code
stringlengths
14
2.05k
label
int64
0
1
programming_language
stringclasses
7 values
cwe_id
stringlengths
6
14
cwe_name
stringlengths
5
98
description
stringlengths
36
379
url
stringlengths
36
48
label_name
stringclasses
2 values
void ep_map(ep_t p, const uint8_t *msg, int len) { ep_map_dst(p, msg, len, (const uint8_t *)"RELIC", 5); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep_mul_naf_imp(ep_t r, const ep_t p, const bn_t k) { int i, l; /* Some of the supported prime curves have order > field. */ int8_t u, naf[RLC_FP_BITS + 2]; ep_t t[1 << (EP_WIDTH - 2)]; bn_t _k, n; bn_null(n); bn_null(_k); RLC_TRY { bn_new(n); bn_new(_k); /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_null(t[i]); ep_new(t[i]); } ep_curve_get_ord(n); bn_mod(_k, k, n); /* Compute the precomputation table. */ ep_tab(t, p, EP_WIDTH); /* Compute the w-NAF representation of k. */ l = RLC_FP_BITS + 2; bn_rec_naf(naf, &l, _k, EP_WIDTH); ep_set_infty(r); for (i = l - 1; i >= 0; i--) { ep_dbl(r, r); u = naf[i]; if (u > 0) { ep_add(r, r, t[u / 2]); } else if (u < 0) { ep_sub(r, r, t[-u / 2]); } } /* Convert r to affine coordinates. */ ep_norm(r, r); if (bn_sign(_k) == RLC_NEG) { ep_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); /* Free the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_slide(ep_t r, const ep_t p, const bn_t k) { bn_t _k, n; ep_t t[1 << (EP_WIDTH - 1)], q; int i, j, l; uint8_t win[RLC_FP_BITS + 1]; if (bn_is_zero(k) || ep_is_infty(p)) { ep_set_infty(r); return; } ep_null(q); bn_null(n); bn_null(_k); RLC_TRY { bn_new(n); bn_new(_k); for (i = 0; i < (1 << (EP_WIDTH - 1)); i ++) { ep_null(t[i]); ep_new(t[i]); } ep_new(q); ep_copy(t[0], p); ep_dbl(q, p); #if defined(EP_MIXED) ep_norm(q, q); #endif ep_curve_get_ord(n); bn_mod(_k, k, n); /* Create table. */ for (i = 1; i < (1 << (EP_WIDTH - 1)); i++) { ep_add(t[i], t[i - 1], q); } #if defined(EP_MIXED) ep_norm_sim(t + 1, (const ep_t *)t + 1, (1 << (EP_WIDTH - 1)) - 1); #endif ep_set_infty(q); l = RLC_FP_BITS + 1; bn_rec_slw(win, &l, _k, EP_WIDTH); for (i = 0; i < l; i++) { if (win[i] == 0) { ep_dbl(q, q); } else { for (j = 0; j < util_bits_dig(win[i]); j++) { ep_dbl(q, q); } ep_add(q, q, t[win[i] >> 1]); } } ep_norm(r, q); if (bn_sign(_k) == RLC_NEG) { ep_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); for (i = 0; i < (1 << (EP_WIDTH - 1)); i++) { ep_free(t[i]); } ep_free(q); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_monty(ep_t r, const ep_t p, const bn_t k) { int i, j, bits; ep_t t[2]; bn_t n, l, _k; bn_null(n); bn_null(l); bn_null(_k); ep_null(t[0]); ep_null(t[1]); if (bn_is_zero(k) || ep_is_infty(p)) { ep_set_infty(r); return; } RLC_TRY { bn_new(n); bn_new(l); bn_new(_k); ep_new(t[0]); ep_new(t[1]); ep_curve_get_ord(n); bits = bn_bits(n); bn_mod(_k, k, n); bn_abs(l, _k); bn_add(l, l, n); bn_add(n, l, n); dv_swap_cond(l->dp, n->dp, RLC_MAX(l->used, n->used), bn_get_bit(l, bits) == 0); l->used = RLC_SEL(l->used, n->used, bn_get_bit(l, bits) == 0); ep_norm(t[0], p); ep_dbl(t[1], t[0]); /* Blind both points independently. */ ep_blind(t[0], t[0]); ep_blind(t[1], t[1]); for (i = bits - 1; i >= 0; i--) { j = bn_get_bit(l, i); dv_swap_cond(t[0]->x, t[1]->x, RLC_FP_DIGS, j ^ 1); dv_swap_cond(t[0]->y, t[1]->y, RLC_FP_DIGS, j ^ 1); dv_swap_cond(t[0]->z, t[1]->z, RLC_FP_DIGS, j ^ 1); ep_add(t[0], t[0], t[1]); ep_dbl(t[1], t[1]); dv_swap_cond(t[0]->x, t[1]->x, RLC_FP_DIGS, j ^ 1); dv_swap_cond(t[0]->y, t[1]->y, RLC_FP_DIGS, j ^ 1); dv_swap_cond(t[0]->z, t[1]->z, RLC_FP_DIGS, j ^ 1); } ep_norm(r, t[0]); ep_neg(t[0], r); dv_copy_cond(r->y, t[0]->y, RLC_FP_DIGS, bn_sign(_k) == RLC_NEG); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(l); bn_free(_k); ep_free(t[1]); ep_free(t[0]); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_dig(ep_t r, const ep_t p, dig_t k) { ep_t t; bn_t _k; int8_t u, naf[RLC_DIG + 1]; int l; ep_null(t); bn_null(_k); if (k == 0 || ep_is_infty(p)) { ep_set_infty(r); return; } RLC_TRY { ep_new(t); bn_new(_k); bn_set_dig(_k, k); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _k, 2); ep_set_infty(t); for (int i = l - 1; i >= 0; i--) { ep_dbl(t, t); u = naf[i]; if (u > 0) { ep_add(t, t, p); } else if (u < 0) { ep_sub(t, t, p); } } ep_norm(r, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep_free(t); bn_free(_k); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep_mul_glv_imp(ep_t r, const ep_t p, const bn_t k) { int l, l0, l1, i, n0, n1, s0, s1; int8_t naf0[RLC_FP_BITS + 1], naf1[RLC_FP_BITS + 1], *t0, *t1; bn_t n, _k, k0, k1, v1[3], v2[3]; ep_t q, t[1 << (EP_WIDTH - 2)]; bn_null(n); bn_null(_k); bn_null(k0); bn_null(k1); ep_null(q); RLC_TRY { bn_new(n); bn_new(_k); bn_new(k0); bn_new(k1); ep_new(q); for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_null(t[i]); ep_new(t[i]); } for (i = 0; i < 3; i++) { bn_null(v1[i]); bn_null(v2[i]); bn_new(v1[i]); bn_new(v2[i]); } ep_curve_get_ord(n); ep_curve_get_v1(v1); ep_curve_get_v2(v2); bn_mod(_k, k, n); bn_rec_glv(k0, k1, _k, n, (const bn_t *)v1, (const bn_t *)v2); s0 = bn_sign(k0); s1 = bn_sign(k1); bn_abs(k0, k0); bn_abs(k1, k1); if (s0 == RLC_POS) { ep_tab(t, p, EP_WIDTH); } else { ep_neg(q, p); ep_tab(t, q, EP_WIDTH); } l0 = l1 = RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, k0, EP_WIDTH); bn_rec_naf(naf1, &l1, k1, EP_WIDTH); l = RLC_MAX(l0, l1); t0 = naf0 + l - 1; t1 = naf1 + l - 1; ep_set_infty(r); for (i = l - 1; i >= 0; i--, t0--, t1--) { ep_dbl(r, r); n0 = *t0; n1 = *t1; if (n0 > 0) { ep_add(r, r, t[n0 / 2]); } if (n0 < 0) { ep_sub(r, r, t[-n0 / 2]); } if (n1 > 0) { ep_psi(q, t[n1 / 2]); if (s0 != s1) { ep_neg(q, q); } ep_add(r, r, q); } if (n1 < 0) { ep_psi(q, t[-n1 / 2]); if (s0 != s1) { ep_neg(q, q); } ep_sub(r, r, q); } } /* Convert r to affine coordinates. */ ep_norm(r, r); if (bn_sign(_k) == RLC_NEG) { ep_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); bn_free(k0); bn_free(k1); bn_free(n) ep_free(q); for (i = 0; i < 1 << (EP_WIDTH - 2); i++) { ep_free(t[i]); } for (i = 0; i < 3; i++) { bn_free(v1[i]); bn_free(v2[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep_mul_reg_imp(ep_t r, const ep_t p, const bn_t k) { bn_t _k; int i, j, l, n; int8_t s, reg[1 + RLC_CEIL(RLC_FP_BITS + 