Skip to content

Conversation

@radik878
Copy link

Previously OCB3 decryption accepted plaintext and associated data of exactly max_len bytes, which could lead to out-of-bounds access in the precomputed L table and a panic instead of a clean error for boundary-size inputs.
Tightened the max_len checks in decrypt_inout_return_tag to match encryption, rejecting inputs with length >= max_len for both plaintext and associated data so that large inputs consistently return an error instead of panicking.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant