mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 18:57:27 +02:00
update armv8 aes gcm sanity checks
This commit is contained in:
@ -2534,8 +2534,7 @@ int wc_AesGcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
|||||||
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
||||||
(authTag == NULL) ||
|
(authTag == NULL) ||
|
||||||
(authIn == NULL && authInSz > 0) ||
|
(authIn == NULL && authInSz > 0) ||
|
||||||
(in == NULL && sz > 0) ||
|
(ivSz == 0)) {
|
||||||
(out == NULL && sz > 0)) {
|
|
||||||
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
@ -2599,11 +2598,9 @@ int wc_AesGcmDecrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
|||||||
ctr = counter ;
|
ctr = counter ;
|
||||||
|
|
||||||
/* sanity checks */
|
/* sanity checks */
|
||||||
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
if (aes == NULL || iv == NULL || (sz != 0 && (in == NULL || out == NULL)) ||
|
||||||
(authTag == NULL) ||
|
authTag == NULL || authTagSz > AES_BLOCK_SIZE || authTagSz == 0 ||
|
||||||
(authIn == NULL && authInSz > 0) ||
|
ivSz == 0) {
|
||||||
(in == NULL && sz > 0) ||
|
|
||||||
(out == NULL && sz > 0)) {
|
|
||||||
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
@ -4199,8 +4196,7 @@ int wc_AesGcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
|||||||
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
||||||
(authTag == NULL) ||
|
(authTag == NULL) ||
|
||||||
(authIn == NULL && authInSz > 0) ||
|
(authIn == NULL && authInSz > 0) ||
|
||||||
(in == NULL && sz > 0) ||
|
(ivSz == 0)) {
|
||||||
(out == NULL && sz > 0)) {
|
|
||||||
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
@ -4280,11 +4276,9 @@ int wc_AesGcmDecrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
|||||||
ctr = counter ;
|
ctr = counter ;
|
||||||
|
|
||||||
/* sanity checks */
|
/* sanity checks */
|
||||||
if (aes == NULL || (iv == NULL && ivSz > 0) ||
|
if (aes == NULL || iv == NULL || (sz != 0 && (in == NULL || out == NULL)) ||
|
||||||
(authTag == NULL) ||
|
authTag == NULL || authTagSz > AES_BLOCK_SIZE || authTagSz == 0 ||
|
||||||
(authIn == NULL && authInSz > 0) ||
|
ivSz == 0) {
|
||||||
(in == NULL && sz > 0) ||
|
|
||||||
(out == NULL && sz > 0)) {
|
|
||||||
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
WOLFSSL_MSG("a NULL parameter passed in when size is larger than 0");
|
||||||
return BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user