diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-10 17:57:41 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-10 17:57:41 +0300 |
commit | 84c7f952f01b53ee4be00899cf4e60d62f6bd5e7 (patch) | |
tree | 7c915e8e5d39a30b7de9b313031e09af5e7a943d /test/aes192ofb_encrypt_block.c | |
parent | utils: bugfix (diff) | |
download | aes-tools-84c7f952f01b53ee4be00899cf4e60d62f6bd5e7.tar.gz aes-tools-84c7f952f01b53ee4be00899cf4e60d62f6bd5e7.zip |
bugfix
Buffer decryption routine used to look at the last byte of the plaintext
to determine the padding size.
If used with a wrong key, the last byte could be, say, 0xff, which is
definitely not the right padding size.
Now it checks for proper padding at the end of the plaintext and drops
the last block if no valid padding was found.
Diffstat (limited to 'test/aes192ofb_encrypt_block.c')
0 files changed, 0 insertions, 0 deletions