From fb4b09b495a80a8abe07897def1c418c3aa06f2c Mon Sep 17 00:00:00 2001 From: Samuel Neves Date: Tue, 7 Feb 2023 16:12:58 +0000 Subject: [PATCH] blake2xs: fix key length check This does not result in a buffer overflow, because luckily `BLAKE2B_KEYBYTES == BLAKE2S_BLOCKBYTES`. --- ref/blake2xs-ref.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ref/blake2xs-ref.c b/ref/blake2xs-ref.c index e7a89f8..4261e7a 100644 --- a/ref/blake2xs-ref.c +++ b/ref/blake2xs-ref.c @@ -33,7 +33,7 @@ int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, return -1; } - if (NULL != key && keylen > BLAKE2B_KEYBYTES) { + if (NULL != key && keylen > BLAKE2S_KEYBYTES) { return -1; }