crypto: fix bug in large buffer handling
authorPaul Eggert <eggert@cs.ucla.edu>
Fri, 18 May 2012 20:10:42 +0000 (13:10 -0700)
committerPaul Eggert <eggert@cs.ucla.edu>
Fri, 18 May 2012 20:11:59 +0000 (13:11 -0700)
commit0403c76938c7f487d303818cd19a72a1b63eb94f
treeb77915d4432e5d29350f26e6d09be90a98c4fd8c
parenta7cb62bfec02bbcd5d200eeb1ce1f8a4fde631b8
crypto: fix bug in large buffer handling

Problem reported by Serge Belyshev for glibc in
<http://sourceware.org/bugzilla/show_bug.cgi?id=14090> and for gnulib in
<http://lists.gnu.org/archive/html/bug-gnulib/2012-05/msg00226.html>.
* lib/md4.c (md4_process_block):
* lib/md5.c (md5_process_block):
* lib/sha1.c (sha1_process_block):
* lib/sha256.c (sha256_process_block):
Don't assume the buffer length is less than 2**32.
ChangeLog
lib/md4.c
lib/md5.c
lib/sha1.c
lib/sha256.c