From a68d35057ba2676bc9b9a16f4952791eef4b9905 Mon Sep 17 00:00:00 2001 From: Rich Salz Date: Mon, 24 Apr 2017 11:19:56 -0400 Subject: check length sanity before correcting in EVP_CTRL_AEAD_TLS1_AAD Reviewed-by: Matt Caswell Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/3289) --- crypto/evp/e_aes_cbc_hmac_sha256.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'crypto/evp/e_aes_cbc_hmac_sha256.c') diff --git a/crypto/evp/e_aes_cbc_hmac_sha256.c b/crypto/evp/e_aes_cbc_hmac_sha256.c index bef603a3a5..daae825ee1 100644 --- a/crypto/evp/e_aes_cbc_hmac_sha256.c +++ b/crypto/evp/e_aes_cbc_hmac_sha256.c @@ -788,6 +788,8 @@ static int aesni_cbc_hmac_sha256_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, key->payload_length = len; if ((key->aux.tls_ver = p[arg - 4] << 8 | p[arg - 3]) >= TLS1_1_VERSION) { + if (len < AES_BLOCK_SIZE) + return 0; len -= AES_BLOCK_SIZE; p[arg - 2] = len >> 8; p[arg - 1] = len; -- cgit v1.2.3