crypto: dh - make crypto_dh_encode_key() make robust
Make it return -EINVAL if crypto_dh_key_len() is incorrect rather than overflowing the buffer. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
35f7d5225f
commit
d6e43798b3
1 changed files with 16 additions and 14 deletions
|
@ -16,8 +16,10 @@
|
|||
|
||||
#define DH_KPP_SECRET_MIN_SIZE (sizeof(struct kpp_secret) + 4 * sizeof(int))
|
||||
|
||||
static inline u8 *dh_pack_data(void *dst, const void *src, size_t size)
|
||||
static inline u8 *dh_pack_data(u8 *dst, u8 *end, const void *src, size_t size)
|
||||
{
|
||||
if (!dst || size > end - dst)
|
||||
return NULL;
|
||||
memcpy(dst, src, size);
|
||||
return dst + size;
|
||||
}
|
||||
|
@ -42,27 +44,27 @@ EXPORT_SYMBOL_GPL(crypto_dh_key_len);
|
|||
int crypto_dh_encode_key(char *buf, unsigned int len, const struct dh *params)
|
||||
{
|
||||
u8 *ptr = buf;
|
||||
u8 * const end = ptr + len;
|
||||
struct kpp_secret secret = {
|
||||
.type = CRYPTO_KPP_SECRET_TYPE_DH,
|
||||
.len = len
|
||||
};
|
||||
|
||||
if (unlikely(!buf))
|
||||
if (unlikely(!len))
|
||||
return -EINVAL;
|
||||
|
||||
if (len != crypto_dh_key_len(params))
|
||||
ptr = dh_pack_data(ptr, end, &secret, sizeof(secret));
|
||||
ptr = dh_pack_data(ptr, end, ¶ms->key_size,
|
||||
sizeof(params->key_size));
|
||||
ptr = dh_pack_data(ptr, end, ¶ms->p_size, sizeof(params->p_size));
|
||||
ptr = dh_pack_data(ptr, end, ¶ms->q_size, sizeof(params->q_size));
|
||||
ptr = dh_pack_data(ptr, end, ¶ms->g_size, sizeof(params->g_size));
|
||||
ptr = dh_pack_data(ptr, end, params->key, params->key_size);
|
||||
ptr = dh_pack_data(ptr, end, params->p, params->p_size);
|
||||
ptr = dh_pack_data(ptr, end, params->q, params->q_size);
|
||||
ptr = dh_pack_data(ptr, end, params->g, params->g_size);
|
||||
if (ptr != end)
|
||||
return -EINVAL;
|
||||
|
||||
ptr = dh_pack_data(ptr, &secret, sizeof(secret));
|
||||
ptr = dh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size));
|
||||
ptr = dh_pack_data(ptr, ¶ms->p_size, sizeof(params->p_size));
|
||||
ptr = dh_pack_data(ptr, ¶ms->q_size, sizeof(params->q_size));
|
||||
ptr = dh_pack_data(ptr, ¶ms->g_size, sizeof(params->g_size));
|
||||
ptr = dh_pack_data(ptr, params->key, params->key_size);
|
||||
ptr = dh_pack_data(ptr, params->p, params->p_size);
|
||||
ptr = dh_pack_data(ptr, params->q, params->q_size);
|
||||
dh_pack_data(ptr, params->g, params->g_size);
|
||||
|
||||
return 0;
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(crypto_dh_encode_key);
|
||||
|
|
Loading…
Reference in a new issue