1, EP_WIDTH - 1)]; ep_t t[1 << (EP_WIDTH - 2)], u, v; if (bn_is_zero(k)) { ep_set_infty(r); return; } bn_null(_k); RLC_TRY { bn_new(_k); ep_new(u); ep_new(v); /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_null(t[i]); ep_new(t[i]); } /* Compute the precomputation table. */ ep_tab(t, p, EP_WIDTH); ep_curve_get_ord(_k); n = bn_bits(_k); /* Make a copy of the scalar for processing. */ bn_abs(_k, k); _k->dp[0] |= 1; /* Compute the regular w-NAF representation of k. */ l = RLC_CEIL(n, EP_WIDTH - 1) + 1; bn_rec_reg(reg, &l, _k, n, EP_WIDTH); #if defined(EP_MIXED) fp_set_dig(u->z, 1); u->coord = BASIC; #else u->coord = EP_ADD; #endif ep_set_infty(r); for (i = l - 1; i >= 0; i--) { for (j = 0; j < EP_WIDTH - 1; j++) { ep_dbl(r, r); } n = reg[i]; s = (n >> 7); n = ((n ^ s) - s) >> 1; for (j = 0; j < (1 << (EP_WIDTH - 2)); j++) { dv_copy_cond(u->x, t[j]->x, RLC_FP_DIGS, j == n); dv_copy_cond(u->y, t[j]->y, RLC_FP_DIGS, j == n); #if !defined(EP_MIXED) dv_copy_cond(u->z, t[j]->z, RLC_FP_DIGS, j == n); #endif } ep_neg(v, u); dv_copy_cond(u->y, v->y, RLC_FP_DIGS, s != 0); ep_add(r, r, u); } /* t[0] has an unmodified copy of p. */ ep_sub(u, r, t[0]); dv_copy_cond(r->x, u->x, RLC_FP_DIGS, bn_is_even(k)); dv_copy_cond(r->y, u->y, RLC_FP_DIGS, bn_is_even(k)); dv_copy_cond(r->z, u->z, RLC_FP_DIGS, bn_is_even(k)); /* Convert r to affine coordinates. */ ep_norm(r, r); ep_neg(u, r); dv_copy_cond(r->y, u->y, RLC_FP_DIGS, bn_sign(k) == RLC_NEG); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_free(t[i]); } bn_free(_k); ep_free(u); ep_free(v); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep_mul_fix_plain(ep_t r, const ep_t *t, const bn_t k) { int l, i, n; int8_t naf[RLC_FP_BITS + 1]; /* Compute the w-TNAF representation of k. */ l = RLC_FP_BITS + 1; bn_rec_naf(naf, &l, k, EP_DEPTH); n = naf[l - 1]; if (n > 0) { ep_copy(r, t[n / 2]); } else { ep_neg(r, t[-n / 2]); } for (i = l - 2; i >= 0; i--) { ep_dbl(r, r); n = naf[i]; if (n > 0) { ep_add(r, r, t[n / 2]); } if (n < 0) { ep_sub(r, r, t[-n / 2]); } } /* Convert r to affine coordinates. */ ep_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep_neg(r, r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep_mul_sim_plain(ep_t r, const ep_t p, const bn_t k, const ep_t q, const bn_t m, const ep_t *t) { int i, l, l0, l1, w, gen; int8_t naf0[RLC_FP_BITS + 1], naf1[RLC_FP_BITS + 1], n0, n1, *u, *v; ep_t t0[1 << (EP_WIDTH - 2)]; ep_t t1[1 << (EP_WIDTH - 2)]; RLC_TRY { gen = (t == NULL ? 0 : 1); if (!gen) { for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_null(t0[i]); ep_new(t0[i]); } ep_tab(t0, p, EP_WIDTH); t = (const ep_t *)t0; } /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep_null(t1[i]); ep_new(t1[i]); } /* Compute the precomputation table. */ ep_tab(t1, q, EP_WIDTH); /* Compute the w-TNAF representation of k. */ if (gen) { w = EP_DEPTH; } else { w = EP_WIDTH; } l0 = l1 = RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, k, w); bn_rec_naf(naf1, &l1, m, EP_WIDTH); l = RLC_MAX(l0, l1); if (bn_sign(k) == RLC_NEG) { for (i = 0; i < l0; i++) { naf0[i] = -naf0[i]; } } if (bn_sign(m) == RLC_NEG) { for (i = 0; i < l1; i++) { naf1[i] = -naf1[i]; } } u = naf0 + l - 1; v = naf1 + l - 1; ep_set_infty(r); for (i = l - 1; i >= 0; i--, u--, v--) { ep_dbl(r, r); n0 = *u; n1 = *v; if (n0 > 0) { ep_add(r, r, t[n0 / 2]); } if (n0 < 0) { ep_sub(r, r, t[-n0 / 2]); } if (n1 > 0) { ep_add(r, r, t1[n1 / 2]); } if (n1 < 0) { ep_sub(r, r, t1[-n1 / 2]); } } /* Convert r to affine coordinates. */ ep_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation tables. */ if (!gen) { for (i = 0; i < 1 << (EP_WIDTH - 2); i++) { ep_free(t0[i]); } } for (i = 0; i < 1 << (EP_WIDTH - 2); i++) { ep_free(t1[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_sim_joint(ep_t r, const ep_t p, const bn_t k, const ep_t q, const bn_t m) { bn_t n, _k, _m; ep_t t[5]; int i, l, u_i, offset; int8_t jsf[2 * (RLC_FP_BITS + 1)]; if (bn_is_zero(k) || ep_is_infty(p)) { ep_mul(r, q, m); return; } if (bn_is_zero(m) || ep_is_infty(q)) { ep_mul(r, p, k); return; } bn_null(n); bn_null(_k); bn_null(_m); RLC_TRY { bn_new(n); bn_new(_k); bn_new(_m); for (i = 0; i < 5; i++) { ep_null(t[i]); ep_new(t[i]); } ep_curve_get_ord(n); bn_mod(_k, k, n); bn_mod(_m, m, n); ep_set_infty(t[0]); ep_copy(t[1], q); if (bn_sign(_m) == RLC_NEG) { ep_neg(t[1], t[1]); } ep_copy(t[2], p); if (bn_sign(_k) == RLC_NEG) { ep_neg(t[2], t[2]); } ep_add(t[3], t[2], t[1]); ep_sub(t[4], t[2], t[1]); #if defined(EP_MIXED) ep_norm_sim(t + 3, (const ep_t *)t + 3, 2); #endif l = 2 * (RLC_FP_BITS + 1); bn_rec_jsf(jsf, &l, _k, _m); ep_set_infty(r); offset = RLC_MAX(bn_bits(_k), bn_bits(_m)) + 1; for (i = l - 1; i >= 0; i--) { ep_dbl(r, r); if (jsf[i] != 0 && jsf[i] == -jsf[i + offset]) { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep_sub(r, r, t[4]); } else { ep_add(r, r, t[4]); } } else { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep_sub(r, r, t[-u_i]); } else { ep_add(r, r, t[u_i]); } } } ep_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); bn_free(_m); for (i = 0; i < 5; i++) { ep_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_sim_trick(ep_t r, const ep_t p, const bn_t k, const ep_t q, const bn_t m) { ep_t t0[1 << (EP_WIDTH / 2)], t1[1 << (EP_WIDTH / 2)], t[1 << EP_WIDTH]; bn_t n, _k, _m; int l0, l1, w = EP_WIDTH / 2; uint8_t w0[RLC_FP_BITS + 1], w1[RLC_FP_BITS + 1]; if (bn_is_zero(k) || ep_is_infty(p)) { ep_mul(r, q, m); return; } if (bn_is_zero(m) || ep_is_infty(q)) { ep_mul(r, p, k); return; } bn_null(n); bn_null(_k); bn_null(_m); RLC_TRY { bn_new(n); bn_new(_k); bn_new(_m); for (int i = 0; i < (1 << w); i++) { ep_null(t0[i]); ep_null(t1[i]); ep_new(t0[i]); ep_new(t1[i]); } for (int i = 0; i < (1 << EP_WIDTH); i++) { ep_null(t[i]); ep_new(t[i]); } ep_curve_get_ord(n); bn_mod(_k, k, n); bn_mod(_m, m, n); ep_set_infty(t0[0]); ep_copy(t0[1], p); if (bn_sign(_k) == RLC_NEG) { ep_neg(t0[1], t0[1]); } for (int i = 2; i < (1 << w); i++) { ep_add(t0[i], t0[i - 1], t0[1]); } ep_set_infty(t1[0]); ep_copy(t1[1], q); if (bn_sign(_m) == RLC_NEG) { ep_neg(t1[1], t1[1]); } for (int i = 2; i < (1 << w); i++) { ep_add(t1[i], t1[i - 1], t1[1]); } for (int i = 0; i < (1 << w); i++) { for (int j = 0; j < (1 << w); j++) { ep_add(t[(i << w) + j], t0[i], t1[j]); } } #if EP_WIDTH > 2 && defined(EP_MIXED) ep_norm_sim(t + 1, (const ep_t *)(t + 1), (1 << EP_WIDTH) - 1); #endif l0 = l1 = RLC_CEIL(RLC_FP_BITS + 1, w); bn_rec_win(w0, &l0, _k, w); bn_rec_win(w1, &l1, _m, w); for (int i = l0; i < l1; i++) { w0[i] = 0; } for (int i = l1; i < l0; i++) { w1[i] = 0; } ep_set_infty(r); for (int i = RLC_MAX(l0, l1) - 1; i >= 0; i--) { for (int j = 0; j < w; j++) { ep_dbl(r, r); } ep_add(r, r, t[(w0[i] << w) + w1[i]]); } ep_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); bn_free(_m); for (int i = 0; i < (1 << w); i++) { ep_free(t0[i]); ep_free(t1[i]); } for (int i = 0; i < (1 << EP_WIDTH); i++) { ep_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_mul_sim_lot_plain(ep_t r, const ep_t p[], const bn_t k[], int n) { int i, j, l, *_l = RLC_ALLOCA(int, n); ep_t *_p = RLC_ALLOCA(ep_t, n); int8_t *naf = NULL; RLC_TRY { l = 0; for (i = 0; i < n; i++) { l = RLC_MAX(l, bn_bits(k[i]) + 1); } naf = RLC_ALLOCA(int8_t, n * l); if (naf == NULL || _p == NULL || _l == NULL) { RLC_THROW(ERR_NO_MEMORY); } for (i = 0; i < n; i++) { ep_null(_p[i]); ep_new(_p[i]); } for (i = 0; i < n; i++) { _l[i] = l; ep_norm(_p[i], p[i]); bn_rec_naf(&naf[i*l], &_l[i], k[i], 2); if (bn_sign(k[i]) == RLC_NEG) { ep_neg(_p[i], _p[i]); } } ep_set_infty(r); for (i = l - 1; i >= 0; i--) { ep_dbl(r, r); for (j = 0; j < n; j++) { if (naf[j*l + i] > 0) { ep_add(r, r, _p[j]); } if (naf[j*l + i] < 0) { ep_sub(r, r, _p[j]); } } } /* Convert r to affine coordinates. */ ep_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < n; i++) { ep_free(_p[i]); } RLC_FREE(_l); RLC_FREE(_p); RLC_FREE(naf); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_write_bin(uint8_t *bin, int len, const ep_t a, int pack) { ep_t t; ep_null(t); memset(bin, 0, len); if (ep_is_infty(a)) { if (len < 1) { RLC_THROW(ERR_NO_BUFFER); return; } else { return; } } RLC_TRY { ep_new(t); ep_norm(t, a); if (pack) { if (len < RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); } else { ep_pck(t, t); bin[0] = 2 | fp_get_bit(t->y, 0); fp_write_bin(bin + 1, RLC_FP_BYTES, t->x); } } else { if (len < 2 * RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); } else { bin[0] = 4; fp_write_bin(bin + 1, RLC_FP_BYTES, t->x); fp_write_bin(bin + RLC_FP_BYTES + 1, RLC_FP_BYTES, t->y); } } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep_read_bin(ep_t a, const uint8_t *bin, int len) { if (len == 1) { if (bin[0] == 0) { ep_set_infty(a); return; } else { RLC_THROW(ERR_NO_BUFFER); return; } } if (len != (RLC_FP_BYTES + 1) && len != (2 * RLC_FP_BYTES + 1)) { RLC_THROW(ERR_NO_BUFFER); return; } a->coord = BASIC; fp_set_dig(a->z, 1); fp_read_bin(a->x, bin + 1, RLC_FP_BYTES); if (len == RLC_FP_BYTES + 1) { switch(bin[0]) { case 2: fp_zero(a->y); break; case 3: fp_zero(a->y); fp_set_bit(a->y, 0, 1); break; default: RLC_THROW(ERR_NO_VALID); break; } ep_upk(a, a); } if (len == 2 * RLC_FP_BYTES + 1) { if (bin[0] == 4) { fp_read_bin(a->y, bin + RLC_FP_BYTES + 1, RLC_FP_BYTES); } else { RLC_THROW(ERR_NO_VALID); return; } } if (!ep_on_curve(a)) { RLC_THROW(ERR_NO_VALID); return; } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_map_dst(ep2_t p, const uint8_t *msg, int len, const uint8_t *dst, int dst_len) { /* enough space for two field elements plus extra bytes for uniformity */ const int len_per_elm = (FP_PRIME + ep_param_level() + 7) / 8; uint8_t *pseudo_random_bytes = RLC_ALLOCA(uint8_t, 4 * len_per_elm); RLC_TRY { /* XXX(rsw) See note in ep/relic_ep_map.c about using MD_MAP. */ /* hash to a pseudorandom string using md_xmd */ md_xmd(pseudo_random_bytes, 4 * len_per_elm, msg, len, dst, dst_len); ep2_map_from_field(p, pseudo_random_bytes, 2 * len_per_elm); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { RLC_FREE(pseudo_random_bytes); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_map(ep2_t p, const uint8_t *msg, int len) { ep2_map_dst(p, msg, len, (const uint8_t *)"RELIC", 5); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_mul_dig(ep2_t r, const ep2_t p, const dig_t k) { ep2_t t; bn_t _k; int8_t u, naf[RLC_DIG + 1]; int l; ep2_null(t); bn_null(_k); if (k == 0 || ep2_is_infty(p)) { ep2_set_infty(r); return; } RLC_TRY { ep2_new(t); bn_new(_k); bn_set_dig(_k, k); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _k, 2); ep2_set_infty(t); for (int i = l - 1; i >= 0; i--) { ep2_dbl(t, t); u = naf[i]; if (u > 0) { ep2_add(t, t, p); } else if (u < 0) { ep2_sub(t, t, p); } } ep2_norm(r, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep2_free(t); bn_free(_k); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_mul_basic(ep2_t r, const ep2_t p, const bn_t k) { int i, l; ep2_t t; ep2_null(t); if (bn_is_zero(k) || ep2_is_infty(p)) { ep2_set_infty(r); return; } RLC_TRY { ep2_new(t); l = bn_bits(k); if (bn_get_bit(k, l - 1)) { ep2_copy(t, p); } else { ep2_set_infty(t); } for (i = l - 2; i >= 0; i--) { ep2_dbl(t, t); if (bn_get_bit(k, i)) { ep2_add(t, t, p); } } ep2_copy(r, t); ep2_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep2_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep2_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_mul_slide(ep2_t r, const ep2_t p, const bn_t k) { ep2_t t[1 << (EP_WIDTH - 1)], q; int i, j, l; uint8_t win[RLC_FP_BITS + 1]; ep2_null(q); if (bn_is_zero(k) || ep2_is_infty(p)) { ep2_set_infty(r); return; } RLC_TRY { for (i = 0; i < (1 << (EP_WIDTH - 1)); i ++) { ep2_null(t[i]); ep2_new(t[i]); } ep2_new(q); ep2_copy(t[0], p); ep2_dbl(q, p); #if defined(EP_MIXED) ep2_norm(q, q); #endif /* Create table. */ for (i = 1; i < (1 << (EP_WIDTH - 1)); i++) { ep2_add(t[i], t[i - 1], q); } #if defined(EP_MIXED) ep2_norm_sim(t + 1, t + 1, (1 << (EP_WIDTH - 1)) - 1); #endif ep2_set_infty(q); l = RLC_FP_BITS + 1; bn_rec_slw(win, &l, k, EP_WIDTH); for (i = 0; i < l; i++) { if (win[i] == 0) { ep2_dbl(q, q); } else { for (j = 0; j < util_bits_dig(win[i]); j++) { ep2_dbl(q, q); } ep2_add(q, q, t[win[i] >> 1]); } } ep2_norm(r, q); if (bn_sign(k) == RLC_NEG) { ep2_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < (1 << (EP_WIDTH - 