summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPauli <pauli@openssl.org>2021-08-24 09:40:52 +1000
committerPauli <pauli@openssl.org>2021-08-26 09:33:52 +1000
commit9698a56e82da0262146c0f74b40d132f99099850 (patch)
tree37143f36ed4e1f9f1de5798010f23610254a48c0
parent31656f27855ddd477349f5960b29d605d32fe38d (diff)
aes-wrap: improve error handling
The AES wrap cipher was return -1 on error from the provider rather than 0. This is fixed. There was a problem with the error handling in AES wrap which fell back to a default "final error". This adds a fix for the error and more specific errors for the different failure possibilities. Fixes #16387 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16391)
-rw-r--r--providers/implementations/ciphers/cipher_aes_wrp.c28
1 files changed, 21 insertions, 7 deletions
diff --git a/providers/implementations/ciphers/cipher_aes_wrp.c b/providers/implementations/ciphers/cipher_aes_wrp.c
index f797db4596..8bddf475e2 100644
--- a/providers/implementations/ciphers/cipher_aes_wrp.c
+++ b/providers/implementations/ciphers/cipher_aes_wrp.c
@@ -152,16 +152,22 @@ static int aes_wrap_cipher_internal(void *vctx, unsigned char *out,
return 0;
/* Input length must always be non-zero */
- if (inlen == 0)
+ if (inlen == 0) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH);
return -1;
+ }
/* If decrypting need at least 16 bytes and multiple of 8 */
- if (!ctx->enc && (inlen < 16 || inlen & 0x7))
+ if (!ctx->enc && (inlen < 16 || inlen & 0x7)) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH);
return -1;
+ }
/* If not padding input must be multiple of 8 */
- if (!pad && inlen & 0x7)
+ if (!pad && inlen & 0x7) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_INPUT_LENGTH);
return -1;
+ }
if (out == NULL) {
if (ctx->enc) {
@@ -182,7 +188,15 @@ static int aes_wrap_cipher_internal(void *vctx, unsigned char *out,
rv = wctx->wrapfn(&wctx->ks.ks, ctx->iv_set ? ctx->iv : NULL, out, in,
inlen, ctx->block);
- return rv ? (int)rv : -1;
+ if (!rv) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_CIPHER_OPERATION_FAILED);
+ return -1;
+ }
+ if (rv > INT_MAX) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_OUTPUT_LENGTH);
+ return -1;
+ }
+ return (int)rv;
}
static int aes_wrap_final(void *vctx, unsigned char *out, size_t *outl,
@@ -212,12 +226,12 @@ static int aes_wrap_cipher(void *vctx,
if (outsize < inl) {
ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
- return -1;
+ return 0;
}
len = aes_wrap_cipher_internal(ctx, out, in, inl);
- if (len == 0)
- return -1;
+ if (len <= 0)
+ return 0;
*outl = len;
return 1;