-
Notifications
You must be signed in to change notification settings - Fork 483
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix shorten-64-to-32 #743
base: main
Are you sure you want to change the base?
Fix shorten-64-to-32 #743
Changes from all commits
a06b7ed
3b9af4b
16a4835
ebfb916
6e6c1dc
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
name: IOS CI | ||
|
||
on: | ||
push: | ||
branches: [ main ] | ||
pull_request: | ||
branches: [ main ] | ||
|
||
jobs: | ||
build: | ||
strategy: | ||
fail-fast: false | ||
|
||
runs-on: macos-latest | ||
|
||
steps: | ||
|
||
- uses: actions/checkout@v2 | ||
|
||
- name: Create Build Environment | ||
run: cmake -E make_directory ${{github.workspace}}/build | ||
|
||
- name: Configure CMake | ||
working-directory: ${{github.workspace}}/build | ||
shell: bash | ||
run: cmake $GITHUB_WORKSPACE -GXcode -DCMAKE_SYSTEM_NAME=iOS | ||
|
||
- name: Build | ||
working-directory: ${{github.workspace}}/build | ||
shell: bash | ||
run: cmake --build . --target srtp3 -- -sdk iphonesimulator |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -258,12 +258,16 @@ static srtp_err_status_t srtp_aes_gcm_openssl_set_aad(void *cv, | |
debug_print(srtp_mod_aes_gcm, "setting AAD: %s", | ||
srtp_octet_string_hex_string(aad, aad_len)); | ||
|
||
if (aad_len > INT_MAX) { | ||
return srtp_err_status_bad_param; | ||
} | ||
|
||
if (c->dir == srtp_direction_encrypt) { | ||
if (EVP_EncryptUpdate(c->ctx, NULL, &len, aad, aad_len) != 1) { | ||
if (EVP_EncryptUpdate(c->ctx, NULL, &len, aad, (int)aad_len) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
} else { | ||
if (EVP_DecryptUpdate(c->ctx, NULL, &len, aad, aad_len) != 1) { | ||
if (EVP_DecryptUpdate(c->ctx, NULL, &len, aad, (int)aad_len) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
} | ||
|
@@ -300,10 +304,14 @@ static srtp_err_status_t srtp_aes_gcm_openssl_encrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Might want to move this up a few lines, as there is a comparison against it just above before this check. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. That comparison should be fine as they are all size_t, this is check was only to protect from casting. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yeah, this will not break since it is the same type. I just prefer to check values before using them. But, your call. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
/* | ||
* Encrypt the data | ||
*/ | ||
if (EVP_EncryptUpdate(c->ctx, dst, &len, src, src_len) != 1) { | ||
if (EVP_EncryptUpdate(c->ctx, dst, &len, src, (int)src_len) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
*dst_len = len; | ||
|
@@ -319,7 +327,7 @@ static srtp_err_status_t srtp_aes_gcm_openssl_encrypt(void *cv, | |
/* | ||
* Retrieve the tag | ||
*/ | ||
if (EVP_CIPHER_CTX_ctrl(c->ctx, EVP_CTRL_GCM_GET_TAG, c->tag_len, | ||
if (EVP_CIPHER_CTX_ctrl(c->ctx, EVP_CTRL_GCM_GET_TAG, (int)c->tag_len, | ||
dst + *dst_len) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
|
@@ -357,10 +365,15 @@ static srtp_err_status_t srtp_aes_gcm_openssl_decrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Same here. Used a couple of times above before this check. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
/* | ||
* Decrypt the data | ||
*/ | ||
if (EVP_DecryptUpdate(c->ctx, dst, &len, src, src_len - c->tag_len) != 1) { | ||
if (EVP_DecryptUpdate(c->ctx, dst, &len, src, | ||
(int)(src_len - c->tag_len)) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
*dst_len = len; | ||
|
@@ -371,7 +384,7 @@ static srtp_err_status_t srtp_aes_gcm_openssl_decrypt(void *cv, | |
* explicitly cast away const of src | ||
