SPARC T4 assembly pack: treat zero input length in CBC.
authorAndy Polyakov <appro@openssl.org>
Fri, 7 Mar 2014 09:30:37 +0000 (10:30 +0100)
committerAndy Polyakov <appro@openssl.org>
Fri, 7 Mar 2014 09:48:51 +0000 (10:48 +0100)
commitcc6dc9b2294f7dd59899452470b4bbeaed1eb57d
tree90a2ce5db027c86ecfa4900c3ee73560d02f455a
parentfe69e6be6e551c04d9d6a186c7fee1e635313ca6
SPARC T4 assembly pack: treat zero input length in CBC.

The problem is that OpenSSH calls EVP_Cipher, which is not as
protective as EVP_CipherUpdate. Formally speaking we ought to
do more checks in *_cipher methods, including rejecting
lengths not divisible by block size (unless ciphertext stealing
is in place). But for now I implement check for zero length in
low-level based on precedent.

PR: 3087, 2775
(cherry picked from commit 5e44c144e649a53bae2724b34d908f6cb26b01ed)
crypto/des/asm/dest4-sparcv9.pl
crypto/perlasm/sparcv9_modes.pl