summaryrefslogtreecommitdiffstats
path: root/providers/fips.checksum
diff options
context:
space:
mode:
authorShane Lontis <shane.lontis@oracle.com>2021-05-01 14:49:25 +1000
committerShane Lontis <shane.lontis@oracle.com>2021-05-05 17:39:27 +1000
commit2b05439f8441a5483da65fd4208d82d9e007f448 (patch)
tree82dee791ba1aa5f7e8cb99fdef48c46437100fd9 /providers/fips.checksum
parent029875dc5ba28f18e3067c883fb53c9ae91d6954 (diff)
Fix KMAC bounds checks.
Setting an output length higher than 8191 was causing a buffer overflow. This was reported by Acumen (FIPS lab). The max output size has increased to ~2M and it now checks this during set_parameters. The encoder related functions now pass in the maximum size of the output buffer so they can correctly check their size. kmac_bytepad_encode_key() calls bytepad twice in order to calculate and check the length before encoding. Note that right_encode() is currently only used in one place but this may change if other algorithms are supported (such as TupleHash). Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15106)
Diffstat (limited to 'providers/fips.checksum')
-rw-r--r--providers/fips.checksum2
1 files changed, 1 insertions, 1 deletions
diff --git a/providers/fips.checksum b/providers/fips.checksum
index 468c3c986e..ff7a1c2c78 100644
--- a/providers/fips.checksum
+++ b/providers/fips.checksum
@@ -1 +1 @@
-16e17331a77aed06b6537cafdacd35df08fbc888c04eb7cca928a4a39d858642 providers/fips-sources.checksums
+b998b19b940b606688e4711014407c48c3fca4c58b2fdc60ac64c1cef94861c1 providers/fips-sources.checksums