}
int ossl_param_get1_concat_octet_string(size_t n, OSSL_PARAM *params[],
- unsigned char **out,
- size_t *out_len, size_t maxsize)
+ unsigned char **out, size_t *out_len)
{
unsigned char *res;
size_t sz = 0;
if (!setbuf_fromparams(n, params, NULL, &sz))
return 0;
- /* Check that it's not oversized */
- if (maxsize > 0 && sz > maxsize)
- return 0;
-
/* Special case zero length */
if (sz == 0) {
if ((res = OPENSSL_zalloc(1)) == NULL)
* doesn't return success.
*/
int ossl_param_get1_concat_octet_string(size_t n, OSSL_PARAM *params[],
- unsigned char **out,
- size_t *out_len, size_t maxsize);
+ unsigned char **out, size_t *out_len);
return 0;
if (ossl_param_get1_concat_octet_string(p.num_info, p.info,
- &ctx->info, &ctx->info_len, 0) == 0)
+ &ctx->info, &ctx->info_len) == 0)
return 0;
#ifdef FIPS_MODULE
return 0;
if (ossl_param_get1_concat_octet_string(p.num_info, p.info, &ctx->context,
- &ctx->context_len, 0) == 0)
+ &ctx->context_len) == 0)
return 0;
if (ossl_param_get1_octet_string_from_param(p.seed, &ctx->iv,
return 0;
if (ossl_param_get1_concat_octet_string(p->num_info, p->info, &ctx->info,
- &ctx->info_len, 0) == 0)
+ &ctx->info_len) == 0)
return 0;
if (ossl_param_get1_octet_string_from_param(p->salt, &ctx->salt,