[openssl/openssl] a0587a: test/evp_test.c: Check too big output buffer sizes...
Richard Levitte
noreply at reply.github.openssl.org
Wed Jun 15 13:19:19 UTC 2022
Branch: refs/heads/openssl-3.0
Home: https://github.openssl.org/openssl/openssl
Commit: a0587aaeff7391b8cf4ee4c6a233d0f4dca7d62f
https://github.openssl.org/openssl/openssl/commit/a0587aaeff7391b8cf4ee4c6a233d0f4dca7d62f
Author: Richard Levitte <levitte at openssl.org>
Date: 2022-06-15 (Wed, 15 Jun 2022)
Changed paths:
M test/evp_test.c
Log Message:
-----------
test/evp_test.c: Check too big output buffer sizes in PKEYKDF tests
EVP_PKEY_derive() should be able to cope with a too big buffer for fixed
size outputs. However, we don't test that.
This change modifies the PKEYKDF tests to ask EVP_PKEY_derive() what the
desired output buffer size is, and as long as the returned value isn't
absurd (indicating that anything goes), the output buffer is made to be
twice as big as what is expected.
Tests #18517
Reviewed-by: Paul Dale <pauli at openssl.org>
Reviewed-by: Tomas Mraz <tomas at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/18533)
Commit: e906eab8d863ac7bdadc671e8d0686fead88c4bf
https://github.openssl.org/openssl/openssl/commit/e906eab8d863ac7bdadc671e8d0686fead88c4bf
Author: Richard Levitte <levitte at openssl.org>
Date: 2022-06-15 (Wed, 15 Jun 2022)
Changed paths:
M providers/implementations/exchange/kdf_exch.c
Log Message:
-----------
providers/implementations/exchange/kdf_exch.c: Fix kdf_derive()
kdf_derive() calls EVP_KDF_derive(), but didn't do enough to adapt its input
buffer length arguments to fit the requirements to call EVP_KDF_derive().
Fixes #18517
Reviewed-by: Paul Dale <pauli at openssl.org>
Reviewed-by: Tomas Mraz <tomas at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/18533)
Compare: https://github.openssl.org/openssl/openssl/compare/76a597c512a0...e906eab8d863
More information about the openssl-commits
mailing list