s = cryptobox_align_ptr (enc_ctx, CRYPTOBOX_ALIGNMENT);
memset (s, 0, sizeof (*s));
g_assert (EVP_EncryptInit_ex (s, EVP_aes_256_gcm (), NULL, NULL, NULL) == 1);
- g_assert (EVP_CIPHER_CTX_ctrl (s, EVP_CTRL_GCM_SET_IVLEN, 24, NULL) == 1);
+ g_assert (EVP_CIPHER_CTX_ctrl (s, EVP_CTRL_GCM_SET_IVLEN,
+ rspamd_cryptobox_nonce_bytes (), NULL) == 1);
g_assert (EVP_EncryptInit_ex (s, NULL, NULL, nm, nonce) == 1);
return s;
s = cryptobox_align_ptr (enc_ctx, CRYPTOBOX_ALIGNMENT);
memset (s, 0, sizeof (*s));
g_assert (EVP_DecryptInit_ex(s, EVP_aes_256_gcm (), NULL, NULL, NULL) == 1);
- g_assert (EVP_CIPHER_CTX_ctrl (s, EVP_CTRL_GCM_SET_IVLEN, 24, NULL) == 1);
+ g_assert (EVP_CIPHER_CTX_ctrl (s, EVP_CTRL_GCM_SET_IVLEN,
+ rspamd_cryptobox_nonce_bytes (), NULL) == 1);
g_assert (EVP_DecryptInit_ex (s, NULL, NULL, nm, nonce) == 1);
return s;
eq_pos - 1, &key_len);
if (decoded_id != NULL && decoded_key != NULL) {
if (id_len >= RSPAMD_HTTP_KEY_ID_LEN &&
- key_len >= sizeof (kp->pk)) {
+ key_len >= rspamd_cryptobox_pk_bytes ()) {
if (memcmp (priv->local_key->id, decoded_id,
RSPAMD_HTTP_KEY_ID_LEN) == 0) {
kp = g_slice_alloc0 (sizeof (*kp));
REF_INIT_RETAIN (kp, rspamd_http_keypair_dtor);
- memcpy (kp->pk, decoded_key, sizeof (kp->pk));
+ memcpy (kp->pk, decoded_key, rspamd_cryptobox_pk_bytes ());
priv->msg->peer_key = kp;
if (conn->cache && priv->msg->peer_key) {
dec_len) != (size_t)dec_len) {
msg_err ("HTTP parser error: %s when parsing encrypted request",
http_errno_description (decrypted_parser.http_errno));
-
return -1;
}