*/ | ||
if (EVP_CIPHER_CTX_ctrl( | ||
c->ctx, EVP_CTRL_GCM_SET_TAG, c->tag_len, | ||
c->ctx, EVP_CTRL_GCM_SET_TAG, (int)c->tag_len, | ||
(void *)(uintptr_t)(src + (src_len - c->tag_len))) != 1) { | ||
return srtp_err_status_algo_fail; | ||
} | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -57,6 +57,7 @@ | |
#include "crypto_types.h" | ||
#include "cipher_types.h" | ||
#include "cipher_test_cases.h" | ||
#include <limits.h> | ||
|
||
srtp_debug_module_t srtp_mod_aes_gcm = { | ||
0, /* debugging is off by default */ | ||
|
@@ -225,7 +226,8 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_context_init(void *cv, | |
} | ||
} | ||
|
||
err = wc_AesGcmSetKey(c->ctx, (const unsigned char *)key, c->key_size); | ||
err = wc_AesGcmSetKey(c->ctx, (const unsigned char *)key, | ||
(word32)c->key_size); | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
return srtp_err_status_init_fail; | ||
|
@@ -298,10 +300,16 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_set_aad(void *cv, | |
memcpy(c->aad + c->aad_size, aad, aad_len); | ||
c->aad_size += aad_len; | ||
#else | ||
if (aad_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Seems like this should be moved just above the log statement, as I assume this should run regardless of the conditional compilation statements. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
if (c->dir == srtp_direction_encrypt) { | ||
err = wc_AesGcmEncryptUpdate(c->ctx, NULL, NULL, 0, aad, aad_len); | ||
err = | ||
wc_AesGcmEncryptUpdate(c->ctx, NULL, NULL, 0, aad, (word32)aad_len); | ||
} else { | ||
err = wc_AesGcmDecryptUpdate(c->ctx, NULL, NULL, 0, aad, aad_len); | ||
err = | ||
wc_AesGcmDecryptUpdate(c->ctx, NULL, NULL, 0, aad, (word32)aad_len); | ||
} | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
|
@@ -338,6 +346,10 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_encrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This one should be moved up a bit, since the value is compared just before this check. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
#ifndef WOLFSSL_AESGCM_STREAM | ||
// tag must always be 16 bytes when passed to wc_AesGcmEncrypt, can truncate | ||
// to c->tag_len after | ||
|
@@ -349,12 +361,12 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_encrypt(void *cv, | |
memcpy(dst + src_len, tag, c->tag_len); | ||
} | ||
#else | ||
err = wc_AesGcmEncryptUpdate(c->ctx, dst, src, src_len, NULL, 0); | ||
err = wc_AesGcmEncryptUpdate(c->ctx, dst, src, (word32)src_len, NULL, 0); | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
return srtp_err_status_algo_fail; | ||
} | ||
err = wc_AesGcmEncryptFinal(c->ctx, dst + src_len, c->tag_len); | ||
err = wc_AesGcmEncryptFinal(c->ctx, dst + src_len, (word32)c->tag_len); | ||
#endif | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
|
@@ -397,6 +409,10 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_decrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Might want to move this up a few lines above the first comparison against src_len. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
#ifndef WOLFSSL_AESGCM_STREAM | ||
debug_print(srtp_mod_aes_gcm, "AAD: %s", | ||
srtp_octet_string_hex_string(c->aad, c->aad_size)); | ||
|
@@ -406,14 +422,14 @@ static srtp_err_status_t srtp_aes_gcm_wolfssl_decrypt(void *cv, | |
c->aad, c->aad_size); | ||
c->aad_size = 0; | ||
#else | ||
err = wc_AesGcmDecryptUpdate(c->ctx, dst, src, (src_len - c->tag_len), NULL, | ||
0); | ||
err = wc_AesGcmDecryptUpdate(c->ctx, dst, src, | ||
(word32)(src_len - c->tag_len), NULL, 0); | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
return srtp_err_status_algo_fail; | ||
} | ||
err = | ||
