Skip to content

Commit

Permalink
Update the NSS bug number for the invalid read when AES-CBC decrypting.
Browse files Browse the repository at this point in the history
R=eroman@chromium.org
BUG=300681
TEST=none

Review URL: https://codereview.chromium.org/25637004

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@226530 0039d316-1c4b-4281-b951-d872f2087c98
  • Loading branch information
wtc@chromium.org committed Oct 2, 2013
1 parent 951e7c4 commit b06bf4f
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion crypto/encryptor_nss.cc
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ bool Encryptor::Decrypt(const base::StringPiece& ciphertext,
if (ciphertext.size() % AES_BLOCK_SIZE != 0) {
// Decryption will fail if the input is not a multiple of the block size.
// PK11_CipherOp has a bug where it will do an invalid memory access before
// the start of the input, so avoid calling it. (Possibly NSS bug 921687).
// the start of the input, so avoid calling it. (NSS bug 922780).
plaintext->clear();
return false;
}
Expand Down

0 comments on commit b06bf4f

Please sign in to comment.