mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-22 21:35:39 +01:00
Introduce single BLOWFISH error code for bad input data
Deprecate the old specific error codes * MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH * MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
This commit is contained in:
parent
4c029d09be
commit
d2f3a00062
@ -39,6 +39,10 @@ API Changes
|
|||||||
- MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH
|
- MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH
|
||||||
- MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH
|
- MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH
|
||||||
in favour of a new single error MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA.
|
in favour of a new single error MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA.
|
||||||
|
* Deprecate the Blowfish error constants
|
||||||
|
- MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
|
||||||
|
- MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
|
||||||
|
in favour of a new single error MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA.
|
||||||
|
|
||||||
New deprecations
|
New deprecations
|
||||||
* Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
|
* Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
|
||||||
|
@ -33,6 +33,8 @@
|
|||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
|
#include "platform_util.h"
|
||||||
|
|
||||||
#define MBEDTLS_BLOWFISH_ENCRYPT 1
|
#define MBEDTLS_BLOWFISH_ENCRYPT 1
|
||||||
#define MBEDTLS_BLOWFISH_DECRYPT 0
|
#define MBEDTLS_BLOWFISH_DECRYPT 0
|
||||||
#define MBEDTLS_BLOWFISH_MAX_KEY_BITS 448
|
#define MBEDTLS_BLOWFISH_MAX_KEY_BITS 448
|
||||||
@ -40,14 +42,16 @@
|
|||||||
#define MBEDTLS_BLOWFISH_ROUNDS 16 /**< Rounds to use. When increasing this value, make sure to extend the initialisation vectors */
|
#define MBEDTLS_BLOWFISH_ROUNDS 16 /**< Rounds to use. When increasing this value, make sure to extend the initialisation vectors */
|
||||||
#define MBEDTLS_BLOWFISH_BLOCKSIZE 8 /* Blowfish uses 64 bit blocks */
|
#define MBEDTLS_BLOWFISH_BLOCKSIZE 8 /* Blowfish uses 64 bit blocks */
|
||||||
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH -0x0016 /**< Invalid key length. */
|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||||
|
#define MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x0016 )
|
||||||
|
#define MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x0018 )
|
||||||
|
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
||||||
|
#define MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA -0x0016 /**< Bad input data. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED is deprecated and should not be used.
|
/* MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED is deprecated and should not be used.
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED -0x0017 /**< Blowfish hardware accelerator failed. */
|
#define MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED -0x0017 /**< Blowfish hardware accelerator failed. */
|
||||||
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH -0x0018 /**< Invalid data input length. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -51,7 +51,7 @@
|
|||||||
* Module Nr Codes assigned
|
* Module Nr Codes assigned
|
||||||
* MPI 7 0x0002-0x0010
|
* MPI 7 0x0002-0x0010
|
||||||
* GCM 3 0x0012-0x0014 0x0013-0x0013
|
* GCM 3 0x0012-0x0014 0x0013-0x0013
|
||||||
* BLOWFISH 3 0x0016-0x0018 0x0017-0x0017
|
* BLOWFISH 2 0x0016-0x0016 0x0017-0x0017
|
||||||
* THREADING 3 0x001A-0x001E
|
* THREADING 3 0x001A-0x001E
|
||||||
* AES 5 0x0020-0x0022 0x0021-0x0025
|
* AES 5 0x0020-0x0022 0x0021-0x0025
|
||||||
* CAMELLIA 2 0x0024-0x0024 0x0027-0x0027
|
* CAMELLIA 2 0x0024-0x0024 0x0027-0x0027
|
||||||
|
@ -176,7 +176,7 @@ int mbedtls_blowfish_setkey( mbedtls_blowfish_context *ctx, const unsigned char
|
|||||||
if( keybits < MBEDTLS_BLOWFISH_MIN_KEY_BITS || keybits > MBEDTLS_BLOWFISH_MAX_KEY_BITS ||
|
if( keybits < MBEDTLS_BLOWFISH_MIN_KEY_BITS || keybits > MBEDTLS_BLOWFISH_MAX_KEY_BITS ||
|
||||||
( keybits % 8 ) )
|
( keybits % 8 ) )
|
||||||
{
|
{
|
||||||
return( MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH );
|
return( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA );
|
||||||
}
|
}
|
||||||
|
|
||||||
keybits >>= 3;
|
keybits >>= 3;
|
||||||
