Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions ascon-aead/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,12 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## 0.4.3 (2025-03-03)
### Fixed
- Zeroize buffer during decryption on failed tag check ([#659])

[#659]: https://github.com/RustCrypto/AEADs/pull/659

## 0.4.2 (2023-03-21)
### Changed
- Drop MSRV back to 1.56 and keep it in sync with `ascon` ([#514])
Expand Down
1 change: 1 addition & 0 deletions ascon-aead/src/asconcore.rs
Original file line number Diff line number Diff line change
Expand Up @@ -360,6 +360,7 @@ impl<'a, P: Parameters> AsconCore<'a, P> {
if bool::from(tag.ct_eq(expected_tag)) {
Ok(())
} else {
ciphertext.fill(0);
Err(Error)
}
}
Expand Down
13 changes: 10 additions & 3 deletions ascon-aead/tests/kats_test.rs
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
// SPDX-License-Identifier: Apache-2.0 OR MIT

use ascon_aead::{
aead::{Aead, AeadInPlace, KeyInit, Payload},
aead::{Aead, AeadInPlace, KeyInit, Payload, Tag},
Ascon128, Ascon128a, Ascon80pq,
};
use hex_literal::hex;
Expand All @@ -15,9 +15,10 @@ fn run_tv<A: KeyInit + AeadInPlace>(
ciphertext: &[u8],
) {
let core = A::new(key.try_into().unwrap());
let nonce = nonce.try_into().unwrap();
let ctxt = core
.encrypt(
nonce.try_into().unwrap(),
nonce,
Payload {
msg: plaintext,
aad: associated_data,
Expand All @@ -28,14 +29,20 @@ fn run_tv<A: KeyInit + AeadInPlace>(

let ptxt = core
.decrypt(
nonce.try_into().unwrap(),
nonce,
Payload {
msg: ciphertext,
aad: associated_data,
},
)
.expect("Successful decryption");
assert_eq!(ptxt, plaintext);

let bad_tag = Tag::<A>::default();
let mut buf = ciphertext[..ciphertext.len() - bad_tag.len()].to_vec();
let res = core.decrypt_in_place_detached(nonce, associated_data, &mut buf, &bad_tag);
assert!(res.is_err());
assert!(buf.iter().all(|b| *b == 0));
}

#[test]
Expand Down