diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2013-11-07 16:20:34 -0800 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2013-11-07 16:20:34 -0800 |
commit | 64e09322e3cbda39d673f985f495178209ff12f5 (patch) | |
tree | 80b14fa2b9143cb8e5be290ab762a609cf388bb5 | |
parent | 635b542ded9ede772a2ca907e8bb5349ded333bd (diff) | |
download | cryptography-64e09322e3cbda39d673f985f495178209ff12f5.tar.gz cryptography-64e09322e3cbda39d673f985f495178209ff12f5.tar.bz2 cryptography-64e09322e3cbda39d673f985f495178209ff12f5.zip |
Fixed a bug in padding, and also made it more constant time
-rw-r--r-- | cryptography/hazmat/primitives/padding.py | 34 | ||||
-rw-r--r-- | tests/hazmat/primitives/test_padding.py | 1 |
2 files changed, 32 insertions, 3 deletions
diff --git a/cryptography/hazmat/primitives/padding.py b/cryptography/hazmat/primitives/padding.py index ddcadd89..de889685 100644 --- a/cryptography/hazmat/primitives/padding.py +++ b/cryptography/hazmat/primitives/padding.py @@ -11,11 +11,34 @@ # See the License for the specific language governing permissions and # limitations under the License. +import cffi + import six from cryptography.hazmat.primitives import interfaces +_ffi = cffi.FFI() +_ffi.cdef(""" +unsigned int Cryptography_constant_time_lt(unsigned int, unsigned int); +""") +_lib = _ffi.verify(""" +/* Returns the value of the input with the most-significant-bit copied to all + of the bits. This relies on implementation details of computers with 2's + complement representations of integers, which is not required by the C + standard. */ +static unsigned int Cryptography_DUPLICATE_MSB_TO_ALL(unsigned int a) { + return (unsigned int)((int)(a) >> (sizeof(int) * 8 - 1)); +} + +/* This returns 0xFF if a < b else 0x00, but does so in a constant time + fashion */ +unsigned int Cryptography_constant_time_lt(unsigned int a, unsigned int b) { + a -= b; + return Cryptography_DUPLICATE_MSB_TO_ALL(a); +} +""") + class PKCS7(object): def __init__(self, block_size): super(PKCS7, self).__init__() @@ -104,14 +127,19 @@ class _PKCS7UnpaddingContext(object): if not self._buffer: raise ValueError("Invalid padding bytes") - pad_size = six.indexbytes(self._buffer, -1) + if len(self._buffer) != self.block_size // 8: + raise ValueError("Invalid padding bytes") + pad_size = six.indexbytes(self._buffer, -1) if pad_size > self.block_size // 8: raise ValueError("Invalid padding bytes") + mismatch = 0 - for b in six.iterbytes(self._buffer[-pad_size:]): - mismatch |= b ^ pad_size + for i in xrange(self.block_size // 8): + mask = _lib.Cryptography_constant_time_lt(i, pad_size) + b = six.indexbytes(self._buffer, self.block_size // 8 - 1 - i) + mismatch |= (mask & (pad_size ^ b)) if mismatch != 0: raise ValueError("Invalid padding bytes") diff --git a/tests/hazmat/primitives/test_padding.py b/tests/hazmat/primitives/test_padding.py index 3cefafaf..91d58439 100644 --- a/tests/hazmat/primitives/test_padding.py +++ b/tests/hazmat/primitives/test_padding.py @@ -29,6 +29,7 @@ class TestPKCS7(object): (128, b"1111111111111111"), (128, b"111111111111111\x06"), (128, b""), + (128, b"\x06" * 6), ]) def test_invalid_padding(self, size, padded): unpadder = padding.PKCS7(size).unpadder() |