Fix output bounds checking in EVP_AEAD_CTX_seal_scatter

This broke with the CRYPTO_IOVEC change and, in calls with extra_in, we
didn't actually notice if the output buffer wasn't sized correctly.

Bug: 383343306
Change-Id: I719f427cf53359c2d77829e2732d8a9d119a4d67
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/93547
Auto-Submit: David Benjamin <davidben@google.com>
Presubmit-BoringSSL-Verified: boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com <boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com>
Commit-Queue: Rudolf Polzer <rpolzer@google.com>
Reviewed-by: Rudolf Polzer <rpolzer@google.com>
2 files changed
tree: 1573019641f39ee89646947ab53523e698a3d780
  1. .bcr/
  2. .github/
  3. bench/
  4. cmake/
  5. crypto/
  6. decrepit/
  7. docs/
  8. fuzz/
  9. gen/
  10. include/
  11. infra/
  12. pki/
  13. rust/
  14. ssl/
  15. third_party/
  16. tool/
  17. util/
  18. .bazelignore
  19. .bazelrc
  20. .bazelversion
  21. .clang-format
  22. .clang-format-ignore
  23. .gitattributes
  24. .gitignore
  25. API-CONVENTIONS.md
  26. AUTHORS
  27. BREAKING-CHANGES.md
  28. BUILD.bazel
  29. build.json
  30. BUILDING.md
  31. CMakeLists.txt
  32. codereview.settings
  33. CONTRIBUTING.md
  34. FUZZING.md
  35. go.mod
  36. go.sum
  37. INCORPORATING.md
  38. LICENSE
  39. MODULE.bazel
  40. MODULE.bazel.lock
  41. PORTING.md
  42. PRESUBMIT.py
  43. PrivacyInfo.xcprivacy
  44. README.md
  45. SANDBOXING.md
  46. SECURITY.md
  47. STYLE.md
README.md

BoringSSL

BoringSSL is a fork of OpenSSL that is designed to meet Google's needs.

Although BoringSSL is an open source project, it is not intended for general use, as OpenSSL is. We don't recommend that third parties depend upon it. Doing so is likely to be frustrating because there are no guarantees of API or ABI stability.

Programs ship their own copies of BoringSSL when they use it and we update everything as needed when deciding to make API changes. This allows us to mostly avoid compromises in the name of compatibility. It works for us, but it may not work for you.

BoringSSL arose because Google used OpenSSL for many years in various ways and, over time, built up a large number of patches that were maintained while tracking upstream OpenSSL. As Google's product portfolio became more complex, more copies of OpenSSL sprung up and the effort involved in maintaining all these patches in multiple places was growing steadily.

Currently BoringSSL is the SSL library in Chrome/Chromium, Android (but it's not part of the NDK) and a number of other apps/programs.

Project links:

To file a security issue, use the Chromium process and mention in the report this is for BoringSSL. You can ignore the parts of the process that are specific to Chromium/Chrome.

There are other files in this directory which might be helpful: