-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crash in ChaCha20Poly1305.encrypt #86
Comments
Output of the above test:
|
Ah yes, this was caused by the buffer not having the right capacity. On entering that method, 2 bytes already had been written; so whenever the requested capacity would be BUCKET_SIZE or BUCKET_SIZE-1, it would result in an buffer overflow. This should be fixed in master in 0cda018. |
Excellent, fix works perfectly. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
There is a crashing bug in the packet encryption code, if the buffer length is 495 or 496 bytes long.
The crash can be demonstrated by adding the following test case to CryptographerTests
The last two tests cause a precondition failure in
ByteBuffer.moveWriterIndex
The text was updated successfully, but these errors were encountered: