summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-01-02 11:51:10 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-01-02 11:58:15 +0100
commitbbaf1475c3a8034cbb3773ab9acc3e71e4a6e793 (patch)
treeea62b628964c1e3d29d2eb020c85464e494aa57c
parentf231a3bf9c2bc7acefc291139e1348110d1ee390 (diff)
downloadgnutls-tmp-fix-pkcs8-decryption-issue.tar.gz
pkcs7 decrypt: require a valid IV size on all cipherstmp-fix-pkcs8-decryption-issue
That is, do not accept the IV size present in the structure as valid without checking. Relates #156
-rw-r--r--lib/x509/pkcs7-crypt.c17
1 files changed, 13 insertions, 4 deletions
diff --git a/lib/x509/pkcs7-crypt.c b/lib/x509/pkcs7-crypt.c
index 968775657e..e62500c84d 100644
--- a/lib/x509/pkcs7-crypt.c
+++ b/lib/x509/pkcs7-crypt.c
@@ -1091,10 +1091,19 @@ _gnutls_pkcs_raw_decrypt_data(schema_id schema, ASN1_TYPE pkcs8_asn,
ce = cipher_to_entry(enc_params->cipher);
block_size = _gnutls_cipher_get_block_size(ce);
- if (ce->type == CIPHER_BLOCK && (enc.size % block_size != 0)) {
- gnutls_assert();
- ret = GNUTLS_E_DECRYPTION_FAILED;
- goto error;
+ if (ce->type == CIPHER_BLOCK) {
+ if (enc.size % block_size != 0 || (unsigned)enc_params->iv_size != block_size) {
+ gnutls_assert();
+ ret = GNUTLS_E_DECRYPTION_FAILED;
+ goto error;
+ }
+ } else {
+ unsigned iv_size = _gnutls_cipher_get_iv_size(ce);
+ if (iv_size > (unsigned)enc_params->iv_size) {
+ gnutls_assert();
+ ret = GNUTLS_E_DECRYPTION_FAILED;
+ goto error;
+ }
}
/* do the decryption.