diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-02-07 09:24:18 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-02-08 14:57:06 +0100 |
commit | d6a771cfa70ae23e0e7c4c16d593c368dd836f3e (patch) | |
tree | a3c35b8bcbf7410db8d54cdd48336346d4c4b97b /lib/accelerated/x86/aes-gcm-padlock.c | |
parent | eefd582a22dddef452bb469bff10664bf282fdd7 (diff) | |
download | gnutls-d6a771cfa70ae23e0e7c4c16d593c368dd836f3e.tar.gz |
accelerated: make explicit key size check to all accelerated ciphers
That is, do not rely on checks done on asm level, as they vary and
may change over updates. Also handle consistently invalid key sizes
by returning an error, and eliminate calls to abort().
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'lib/accelerated/x86/aes-gcm-padlock.c')
-rw-r--r-- | lib/accelerated/x86/aes-gcm-padlock.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/lib/accelerated/x86/aes-gcm-padlock.c b/lib/accelerated/x86/aes-gcm-padlock.c index 51b02a8d5c..a6c5d50eb9 100644 --- a/lib/accelerated/x86/aes-gcm-padlock.c +++ b/lib/accelerated/x86/aes-gcm-padlock.c @@ -113,7 +113,8 @@ aes_gcm_cipher_setkey(void *_ctx, const void *key, size_t keysize) } else if (keysize == 32) { GCM_SET_KEY(ctx, padlock_aes256_set_encrypt_key, padlock_aes_encrypt, key); - } else abort(); + } else + return GNUTLS_E_INVALID_REQUEST; return 0; } |