aboutsummaryrefslogtreecommitdiffstats
path: root/Source/SPDataAdditions.m
diff options
context:
space:
mode:
authorMax <post@wickenrode.com>2017-04-01 01:51:40 +0200
committerMax <post@wickenrode.com>2017-04-01 01:51:40 +0200
commit8239d138463e88e2d96a60a1f378f677893e5f6f (patch)
tree4f9fe3f97b00e6bae17c6e0a35e2c4dc2e3a4251 /Source/SPDataAdditions.m
parent78d950a869da1aaac6ab7ce0298fef965ffe87a3 (diff)
downloadsequelpro-8239d138463e88e2d96a60a1f378f677893e5f6f.tar.gz
sequelpro-8239d138463e88e2d96a60a1f378f677893e5f6f.tar.bz2
sequelpro-8239d138463e88e2d96a60a1f378f677893e5f6f.zip
Fix encrypted Session files on 10.6
Diffstat (limited to 'Source/SPDataAdditions.m')
-rw-r--r--Source/SPDataAdditions.m8
1 files changed, 5 insertions, 3 deletions
diff --git a/Source/SPDataAdditions.m b/Source/SPDataAdditions.m
index 65605577..53d18274 100644
--- a/Source/SPDataAdditions.m
+++ b/Source/SPDataAdditions.m
@@ -149,6 +149,7 @@ uint32_t LimitUInt32(NSUInteger i);
unsigned char *lenPtr = paddedBytes + (paddedLength - 4);
memcpy(lenPtr, &bigIntDataLength, 4);
+ size_t bytesWritten;
CCCryptorStatus res = CCCrypt(
kCCEncrypt, // operation mode
kCCAlgorithmAES128, // algorithm
@@ -160,7 +161,7 @@ uint32_t LimitUInt32(NSUInteger i);
paddedLength, // length of raw data
paddedBytes, // output buffer. overwriting input is OK
paddedLength, // output buffer size
- NULL // number of bytes written. not relevant here
+ &bytesWritten // number of bytes written. not relevant here, but 10.6 fails if omitted
);
if(res != kCCSuccess)
@@ -168,7 +169,7 @@ uint32_t LimitUInt32(NSUInteger i);
reason:[NSString stringWithFormat:@"CCCrypt() failed! (CCCryptorStatus=%d)",res]
userInfo:@{@"cryptorStatus":@(res)}];
- // the return code of CCCrypt() is not always reliable, better check it again
+ // CVE-2016-4711: the return code of CCCrypt() is not always reliable, better check it again
if(memcmp(lenPtr, &bigIntDataLength, 4) == 0)
@throw [NSException exceptionWithName:NSInternalInconsistencyException reason:@"Encrypted data is same as plaintext data!" userInfo:nil];
@@ -203,6 +204,7 @@ uint32_t LimitUInt32(NSUInteger i);
// Decrypt the data
unsigned char *decryptedBytes = calloc(1,encryptedLength);
+ size_t bytesRead;
CCCryptorStatus res = CCCrypt(
kCCDecrypt, // operation mode
kCCAlgorithmAES128, // algorithm
@@ -214,7 +216,7 @@ uint32_t LimitUInt32(NSUInteger i);
encryptedLength, // length of raw data
decryptedBytes, // output buffer. overwriting input is OK
encryptedLength, // output buffer size
- NULL // number of bytes written. not relevant here
+ &bytesRead // number of bytes decrypted. not relevant here, but 10.6 fails if omitted
);
if(res != kCCSuccess) {