Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: a0587aaeff7391b8cf4ee4c6a233d0f4dca7d62f
      
https://github.openssl.org/openssl/openssl/commit/a0587aaeff7391b8cf4ee4c6a233d0f4dca7d62f
  Author: Richard Levitte <[email protected]>
  Date:   2022-06-15 (Wed, 15 Jun 2022)

  Changed paths:
    M test/evp_test.c

  Log Message:
  -----------
  test/evp_test.c: Check too big output buffer sizes in PKEYKDF tests

EVP_PKEY_derive() should be able to cope with a too big buffer for fixed
size outputs.  However, we don't test that.

This change modifies the PKEYKDF tests to ask EVP_PKEY_derive() what the
desired output buffer size is, and as long as the returned value isn't
absurd (indicating that anything goes), the output buffer is made to be
twice as big as what is expected.

Tests #18517

Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18533)


  Commit: e906eab8d863ac7bdadc671e8d0686fead88c4bf
      
https://github.openssl.org/openssl/openssl/commit/e906eab8d863ac7bdadc671e8d0686fead88c4bf
  Author: Richard Levitte <[email protected]>
  Date:   2022-06-15 (Wed, 15 Jun 2022)

  Changed paths:
    M providers/implementations/exchange/kdf_exch.c

  Log Message:
  -----------
  providers/implementations/exchange/kdf_exch.c: Fix kdf_derive()

kdf_derive() calls EVP_KDF_derive(), but didn't do enough to adapt its input
buffer length arguments to fit the requirements to call EVP_KDF_derive().

Fixes #18517

Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18533)


Compare: 
https://github.openssl.org/openssl/openssl/compare/76a597c512a0...e906eab8d863

Reply via email to