Skip to content

Commit

Permalink
Use BUFFER_E instead of ASN_PARSE_E when buffer is too small
Browse files Browse the repository at this point in the history
  • Loading branch information
embhorn committed Jan 20, 2025
1 parent 462aa5b commit 9c4ef7c
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
4 changes: 2 additions & 2 deletions tests/api.c
Original file line number Diff line number Diff line change
Expand Up @@ -26522,9 +26522,9 @@ static int test_wc_ecc_rs_to_sig(void)
WC_NO_ERR_TRACE(ECC_BAD_ARG_E));
#if !defined(HAVE_SELFTEST) && !defined(HAVE_FIPS)
ExpectIntEQ(wc_ecc_sig_to_rs(sig, siglen, r, &zeroLen, s, &slen),
WC_NO_ERR_TRACE(ASN_PARSE_E));
WC_NO_ERR_TRACE(BUFFER_E));
ExpectIntEQ(wc_ecc_sig_to_rs(sig, siglen, r, &rlen, s, &zeroLen),
WC_NO_ERR_TRACE(ASN_PARSE_E));
WC_NO_ERR_TRACE(BUFFER_E));
#endif
#endif
return EXPECT_RESULT();
Expand Down
8 changes: 4 additions & 4 deletions wolfcrypt/src/asn.c
Original file line number Diff line number Diff line change
Expand Up @@ -1300,7 +1300,7 @@ static int GetASN_StoreData(const ASNItem* asn, ASNGetData* data,
WOLFSSL_MSG_VSNPRINTF("Buffer too small for data: %d %d", len,
*data->data.buffer.length);
#endif
return ASN_PARSE_E;
return BUFFER_E;
}
/* Copy in data and record actual length seen. */
XMEMCPY(data->data.buffer.data, input + idx, (size_t)len);
Expand Down Expand Up @@ -33784,7 +33784,7 @@ int DecodeECC_DSA_Sig_Bin(const byte* sig, word32 sigLen, byte* r, word32* rLen,
*rLen = (word32)len;
else {
/* Buffer too small to hold r value */
return ASN_PARSE_E;
return BUFFER_E;
}
}
if (r)
Expand All @@ -33798,8 +33798,8 @@ int DecodeECC_DSA_Sig_Bin(const byte* sig, word32 sigLen, byte* r, word32* rLen,
if (*sLen >= (word32)len)
*sLen = (word32)len;
else {
/* Buffer too small to hold r value */
return ASN_PARSE_E;
/* Buffer too small to hold s value */
return BUFFER_E;
}
}
if (s)
Expand Down

0 comments on commit 9c4ef7c

Please sign in to comment.