New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
param_bld: add a padded BN call. #10840
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The manual might need a teeny bit more
make update required.. |
Feedback addressed. |
Ping reviewer. |
I wish there were a resolution to #10840 (comment) :( |
I think we disagree. |
There's nothing to resolve. That usage example is just that, but does not affect this PR per se. |
I expected to see this rewrite of int ossl_param_bld_push_BN(OSSL_PARAM_BLD *bld, const char *key,
const BIGNUM *bn)
{
return ossl_param_bld_push_BN_pad(bld, key, bn, bn == NULL ? 0 : BN_num_bytes(bn));
} UPDATE to handle NULL bn |
That rewrite isn't quite right. A NULL bn argument is permitted by that function. |
Er, what? Looking at the code, they seem to treat a NULL bn exactly the same way... |
Sorry, now I see. I've update my proposed rewrite |
I've made the change. |
Please check the CIs before merging |
To aviod leaking size information when passing private value using the OSSL_PARAM builder, a padded BN call is required.
ec57726
to
9358a47
Compare
Merged to master. Thanks for the input. |
To aviod leaking size information when passing private value using the OSSL_PARAM builder, a padded BN call is required. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from #10840)
To aviod leaking size information when passing private value using the
OSSL_PARAM builder, a padded BN call is required.