aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/modes/mode_pad
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2018-11-30 11:33:05 -0500
committerJack Lloyd <[email protected]>2018-11-30 11:33:05 -0500
commit2d9a5c1ffa61c2a30cb66518ef2de496467540ed (patch)
tree72f9e34852fb72ea435f3a3860a8b2072069f777 /src/lib/modes/mode_pad
parent542975a40e34b92f483468b37589fd448b002732 (diff)
Fix a bug in OneAndZeros unpadding
Introduced in b13c0cc8590199d, it could only trigger if the block size was more than 256 bytes. In that case an invalid padding could be accepted. OSS-Fuzz 11608 (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11608)
Diffstat (limited to 'src/lib/modes/mode_pad')
-rw-r--r--src/lib/modes/mode_pad/mode_pad.cpp11
1 files changed, 6 insertions, 5 deletions
diff --git a/src/lib/modes/mode_pad/mode_pad.cpp b/src/lib/modes/mode_pad/mode_pad.cpp
index 5c949e9cf..be3ecf7dc 100644
--- a/src/lib/modes/mode_pad/mode_pad.cpp
+++ b/src/lib/modes/mode_pad/mode_pad.cpp
@@ -53,7 +53,7 @@ void PKCS7_Padding::add_padding(secure_vector<uint8_t>& buffer,
*/
size_t PKCS7_Padding::unpad(const uint8_t input[], size_t input_length) const
{
- if(input_length <= 2)
+ if(!valid_blocksize(input_length))
return input_length;
CT::poison(input, input_length);
@@ -104,7 +104,7 @@ void ANSI_X923_Padding::add_padding(secure_vector<uint8_t>& buffer,
*/
size_t ANSI_X923_Padding::unpad(const uint8_t input[], size_t input_length) const
{
- if(input_length <= 2)
+ if(!valid_blocksize(input_length))
return input_length;
CT::poison(input, input_length);
@@ -146,7 +146,7 @@ void OneAndZeros_Padding::add_padding(secure_vector<uint8_t>& buffer,
*/
size_t OneAndZeros_Padding::unpad(const uint8_t input[], size_t input_length) const
{
- if(input_length <= 2)
+ if(!valid_blocksize(input_length))
return input_length;
CT::poison(input, input_length);
@@ -170,7 +170,8 @@ size_t OneAndZeros_Padding::unpad(const uint8_t input[], size_t input_length) co
bad_input |= ~seen_0x80;
CT::unpoison(input, input_length);
- return bad_input.select_and_unpoison(input_length, pad_pos);
+
+ return CT::Mask<size_t>::expand(bad_input).select_and_unpoison(input_length, pad_pos);
}
/*
@@ -193,7 +194,7 @@ void ESP_Padding::add_padding(secure_vector<uint8_t>& buffer,
*/
size_t ESP_Padding::unpad(const uint8_t input[], size_t input_length) const
{
- if(input_length <= 2)
+ if(!valid_blocksize(input_length))
return input_length;
CT::poison(input, input_length);