cryptopals_c

cryptopals crypto challenges solutions in pure c
git clone git://git.superpozycja.net/cryptopals_c
Log | Files | Refs | README

commit 2086d07fcc3fcf69929a22790456c54b98fe2004
parent a85896c83199ceb1e6ee6901b5e2d736a3d974a3
Author: superpozycja <anna@superpozycja.net>
Date:   Tue, 25 Feb 2025 20:18:34 +0100

lib/aes: back from valgrinds hall of shame (fix memory leaks)

Diffstat:
Mlib/aes.c | 19++++++++++++++++---
1 file changed, 16 insertions(+), 3 deletions(-)

diff --git a/lib/aes.c b/lib/aes.c @@ -43,7 +43,6 @@ static uint8_t inv_sbox[0x100] = { static int rot_word(ba *input, ba **output, unsigned int offset) { int i; - *output = ba_alloc(4); for (i = 0; i < 4; i++) { (*output)->val[i] = input->val[(i+offset)%4]; } @@ -52,7 +51,6 @@ static int rot_word(ba *input, ba **output, unsigned int offset) { static int sub_word(ba *input, ba **output) { int i; - *output = ba_alloc(4); for (i = 0; i < 4; i++) { (*output)->val[i] = sbox[input->val[i]]; } @@ -96,7 +94,7 @@ static int key_expansion(ba *key, unsigned int keylen, unsigned int rounds, ba_copy(tmp2, round_keys[i - nk]); if (i % nk == 0) { - ba *tmp3; + ba *tmp3 = ba_alloc(4); rot_word(tmp, &tmp3, 1); sub_word(tmp3, &tmp); @@ -116,6 +114,9 @@ static int key_expansion(ba *key, unsigned int keylen, unsigned int rounds, ba_free(tmp2); } + for (int i = 0; i < 10; i++) + ba_free(rcon[i]); + return 0; } @@ -321,6 +322,12 @@ static int aes_generic(unsigned int rounds, unsigned int keylen, for (i = 0; i < 16; i++) (*ciphertext)->val[i] = (state[i%4]->val)[i/4]; + for (i = 0; i < 4; i++) + ba_free(state[i]); + + for (i = 0; i < 4 * (rounds + 1); i++) + ba_free(round_keys[i]); + return 0; } @@ -369,6 +376,12 @@ static int aes_inv_generic(unsigned int rounds, unsigned int keylen, for (i = 0; i < 16; i++) (*plaintext)->val[i] = (state[i%4]->val)[i/4]; + for (i = 0; i < 4; i++) + ba_free(state[i]); + + for (i = 0; i < 4 * (rounds + 1); i++) + ba_free(round_keys[i]); + return 0; }