diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2017-12-02 00:41:25 +0800 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2017-12-01 11:41:25 -0500 |
commit | 9fa6fb273559d29d471df80942ce066e6e40dfde (patch) | |
tree | 7108f14bfee1aebafdade8c8282b4f0cee32013d /tests/x509 | |
parent | 4662d44fd3db5078a1882100653a3dbab3e3c7a1 (diff) | |
download | cryptography-9fa6fb273559d29d471df80942ce066e6e40dfde.tar.gz cryptography-9fa6fb273559d29d471df80942ce066e6e40dfde.tar.bz2 cryptography-9fa6fb273559d29d471df80942ce066e6e40dfde.zip |
Pass the right length of null bytes when no salt is provided to HKDF (#4036)
This bug looks bad but ends up being benign because HMAC is specified to
pad null bytes if a key is too short. So we passed too few bytes and
then OpenSSL obligingly padded it out to the correct length. However, we
should still do the right thing obviously.
Diffstat (limited to 'tests/x509')
0 files changed, 0 insertions, 0 deletions