Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
745df591
Commit
745df591
authored
Aug 31, 2022
by
Hans Leidekker
Committed by
Alexandre Julliard
Aug 31, 2022
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
bcrypt: Force symmetric key reset if necessary.
Wine-Bug:
https://bugs.winehq.org/show_bug.cgi?id=52457
parent
8e127868
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
8 additions
and
17 deletions
+8
-17
bcrypt_main.c
dlls/bcrypt/bcrypt_main.c
+8
-17
No files found.
dlls/bcrypt/bcrypt_main.c
View file @
745df591
...
...
@@ -1000,14 +1000,6 @@ static BOOL key_is_symmetric( struct key *key )
return
builtin_algorithms
[
key
->
alg_id
].
class
==
BCRYPT_CIPHER_INTERFACE
;
}
static
BOOL
is_zero_vector
(
const
UCHAR
*
vector
,
ULONG
len
)
{
ULONG
i
;
if
(
!
vector
)
return
FALSE
;
for
(
i
=
0
;
i
<
len
;
i
++
)
if
(
vector
[
i
])
return
FALSE
;
return
TRUE
;
}
static
BOOL
is_equal_vector
(
const
UCHAR
*
vector
,
ULONG
len
,
const
UCHAR
*
vector2
,
ULONG
len2
)
{
if
(
!
vector
&&
!
vector2
)
return
TRUE
;
...
...
@@ -1015,10 +1007,9 @@ static BOOL is_equal_vector( const UCHAR *vector, ULONG len, const UCHAR *vector
return
!
memcmp
(
vector
,
vector2
,
len
);
}
static
NTSTATUS
key_symmetric_set_vector
(
struct
key
*
key
,
UCHAR
*
vector
,
ULONG
vector_len
)
static
NTSTATUS
key_symmetric_set_vector
(
struct
key
*
key
,
UCHAR
*
vector
,
ULONG
vector_len
,
BOOL
force_reset
)
{
BOOL
needs_reset
=
(
!
is_zero_vector
(
vector
,
vector_len
)
||
!
is_equal_vector
(
key
->
u
.
s
.
vector
,
key
->
u
.
s
.
vector_len
,
vector
,
vector_len
));
BOOL
needs_reset
=
force_reset
||
!
is_equal_vector
(
key
->
u
.
s
.
vector
,
key
->
u
.
s
.
vector_len
,
vector
,
vector_len
);
free
(
key
->
u
.
s
.
vector
);
key
->
u
.
s
.
vector
=
NULL
;
...
...
@@ -1155,7 +1146,7 @@ static NTSTATUS key_symmetric_encrypt( struct key *key, UCHAR *input, ULONG inp
if
(
auth_info
->
dwFlags
&
BCRYPT_AUTH_MODE_CHAIN_CALLS_FLAG
)
FIXME
(
"call chaining not implemented
\n
"
);
if
((
status
=
key_symmetric_set_vector
(
key
,
auth_info
->
pbNonce
,
auth_info
->
cbNonce
)))
if
((
status
=
key_symmetric_set_vector
(
key
,
auth_info
->
pbNonce
,
auth_info
->
cbNonce
,
TRUE
)))
return
status
;
*
ret_len
=
input_len
;
...
...
@@ -1191,7 +1182,7 @@ static NTSTATUS key_symmetric_encrypt( struct key *key, UCHAR *input, ULONG inp
if
(
!
output
)
return
STATUS_SUCCESS
;
if
(
output_len
<
*
ret_len
)
return
STATUS_BUFFER_TOO_SMALL
;
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
iv
)
return
STATUS_INVALID_PARAMETER
;
if
((
status
=
key_symmetric_set_vector
(
key
,
iv
,
iv_len
)))
return
status
;
if
((
status
=
key_symmetric_set_vector
(
key
,
iv
,
iv_len
,
flags
&
BCRYPT_BLOCK_PADDING
)))
return
status
;
encrypt_params
.
key
=
key
;
encrypt_params
.
input
=
input
;
...
...
@@ -1202,7 +1193,7 @@ static NTSTATUS key_symmetric_encrypt( struct key *key, UCHAR *input, ULONG inp
{
if
((
status
=
UNIX_CALL
(
key_symmetric_encrypt
,
&
encrypt_params
)))
return
status
;
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
(
status
=
key_symmetric_set_vector
(
key
,
NULL
,
0
)))
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
(
status
=
key_symmetric_set_vector
(
key
,
NULL
,
0
,
TRUE
)))
return
status
;
bytes_left
-=
key
->
u
.
s
.
block_size
;
encrypt_params
.
input
+=
key
->
u
.
s
.
block_size
;
...
...
@@ -1241,7 +1232,7 @@ static NTSTATUS key_symmetric_decrypt( struct key *key, UCHAR *input, ULONG inpu
if
(
!
auth_info
->
pbTag
)
return
STATUS_INVALID_PARAMETER
;
if
(
auth_info
->
cbTag
<
12
||
auth_info
->
cbTag
>
16
)
return
STATUS_INVALID_PARAMETER
;
if
((
status
=
key_symmetric_set_vector
(
key
,
auth_info
->
pbNonce
,
auth_info
->
cbNonce
)))
if
((
status
=
key_symmetric_set_vector
(
key
,
auth_info
->
pbNonce
,
auth_info
->
cbNonce
,
TRUE
)))
return
status
;
*
ret_len
=
input_len
;
...
...
@@ -1283,7 +1274,7 @@ static NTSTATUS key_symmetric_decrypt( struct key *key, UCHAR *input, ULONG inpu
else
if
(
output_len
<
*
ret_len
)
return
STATUS_BUFFER_TOO_SMALL
;
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
iv
)
return
STATUS_INVALID_PARAMETER
;
if
((
status
=
key_symmetric_set_vector
(
key
,
iv
,
iv_len
)))
return
status
;
if
((
status
=
key_symmetric_set_vector
(
key
,
iv
,
iv_len
,
flags
&
BCRYPT_BLOCK_PADDING
)))
return
status
;
decrypt_params
.
key
=
key
;
decrypt_params
.
input
=
input
;
...
...
@@ -1293,7 +1284,7 @@ static NTSTATUS key_symmetric_decrypt( struct key *key, UCHAR *input, ULONG inpu
while
(
bytes_left
>=
key
->
u
.
s
.
block_size
)
{
if
((
status
=
UNIX_CALL
(
key_symmetric_decrypt
,
&
decrypt_params
)))
return
status
;
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
(
status
=
key_symmetric_set_vector
(
key
,
NULL
,
0
)))
if
(
key
->
u
.
s
.
mode
==
MODE_ID_ECB
&&
(
status
=
key_symmetric_set_vector
(
key
,
NULL
,
0
,
TRUE
)))
return
status
;
bytes_left
-=
key
->
u
.
s
.
block_size
;
decrypt_params
.
input
+=
key
->
u
.
s
.
block_size
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment