openssl/providers/implementations
Dimitri John Ledkov 15d6114d99 hkdf: when HMAC key is all zeros, still set a valid key length
By itself, this is no change in any computation. However, this will
unlock enforcing minimum key lengths for NIST and FIPS 140-3
requirements.

Also reading RFC8448 and RFC5869, this seems to be strictly correct
too.

Signed-off-by: Dimitri John Ledkov <dimitri.ledkov@surgut.co.uk>

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24204)
2024-04-25 14:00:05 +02:00
..
asymciphers Add missing settable entry OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST_PROPS for RSA asym 2023-12-29 10:41:06 +01:00
ciphers Copyright year updates 2024-04-09 13:43:27 +02:00
digests Copyright year updates 2024-04-09 13:43:26 +02:00
encode_decode Copyright year updates 2024-04-09 13:43:26 +02:00
exchange Fix EVP_PKEY_CTX_add1_hkdf_info() behavior 2024-04-09 20:19:07 +02:00
include/prov Implement BLAKE2s with the same macro as BLAKE2b 2023-11-08 09:42:13 +01:00
kdfs hkdf: when HMAC key is all zeros, still set a valid key length 2024-04-25 14:00:05 +02:00
kem Copyright year updates 2023-09-07 09:59:15 +01:00
keymgmt Implement PCT for EDDSA 2024-03-01 11:06:03 +01:00
macs macs/kmac_prov.c: Add checks for the EVP_MD_get_size() 2024-04-01 15:16:44 -04:00
rands Fix typos found by codespell 2024-04-10 09:24:15 +02:00
signature signature/dsa_sig.c: Add checks for the EVP_MD_get_size() 2024-04-09 20:45:26 +02:00
storemgmt Copyright year updates 2023-09-07 09:59:15 +01:00
build.info