mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-27 01:45:53 +00:00
b6d5693be2
The function `pk_hashlen_helper` exists to ensure a valid hash_len is used in pk_verify and pk_sign functions. This function has been used to adjust to the corrsponding hash_len if the user passes in 0 for the hash_len argument based on the md algorithm given. If the user does not pass in 0 as the hash_len, then it is not adjusted. This is problematic if the user gives a hash_len and hash buffer that is less than the associated length of the md algorithm. This error would go unchecked and eventually lead to buffer overread when given to specific pk_sign/verify functions, since they both ignore the hash_len argument if md_alg is not MBEDTLS_MD_NONE. This commit, adds a conditional to `pk_hashlen_helper` so that an error is thrown if the user specifies a hash_length (not 0) and it is not equal to the expected for the associated message digest algorithm. This aligns better with the api documentation where it states "If hash_len is 0, then the length associated with md_alg is used instead, or an error returned if it is invalid" Signed-off-by: Nick Child <nick.child@ibm.com> Signed-off-by: Nayna Jain <nayna@linux.ibm.com>
6 lines
262 B
Plaintext
6 lines
262 B
Plaintext
Bugfix
|
|
* mbedtls_pk_sign() and mbedtls_pk_verify() and their extended and
|
|
restartable variants now always honor the specified hash length if
|
|
nonzero. Before, for RSA, hash_len was ignored in favor of the length of
|
|
the specified hash algorithm.
|