Hi Rich,

> OpenSSL doesn't promise to protect against all such errors :)
Really ? I'm a bit surprise that you don't care to allow to divide by zero...
Especially when it's not a big work to prevent such a case.
It's up to you.

> block size of zero is nonsensical
Zero is the block size returned for Blake digests. 
And nothing prevents them to be used with PKCS12_key_gen_uni(), and certainly 
*NOT* the documentation !
;-)

Anyway, it's not a problem for me.

-----Message d'origine-----
De : Rich Salz via RT [mailto:[email protected]] 
Envoyé : mardi 19 avril 2016 14:45
À : [email protected]
Cc : [email protected]
Objet : [openssl.org #4514] [BUG] PKCS12_key_gen_uni() crashes when used with 
Blake

Ah, a slippery slope. We do not check for NULL pointers, and similarly a block 
size of zero is nonsensical. I am closing this as it's really a caller error.
It has more than enough of its own to worry about.

--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4514
Please log in as guest with password guest if prompted


-- 
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4514
Please log in as guest with password guest if prompted

-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to