mirror of
https://github.com/yuzu-emu/mbedtls
synced 2024-11-25 09:19:20 +00:00
Test suite test_suite_pk test pk_rsa_overflow passes valid parameters for hash and sig.
Test suite test_suite_pk test pk_rsa_overflow passes valid parameters for hash and sig.
This commit is contained in:
parent
b7f6086ba3
commit
693a1d9ca7
2 changed files with 11 additions and 5 deletions
|
@ -34,6 +34,8 @@ Bugfix
|
||||||
with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
|
with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
|
||||||
In the context of SSL, this resulted in handshake failure. #1351
|
In the context of SSL, this resulted in handshake failure. #1351
|
||||||
* Fix Windows x64 builds with the included mbedTLS.sln file. #1347
|
* Fix Windows x64 builds with the included mbedTLS.sln file. #1347
|
||||||
|
* In test_suite_pk pass valid parameters when testing for hash length
|
||||||
|
overflow. #1179
|
||||||
|
|
||||||
Changes
|
Changes
|
||||||
* Fix tag lengths and value ranges in the documentation of CCM encryption.
|
* Fix tag lengths and value ranges in the documentation of CCM encryption.
|
||||||
|
|
|
@ -417,11 +417,15 @@ exit:
|
||||||
void pk_rsa_overflow( )
|
void pk_rsa_overflow( )
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t hash_len = SIZE_MAX;
|
size_t hash_len = SIZE_MAX, sig_len = SIZE_MAX;
|
||||||
|
unsigned char hash[50], sig[100];
|
||||||
|
|
||||||
if( SIZE_MAX <= UINT_MAX )
|
if( SIZE_MAX <= UINT_MAX )
|
||||||
return;
|
return;
|
||||||
|
|
||||||
|
memset( hash, 0x2a, sizeof hash );
|
||||||
|
memset( sig, 0, sizeof sig );
|
||||||
|
|
||||||
mbedtls_pk_init( &pk );
|
mbedtls_pk_init( &pk );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_pk_setup( &pk,
|
TEST_ASSERT( mbedtls_pk_setup( &pk,
|
||||||
|
@ -429,14 +433,14 @@ void pk_rsa_overflow( )
|
||||||
|
|
||||||
#if defined(MBEDTLS_PKCS1_V21)
|
#if defined(MBEDTLS_PKCS1_V21)
|
||||||
TEST_ASSERT( mbedtls_pk_verify_ext( MBEDTLS_PK_RSASSA_PSS, NULL, &pk,
|
TEST_ASSERT( mbedtls_pk_verify_ext( MBEDTLS_PK_RSASSA_PSS, NULL, &pk,
|
||||||
MBEDTLS_MD_NONE, NULL, hash_len, NULL, 0 ) ==
|
MBEDTLS_MD_NONE, hash, hash_len, sig, sig_len ) ==
|
||||||
MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
||||||
#endif /* MBEDTLS_PKCS1_V21 */
|
#endif /* MBEDTLS_PKCS1_V21 */
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_pk_verify( &pk, MBEDTLS_MD_NONE, NULL, hash_len,
|
TEST_ASSERT( mbedtls_pk_verify( &pk, MBEDTLS_MD_NONE, hash, hash_len,
|
||||||
NULL, 0 ) == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
sig, sig_len ) == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_pk_sign( &pk, MBEDTLS_MD_NONE, NULL, hash_len, NULL, 0,
|
TEST_ASSERT( mbedtls_pk_sign( &pk, MBEDTLS_MD_NONE, hash, hash_len, sig, &sig_len,
|
||||||
rnd_std_rand, NULL ) == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
rnd_std_rand, NULL ) == MBEDTLS_ERR_PK_BAD_INPUT_DATA );
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
|
Loading…
Reference in a new issue