From b87fe016aa966af1cb974f90792aa554a0804b29 Mon Sep 17 00:00:00 2001 From: Ronald Cron Date: Thu, 27 May 2021 09:40:46 +0200 Subject: [PATCH] Remove buffer overlap considerations Signed-off-by: Ronald Cron --- include/mbedtls/ccm.h | 5 ----- 1 file changed, 5 deletions(-) diff --git a/include/mbedtls/ccm.h b/include/mbedtls/ccm.h index eb0cbb2ca2..e5a58068e2 100644 --- a/include/mbedtls/ccm.h +++ b/include/mbedtls/ccm.h @@ -396,10 +396,6 @@ int mbedtls_ccm_update_ad( mbedtls_ccm_context *ctx, * * \note This function is not implemented in Mbed TLS yet. * - * \note For decryption, the output buffer cannot be the same as - * the input buffer. If the buffers overlap, the output buffer - * must trail at least 8 Bytes behind the input buffer. - * * \param ctx The CCM context. This must have been started with * mbedtls_ccm_starts(). * \param input The buffer holding the input data. If \p input_len @@ -419,7 +415,6 @@ int mbedtls_ccm_update_ad( mbedtls_ccm_context *ctx, * \return \c 0 on success. * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure: * total input length too long, - * unsupported input/output buffer overlap detected, * or \p output_size too small. */ int mbedtls_ccm_update( mbedtls_ccm_context *ctx,