4a8c05ffe8
AES_set_*_key used to call directly into aes_nohw_set_*_key which gracefully handles some NULL parameters and invalid bit sizes. However, we now enable optimized assembly implementations, not all of which perform these checks. (vpaes does not.) This is fine for the internal assembly functions themselves. Such checks are better written in C than assembly, and the calling C code usually already knows the key size. (Indeed aes_ctr_set_key already assumes the assembly functions are infallible.) AES_set_*_key are public APIs, however. The NULL check is silly, but we should handle length-like checks in public APIs. Change-Id: I259ae6b9811ceaa9dc5bd7173d5754ca7079cff8 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/35564 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
aes | ||
bn | ||
cipher | ||
des | ||
digest | ||
ec | ||
ecdh | ||
ecdsa | ||
hmac | ||
md4 | ||
md5 | ||
modes | ||
policydocs | ||
rand | ||
rsa | ||
self_check | ||
sha | ||
tls | ||
bcm.c | ||
CMakeLists.txt | ||
delocate.h | ||
FIPS.md | ||
intcheck1.png | ||
intcheck2.png | ||
intcheck3.png | ||
is_fips.c |