crypto: fix built-in AES decrypt function
The qcrypto_cipher_decrypt_aes method was using the wrong key material, and passing the wrong mode. This caused it to incorrectly decrypt ciphertext. Signed-off-by: Daniel P. Berrange <berrange@redhat.com> Message-Id: <1437740634-6261-1-git-send-email-berrange@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
f793d97e45
commit
6775e2c429
@ -117,7 +117,7 @@ static int qcrypto_cipher_decrypt_aes(QCryptoCipher *cipher,
|
|||||||
uint8_t *outptr = out;
|
uint8_t *outptr = out;
|
||||||
while (len) {
|
while (len) {
|
||||||
if (len > AES_BLOCK_SIZE) {
|
if (len > AES_BLOCK_SIZE) {
|
||||||
AES_decrypt(inptr, outptr, &ctxt->state.aes.encrypt_key);
|
AES_decrypt(inptr, outptr, &ctxt->state.aes.decrypt_key);
|
||||||
inptr += AES_BLOCK_SIZE;
|
inptr += AES_BLOCK_SIZE;
|
||||||
outptr += AES_BLOCK_SIZE;
|
outptr += AES_BLOCK_SIZE;
|
||||||
len -= AES_BLOCK_SIZE;
|
len -= AES_BLOCK_SIZE;
|
||||||
@ -126,15 +126,15 @@ static int qcrypto_cipher_decrypt_aes(QCryptoCipher *cipher,
|
|||||||
memcpy(tmp1, inptr, len);
|
memcpy(tmp1, inptr, len);
|
||||||
/* Fill with 0 to avoid valgrind uninitialized reads */
|
/* Fill with 0 to avoid valgrind uninitialized reads */
|
||||||
memset(tmp1 + len, 0, sizeof(tmp1) - len);
|
memset(tmp1 + len, 0, sizeof(tmp1) - len);
|
||||||
AES_decrypt(tmp1, tmp2, &ctxt->state.aes.encrypt_key);
|
AES_decrypt(tmp1, tmp2, &ctxt->state.aes.decrypt_key);
|
||||||
memcpy(outptr, tmp2, len);
|
memcpy(outptr, tmp2, len);
|
||||||
len = 0;
|
len = 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
AES_cbc_encrypt(in, out, len,
|
AES_cbc_encrypt(in, out, len,
|
||||||
&ctxt->state.aes.encrypt_key,
|
&ctxt->state.aes.decrypt_key,
|
||||||
ctxt->state.aes.iv, 1);
|
ctxt->state.aes.iv, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
Loading…
Reference in New Issue
Block a user