summaryrefslogtreecommitdiff
path: root/lib/accelerated/x86/aes-gcm-padlock.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-02-07 09:24:18 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-02-08 14:57:06 +0100
commitd6a771cfa70ae23e0e7c4c16d593c368dd836f3e (patch)
treea3c35b8bcbf7410db8d54cdd48336346d4c4b97b /lib/accelerated/x86/aes-gcm-padlock.c
parenteefd582a22dddef452bb469bff10664bf282fdd7 (diff)
downloadgnutls-d6a771cfa70ae23e0e7c4c16d593c368dd836f3e.tar.gz
accelerated: make explicit key size check to all accelerated ciphers
That is, do not rely on checks done on asm level, as they vary and may change over updates. Also handle consistently invalid key sizes by returning an error, and eliminate calls to abort(). Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'lib/accelerated/x86/aes-gcm-padlock.c')
-rw-r--r--lib/accelerated/x86/aes-gcm-padlock.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/lib/accelerated/x86/aes-gcm-padlock.c b/lib/accelerated/x86/aes-gcm-padlock.c
index 51b02a8d5c..a6c5d50eb9 100644
--- a/lib/accelerated/x86/aes-gcm-padlock.c
+++ b/lib/accelerated/x86/aes-gcm-padlock.c
@@ -113,7 +113,8 @@ aes_gcm_cipher_setkey(void *_ctx, const void *key, size_t keysize)
} else if (keysize == 32) {
GCM_SET_KEY(ctx, padlock_aes256_set_encrypt_key, padlock_aes_encrypt,
key);
- } else abort();
+ } else
+ return GNUTLS_E_INVALID_REQUEST;
return 0;
}