You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Though Cipher.getOutputSize(int) is permitted to overestimate the amount of space needed, ACCP should avoid doing so. Currently it is assuming that OpenSSL may be caching up to one block internally (due to the internal management of the counter). We should either:
Determine that this isn't the case and we can just return inputLen + tagLength, or
Track bytes handled so far so we can give a completely correct answer.
This will make it easier to use our APIs correctly and also more efficient as callers will not need to allocate extra memory (which then must be truncated.
* develop:
Remove dead code and bump patch version
Add logic to generate a classpath file
Clarify best practices are local to ACCP
Improve documentation (corretto#151)
Update CHANGELOG for 1.6.0 (corretto#148)
Handle RsaCipher#engineDoFinal with no input bytes (corretto#147)
Validate that AesGcmSpi#engineInit gets non-null key (corretto#146)
Move to OpenSSL 1.1.1j (corretto#145)
Add list of known differences (corretto#137)
Better output size estimates. Fixescorretto#135
Move to openssl 1.1.1i (corretto#136)
Initial commit of the development guide (corretto#134)
Though Cipher.getOutputSize(int) is permitted to overestimate the amount of space needed, ACCP should avoid doing so. Currently it is assuming that OpenSSL may be caching up to one block internally (due to the internal management of the counter). We should either:
inputLen + tagLength
, orThis will make it easier to use our APIs correctly and also more efficient as callers will not need to allocate extra memory (which then must be truncated.
See AesGcmSpi.engineGetOutputSize(int).
The text was updated successfully, but these errors were encountered: