mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-29 17:24:20 +01:00
Add parameter validation to SHA-512 module
This commit is contained in:
parent
af0c6cb9e0
commit
ba519b94a5
@ -41,6 +41,8 @@ API Changes
|
|||||||
mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
|
mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
|
||||||
mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
|
mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
|
||||||
* Extend ECDH interface to enable alternative implementations.
|
* Extend ECDH interface to enable alternative implementations.
|
||||||
|
* Add validation checks for input parameters to functions in the SHA-512
|
||||||
|
module.
|
||||||
|
|
||||||
New deprecations
|
New deprecations
|
||||||
* Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
|
* Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
|
||||||
|
@ -76,7 +76,7 @@
|
|||||||
* RIPEMD160 1 0x0031-0x0031
|
* RIPEMD160 1 0x0031-0x0031
|
||||||
* SHA1 1 0x0035-0x0035
|
* SHA1 1 0x0035-0x0035
|
||||||
* SHA256 1 0x0037-0x0037
|
* SHA256 1 0x0037-0x0037
|
||||||
* SHA512 1 0x0039-0x0039
|
* SHA512 1 0x0039-0x0039 0x0075-0x0075
|
||||||
* CHACHA20 3 0x0051-0x0055
|
* CHACHA20 3 0x0051-0x0055
|
||||||
* POLY1305 3 0x0057-0x005B
|
* POLY1305 3 0x0057-0x005B
|
||||||
* CHACHAPOLY 2 0x0054-0x0056
|
* CHACHAPOLY 2 0x0054-0x0056
|
||||||
|
@ -37,6 +37,7 @@
|
|||||||
|
|
||||||
/* MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED is deprecated and should not be used. */
|
/* MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED is deprecated and should not be used. */
|
||||||
#define MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED -0x0039 /**< SHA-512 hardware accelerator failed */
|
#define MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED -0x0039 /**< SHA-512 hardware accelerator failed */
|
||||||
|
#define MBEDTLS_ERR_SHA512_BAD_INPUT_DATA -0x0075 /**< Invalid input data. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
|
@ -88,8 +88,14 @@
|
|||||||
}
|
}
|
||||||
#endif /* PUT_UINT64_BE */
|
#endif /* PUT_UINT64_BE */
|
||||||
|
|
||||||
|
#define MBEDTLS_SHA512_VALIDATE_RET(cond) \
|
||||||
|
MBEDTLS_VALIDATE_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, cond )
|
||||||
|
#define MBEDTLS_SHA512_VALIDATE(cond) MBEDTLS_VALIDATE( cond )
|
||||||
|
|
||||||
void mbedtls_sha512_init( mbedtls_sha512_context *ctx )
|
void mbedtls_sha512_init( mbedtls_sha512_context *ctx )
|
||||||
{
|
{
|
||||||
|
MBEDTLS_SHA512_VALIDATE( ctx != NULL );
|
||||||
|
|
||||||
memset( ctx, 0, sizeof( mbedtls_sha512_context ) );
|
memset( ctx, 0, sizeof( mbedtls_sha512_context ) );
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -104,6 +110,9 @@ void mbedtls_sha512_free( mbedtls_sha512_context *ctx )
|
|||||||
void mbedtls_sha512_clone( mbedtls_sha512_context *dst,
|
void mbedtls_sha512_clone( mbedtls_sha512_context *dst,
|
||||||
const mbedtls_sha512_context *src )
|
const mbedtls_sha512_context *src )
|
||||||
{
|
{
|
||||||
|
MBEDTLS_SHA512_VALIDATE( dst != NULL );
|
||||||
|
MBEDTLS_SHA512_VALIDATE( src != NULL );
|
||||||
|
|
||||||
*dst = *src;
|
*dst = *src;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -112,6 +121,8 @@ void mbedtls_sha512_clone( mbedtls_sha512_context *dst,
|
|||||||
*/
|
*/
|
||||||
int mbedtls_sha512_starts_ret( mbedtls_sha512_context *ctx, int is384 )
|
int mbedtls_sha512_starts_ret( mbedtls_sha512_context *ctx, int is384 )
|
||||||
{
|
{
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( ctx != NULL );
|
||||||
|
|
||||||
ctx->total[0] = 0;
|
ctx->total[0] = 0;
|
||||||
ctx->total[1] = 0;
|
ctx->total[1] = 0;
|
||||||
|
|
||||||
@ -209,6 +220,9 @@ int mbedtls_internal_sha512_process( mbedtls_sha512_context *ctx,
|
|||||||
uint64_t temp1, temp2, W[80];
|
uint64_t temp1, temp2, W[80];
|
||||||
uint64_t A, B, C, D, E, F, G, H;
|
uint64_t A, B, C, D, E, F, G, H;
|
||||||
|
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( ctx != NULL );
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( (const unsigned char *)data != NULL );
|
||||||
|
|
||||||
#define SHR(x,n) (x >> n)
|
#define SHR(x,n) (x >> n)
|
||||||
#define ROTR(x,n) (SHR(x,n) | (x << (64 - n)))
|
#define ROTR(x,n) (SHR(x,n) | (x << (64 - n)))
|
||||||
|
|
||||||
@ -297,6 +311,9 @@ int mbedtls_sha512_update_ret( mbedtls_sha512_context *ctx,
|
|||||||
if( ilen == 0 )
|
if( ilen == 0 )
|
||||||
return( 0 );
|
return( 0 );
|
||||||
|
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( ctx != NULL );
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( input != NULL );
|
||||||
|
|
||||||
left = (unsigned int) (ctx->total[0] & 0x7F);
|
left = (unsigned int) (ctx->total[0] & 0x7F);
|
||||||
fill = 128 - left;
|
fill = 128 - left;
|
||||||
|
|
||||||
@ -351,6 +368,9 @@ int mbedtls_sha512_finish_ret( mbedtls_sha512_context *ctx,
|
|||||||
unsigned used;
|
unsigned used;
|
||||||
uint64_t high, low;
|
uint64_t high, low;
|
||||||
|
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( ctx != NULL );
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( (unsigned char *)output != NULL );
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Add padding: 0x80 then 0x00 until 16 bytes remain for the length
|
* Add padding: 0x80 then 0x00 until 16 bytes remain for the length
|
||||||
*/
|
*/
|
||||||
@ -427,6 +447,9 @@ int mbedtls_sha512_ret( const unsigned char *input,
|
|||||||
int ret;
|
int ret;
|
||||||
mbedtls_sha512_context ctx;
|
mbedtls_sha512_context ctx;
|
||||||
|
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( ilen == 0 || input != NULL );
|
||||||
|
MBEDTLS_SHA512_VALIDATE_RET( (unsigned char *)output != NULL );
|
||||||
|
|
||||||
mbedtls_sha512_init( &ctx );
|
mbedtls_sha512_init( &ctx );
|
||||||
|
|
||||||
if( ( ret = mbedtls_sha512_starts_ret( &ctx, is384 ) ) != 0 )
|
if( ( ret = mbedtls_sha512_starts_ret( &ctx, is384 ) ) != 0 )
|
||||||
|
Loading…
Reference in New Issue
Block a user