From a68d35057ba2676bc9b9a16f4952791eef4b9905 Mon Sep 17 00:00:00 2001 From: Rich Salz Date: Mon, 24 Apr 2017 11:19:56 -0400 Subject: check length sanity before correcting in EVP_CTRL_AEAD_TLS1_AAD Reviewed-by: Matt Caswell Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/3289) --- crypto/evp/e_aes_cbc_hmac_sha1.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'crypto/evp/e_aes_cbc_hmac_sha1.c') diff --git a/crypto/evp/e_aes_cbc_hmac_sha1.c b/crypto/evp/e_aes_cbc_hmac_sha1.c index a3c8951f5c..3721751c80 100644 --- a/crypto/evp/e_aes_cbc_hmac_sha1.c +++ b/crypto/evp/e_aes_cbc_hmac_sha1.c @@ -809,6 +809,8 @@ static int aesni_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, key->payload_length = len; if ((key->aux.tls_ver = p[arg - 4] << 8 | p[arg - 3]) >= TLS1_1_VERSION) { + if (len < AES_BLOCK_SIZE) + return 0; len -= AES_BLOCK_SIZE; p[arg - 2] = len >> 8; p[arg - 1] = len; -- cgit v1.2.3