aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2013-11-07 16:20:34 -0800
committerAlex Gaynor <alex.gaynor@gmail.com>2013-11-07 16:20:34 -0800
commit64e09322e3cbda39d673f985f495178209ff12f5 (patch)
tree80b14fa2b9143cb8e5be290ab762a609cf388bb5
parent635b542ded9ede772a2ca907e8bb5349ded333bd (diff)
downloadcryptography-64e09322e3cbda39d673f985f495178209ff12f5.tar.gz
cryptography-64e09322e3cbda39d673f985f495178209ff12f5.tar.bz2
cryptography-64e09322e3cbda39d673f985f495178209ff12f5.zip
Fixed a bug in padding, and also made it more constant time
-rw-r--r--cryptography/hazmat/primitives/padding.py34
-rw-r--r--tests/hazmat/primitives/test_padding.py1
2 files changed, 32 insertions, 3 deletions
diff --git a/cryptography/hazmat/primitives/padding.py b/cryptography/hazmat/primitives/padding.py
index ddcadd89..de889685 100644
--- a/cryptography/hazmat/primitives/padding.py
+++ b/cryptography/hazmat/primitives/padding.py
@@ -11,11 +11,34 @@
# See the License for the specific language governing permissions and
# limitations under the License.
+import cffi
+
import six
from cryptography.hazmat.primitives import interfaces
+_ffi = cffi.FFI()
+_ffi.cdef("""
+unsigned int Cryptography_constant_time_lt(unsigned int, unsigned int);
+""")
+_lib = _ffi.verify("""
+/* Returns the value of the input with the most-significant-bit copied to all
+ of the bits. This relies on implementation details of computers with 2's
+ complement representations of integers, which is not required by the C
+ standard. */
+static unsigned int Cryptography_DUPLICATE_MSB_TO_ALL(unsigned int a) {
+ return (unsigned int)((int)(a) >> (sizeof(int) * 8 - 1));
+}
+
+/* This returns 0xFF if a < b else 0x00, but does so in a constant time
+ fashion */
+unsigned int Cryptography_constant_time_lt(unsigned int a, unsigned int b) {
+ a -= b;
+ return Cryptography_DUPLICATE_MSB_TO_ALL(a);
+}
+""")
+
class PKCS7(object):
def __init__(self, block_size):
super(PKCS7, self).__init__()
@@ -104,14 +127,19 @@ class _PKCS7UnpaddingContext(object):
if not self._buffer:
raise ValueError("Invalid padding bytes")
- pad_size = six.indexbytes(self._buffer, -1)
+ if len(self._buffer) != self.block_size // 8:
+ raise ValueError("Invalid padding bytes")
+ pad_size = six.indexbytes(self._buffer, -1)
if pad_size > self.block_size // 8:
raise ValueError("Invalid padding bytes")
+
mismatch = 0
- for b in six.iterbytes(self._buffer[-pad_size:]):
- mismatch |= b ^ pad_size
+ for i in xrange(self.block_size // 8):
+ mask = _lib.Cryptography_constant_time_lt(i, pad_size)
+ b = six.indexbytes(self._buffer, self.block_size // 8 - 1 - i)
+ mismatch |= (mask & (pad_size ^ b))
if mismatch != 0:
raise ValueError("Invalid padding bytes")
diff --git a/tests/hazmat/primitives/test_padding.py b/tests/hazmat/primitives/test_padding.py
index 3cefafaf..91d58439 100644
--- a/tests/hazmat/primitives/test_padding.py
+++ b/tests/hazmat/primitives/test_padding.py
@@ -29,6 +29,7 @@ class TestPKCS7(object):
(128, b"1111111111111111"),
(128, b"111111111111111\x06"),
(128, b""),
+ (128, b"\x06" * 6),
])
def test_invalid_padding(self, size, padded):
unpadder = padding.PKCS7(size).unpadder()