]> git.ipfire.org Git - thirdparty/openssl.git/commit - providers/implementations/macs/siphash_prov.c
Ensure EVP_MAC_update() passes the length even if it is 0
authorMatt Caswell <matt@openssl.org>
Mon, 31 Aug 2020 13:44:17 +0000 (14:44 +0100)
committerMatt Caswell <matt@openssl.org>
Thu, 3 Sep 2020 08:40:52 +0000 (09:40 +0100)
commit0bc193dd05fa0f5580706f34994beb74baf3d531
tree170c605323a9388c1a45dd2cb81896155cf89282
parent13c9843cff061304275a1723bcba137280e2e97d
Ensure EVP_MAC_update() passes the length even if it is 0

We leave it up to the EVP_MAC implemenations what to do with an update
where the data length is 0. In the TLS HMAC implemenation this is still
signficant.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12732)
crypto/evp/mac_lib.c
providers/implementations/macs/blake2_mac_impl.c
providers/implementations/macs/gmac_prov.c
providers/implementations/macs/poly1305_prov.c
providers/implementations/macs/siphash_prov.c