# HG changeset patch # User Vladislav Grishenko # Date 1590758782 -18000 # Node ID 5b701bf529aa52aee5369b2515817640d71bc3bd # Parent d384bc2e5af34c0de1f53980b3220c2d8568488d Fix ChaCha20 on 32-bit platforms (#99) * Fix ChaCha20 on 32-bit platforms On 32-bit platforms with old compiler STORE64H() parameter is not auto-expanded to 64-bit value, causing wrong IV data. Spotted on BCM4706 MIPS32r2 with GCC 4.2.4: Exit before auth: Integrity error (bad packet size 2065808956) * Fix Chacha20-Poly1305 and AES-GCM debug messages Functions were renamed earlier and trace messages - not. diff -r d384bc2e5af3 -r 5b701bf529aa chachapoly.c --- a/chachapoly.c Thu May 28 23:26:34 2020 +0800 +++ b/chachapoly.c Fri May 29 18:26:22 2020 +0500 @@ -82,7 +82,7 @@ return CRYPT_ERROR; } - STORE64H(seq, seqbuf); + STORE64H((uint64_t)seq, seqbuf); chacha_ivctr64(&state->chacha, seqbuf, sizeof(seqbuf), 0); if ((err = chacha_keystream(&state->chacha, key, sizeof(key))) != CRYPT_OK) { return err; @@ -122,13 +122,13 @@ unsigned char seqbuf[8], buf[4]; int err; - TRACE2(("enter dropbear_chachapoly_parse")) + TRACE2(("enter dropbear_chachapoly_getlength")) if (len < sizeof(buf)) { return CRYPT_ERROR; } - STORE64H(seq, seqbuf); + STORE64H((uint64_t)seq, seqbuf); chacha_ivctr64(&state->header, seqbuf, sizeof(seqbuf), 0); if ((err = chacha_crypt(&state->header, in, sizeof(buf), buf)) != CRYPT_OK) { return err; @@ -136,7 +136,7 @@ LOAD32H(*outlen, buf); - TRACE2(("leave dropbear_chachapoly_parse")) + TRACE2(("leave dropbear_chachapoly_getlength")) return CRYPT_OK; } diff -r d384bc2e5af3 -r 5b701bf529aa gcm.c --- a/gcm.c Thu May 28 23:26:34 2020 +0800 +++ b/gcm.c Fri May 29 18:26:22 2020 +0500 @@ -100,7 +100,7 @@ static int dropbear_gcm_getlength(unsigned int UNUSED(seq), const unsigned char *in, unsigned int *outlen, unsigned long len, dropbear_gcm_state* UNUSED(state)) { - TRACE2(("enter dropbear_gcm_parse")) + TRACE2(("enter dropbear_gcm_getlength")) if (len < 4) { return CRYPT_ERROR; @@ -108,7 +108,7 @@ LOAD32H(*outlen, in); - TRACE2(("leave dropbear_gcm_parse")) + TRACE2(("leave dropbear_gcm_getlength")) return CRYPT_OK; }