58:15 +02:00
cipher_ccm.h
cipher_gcm.h
ciphercommon.h EVP_CIPHER_CTX_set_keylen should not succeed if a bad keylen is passed 2019-11-19 13:33:54 +00:00
digestcommon.h
provider_ctx.h Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
provider_util.h Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
providercommon.h Cleanup: move remaining providers/common/include/internal/*.h 2019-10-10 14:12:15 +02:00
providercommonerr.h Implement provider support for Asym Ciphers 2019-11-14 09:29:46 +00:00