@ -265,7 +265,7 @@ int mbedtls_blowfish_crypt_cbc( mbedtls_blowfish_context *ctx,
|
|||||||
unsigned char temp[MBEDTLS_BLOWFISH_BLOCKSIZE];
|
unsigned char temp[MBEDTLS_BLOWFISH_BLOCKSIZE];
|
||||||
|
|
||||||
if( length % MBEDTLS_BLOWFISH_BLOCKSIZE )
|
if( length % MBEDTLS_BLOWFISH_BLOCKSIZE )
|
||||||
return( MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH );
|
return( MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA );
|
||||||
|
|
||||||
if( mode == MBEDTLS_BLOWFISH_DECRYPT )
|
if( mode == MBEDTLS_BLOWFISH_DECRYPT )
|
||||||
{
|
{
|
||||||
|
@ -203,13 +203,13 @@ BLOWFISH-ECB Decrypt SSLeay reference #34
|
|||||||
blowfish_decrypt_ecb:"fedcba9876543210":"6b5c5a9c5d9e0a5a":"ffffffffffffffff":0
|
blowfish_decrypt_ecb:"fedcba9876543210":"6b5c5a9c5d9e0a5a":"ffffffffffffffff":0
|
||||||
|
|
||||||
BLOWFISH-SETKEY Setkey SSLeay reference #1
|
BLOWFISH-SETKEY Setkey SSLeay reference #1
|
||||||
blowfish_encrypt_ecb:"f0":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
|
blowfish_encrypt_ecb:"f0":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-SETKEY Setkey SSLeay reference #2
|
BLOWFISH-SETKEY Setkey SSLeay reference #2
|
||||||
blowfish_encrypt_ecb:"f0e1":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
|
blowfish_encrypt_ecb:"f0e1":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-SETKEY Setkey SSLeay reference #3
|
BLOWFISH-SETKEY Setkey SSLeay reference #3
|
||||||
blowfish_encrypt_ecb:"f0e1d2":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
|
blowfish_encrypt_ecb:"f0e1d2":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-SETKEY Setkey SSLeay reference #4
|
BLOWFISH-SETKEY Setkey SSLeay reference #4
|
||||||
blowfish_encrypt_ecb:"f0e1d2c3":"fedcba9876543210":"be1e639408640f05":0
|
blowfish_encrypt_ecb:"f0e1d2c3":"fedcba9876543210":"be1e639408640f05":0
|
||||||
@ -281,7 +281,7 @@ BLOWFISH-SETKEY Setkey 448 bits
|
|||||||
blowfish_encrypt_ecb:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fff":"fedcba9876543210":"2fb3ab7f0ee91b69":0
|
blowfish_encrypt_ecb:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fff":"fedcba9876543210":"2fb3ab7f0ee91b69":0
|
||||||
|
|
||||||
BLOWFISH-SETKEY Setkey 456 bits
|
BLOWFISH-SETKEY Setkey 456 bits
|
||||||
blowfish_encrypt_ecb:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fffff":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
|
blowfish_encrypt_ecb:"f0e1d2c3b4a5968778695a4b3c2d1e0f00112233445566778899aabbccddeeff0123456789abcdef0102030405060708090a0b0c0d0e0fffff":"fedcba9876543210":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-CBC Encrypt
|
BLOWFISH-CBC Encrypt
|
||||||
blowfish_encrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F722000000000":"6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc":0
|
blowfish_encrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F722000000000":"6b77b4d63006dee605b156e27403979358deb9e7154616d959f1652bd5ff92cc":0
|
||||||
@ -290,10 +290,10 @@ BLOWFISH-CBC Decrypt
|
|||||||
blowfish_decrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC":"37363534333231204e6f77206973207468652074696d6520666f722000000000":0
|
blowfish_decrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC":"37363534333231204e6f77206973207468652074696d6520666f722000000000":0
|
||||||
|
|
||||||
BLOWFISH-CBC Encrypt
|
BLOWFISH-CBC Encrypt
|
||||||
blowfish_encrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F7220000000":"":MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
|
blowfish_encrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F7220000000":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-CBC Decrypt
|
BLOWFISH-CBC Decrypt
|
||||||
blowfish_decrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC00":"":MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
|
blowfish_decrypt_cbc:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC00":"":MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA
|
||||||
|
|
||||||
BLOWFISH-CFB Encrypt
|
BLOWFISH-CFB Encrypt
|
||||||
blowfish_encrypt_cfb64:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F722000":"e73214a2822139caf26ecf6d2eb9e76e3da3de04d1517200519d57a6c3"
|
blowfish_encrypt_cfb64:"0123456789ABCDEFF0E1D2C3B4A59687":"FEDCBA9876543210":"37363534333231204E6F77206973207468652074696D6520666F722000":"e73214a2822139caf26ecf6d2eb9e76e3da3de04d1517200519d57a6c3"
|
||||||
|
Loading…
Reference in New Issue
Block a user