wc_AesGcmDecryptFinal(c->ctx, src + (src_len - c->tag_len), c->tag_len); | ||
err = wc_AesGcmDecryptFinal(c->ctx, src + (src_len - c->tag_len), | ||
(word32)c->tag_len); | ||
#endif | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_gcm, "wolfSSL error code: %d", err); | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -54,6 +54,8 @@ | |
#include "cipher_types.h" | ||
#include "cipher_test_cases.h" | ||
|
||
#include <limits.h> | ||
|
||
srtp_debug_module_t srtp_mod_aes_icm = { | ||
false, /* debugging is off by default */ | ||
"aes icm nss" /* printable module name */ | ||
|
@@ -256,7 +258,7 @@ static srtp_err_status_t srtp_aes_icm_nss_context_init(void *cv, | |
|
||
/* explicitly cast away const of key */ | ||
SECItem keyItem = { siBuffer, (unsigned char *)(uintptr_t)key, | ||
c->key_size }; | ||
(unsigned int)c->key_size }; | ||
c->key = PK11_ImportSymKey(slot, CKM_AES_CTR, PK11_OriginUnwrap, | ||
CKA_ENCRYPT, &keyItem, NULL); | ||
PK11_FreeSlot(slot); | ||
|
@@ -342,8 +344,13 @@ static srtp_err_status_t srtp_aes_icm_nss_encrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (src_len > UINT_MAX || *dst_len > UINT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This should be moved up a few lines before the comparison is first made. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
int out_len = 0; | ||
int rv = PK11_CipherOp(c->ctx, dst, &out_len, *dst_len, src, src_len); | ||
int rv = PK11_CipherOp(c->ctx, dst, &out_len, (unsigned int)*dst_len, src, | ||
(unsigned int)src_len); | ||
*dst_len = out_len; | ||
srtp_err_status_t status = srtp_err_status_ok; | ||
if (rv != SECSuccess) { | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -316,7 +316,11 @@ static srtp_err_status_t srtp_aes_icm_openssl_encrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
if (!EVP_EncryptUpdate(c->ctx, dst, &len, src, src_len)) { | ||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This should be moved up a few lines before src_len is used in a comparison. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
if (!EVP_EncryptUpdate(c->ctx, dst, &len, src, (int)src_len)) { | ||
return srtp_err_status_cipher_fail; | ||
} | ||
*dst_len = len; | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -56,6 +56,7 @@ | |
#include "alloc.h" | ||
#include "cipher_types.h" | ||
#include "cipher_test_cases.h" | ||
#include <limits.h> | ||
|
||
srtp_debug_module_t srtp_mod_aes_icm = { | ||
0, /* debugging is off by default */ | ||
|
@@ -326,7 +327,11 @@ static srtp_err_status_t srtp_aes_icm_wolfssl_encrypt(void *cv, | |
return srtp_err_status_buffer_small; | ||
} | ||
|
||
err = wc_AesCtrEncrypt(c->ctx, dst, src, src_len); | ||
if (src_len > INT_MAX) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This should be moved a few lines up before src_len is used in a comparison. |
||
return srtp_err_status_bad_param; | ||
} | ||
|
||
err = wc_AesCtrEncrypt(c->ctx, dst, src, (word32)src_len); | ||
if (err < 0) { | ||
debug_print(srtp_mod_aes_icm, "wolfSSL encrypt error: %d", err); | ||
return srtp_err_status_cipher_fail; | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Might want to move this check up a few lines since it's printed above before it's checked here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The check is only mean to protect from the casting, using it in the print statement as a szie_t should be no problem or ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I just think that if the parameter is considered bad, we ought to return that error before using it. If
aad_len
is bad, then I would guessaad
is also bad. The printed result might be wrong. I'm just overly cautious.