1)); i++) { ep2_free(t[i]); } ep2_free(q); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep2_mul_naf_imp(ep2_t r, const ep2_t p, const bn_t k) { int l, i, n; int8_t naf[RLC_FP_BITS + 1]; ep2_t t[1 << (EP_WIDTH - 2)]; RLC_TRY { /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_null(t[i]); ep2_new(t[i]); } /* Compute the precomputation table. */ ep2_tab(t, p, EP_WIDTH); /* Compute the w-NAF representation of k. */ l = sizeof(naf); bn_rec_naf(naf, &l, k, EP_WIDTH); ep2_set_infty(r); for (i = l - 1; i >= 0; i--) { ep2_dbl(r, r); n = naf[i]; if (n > 0) { ep2_add(r, r, t[n / 2]); } if (n < 0) { ep2_sub(r, r, t[-n / 2]); } } /* Convert r to affine coordinates. */ ep2_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep2_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep2_mul_glv_imp(ep2_t r, const ep2_t p, const bn_t k) { int i, j, l, _l[4]; bn_t n, _k[4], u; int8_t naf[4][RLC_FP_BITS + 1]; ep2_t q[4]; bn_null(n); bn_null(u); RLC_TRY { bn_new(n); bn_new(u); for (i = 0; i < 4; i++) { bn_null(_k[i]); ep2_null(q[i]); bn_new(_k[i]); ep2_new(q[i]); } ep2_curve_get_ord(n); fp_prime_get_par(u); bn_mod(_k[0], k, n); bn_rec_frb(_k, 4, _k[0], u, n, ep_curve_is_pairf() == EP_BN); ep2_norm(q[0], p); ep2_frb(q[1], q[0], 1); ep2_frb(q[2], q[1], 1); ep2_frb(q[3], q[2], 1); l = 0; for (i = 0; i < 4; i++) { if (bn_sign(_k[i]) == RLC_NEG) { ep2_neg(q[i], q[i]); } _l[i] = RLC_FP_BITS + 1; bn_rec_naf(naf[i], &_l[i], _k[i], 2); l = RLC_MAX(l, _l[i]); } ep2_set_infty(r); for (j = l - 1; j >= 0; j--) { ep2_dbl(r, r); for (i = 0; i < 4; i++) { if (naf[i][j] > 0) { ep2_add(r, r, q[i]); } if (naf[i][j] < 0) { ep2_sub(r, r, q[i]); } } } /* Convert r to affine coordinates. */ ep2_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(u); for (i = 0; i < 4; i++) { bn_free(_k[i]); ep2_free(q[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep2_mul_fix_plain(ep2_t r, const ep2_t *table, const bn_t k) { int len, i, n; int8_t naf[2 * RLC_FP_BITS + 1], *t; if (bn_is_zero(k)) { ep2_set_infty(r); return; } /* Compute the w-TNAF representation of k. */ len = 2 * RLC_FP_BITS + 1; bn_rec_naf(naf, &len, k, EP_DEPTH); t = naf + len - 1; ep2_set_infty(r); for (i = len - 1; i >= 0; i--, t--) { ep2_dbl(r, r); n = *t; if (n > 0) { ep2_add(r, r, table[n / 2]); } if (n < 0) { ep2_sub(r, r, table[-n / 2]); } } /* Convert r to affine coordinates. */ ep2_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep2_neg(r, r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep2_mul_sim_plain(ep2_t r, const ep2_t p, const bn_t k, const ep2_t q, const bn_t m, const ep2_t *t) { int i, l, l0, l1, n0, n1, w, gen; int8_t naf0[2 * RLC_FP_BITS + 1], naf1[2 * RLC_FP_BITS + 1], *_k, *_m; ep2_t t0[1 << (EP_WIDTH - 2)]; ep2_t t1[1 << (EP_WIDTH - 2)]; RLC_TRY { gen = (t == NULL ? 0 : 1); if (!gen) { for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_null(t0[i]); ep2_new(t0[i]); } ep2_tab(t0, p, EP_WIDTH); t = (ep2_t *)t0; } /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_null(t1[i]); ep2_new(t1[i]); } /* Compute the precomputation table. */ ep2_tab(t1, q, EP_WIDTH); /* Compute the w-TNAF representation of k. */ if (gen) { w = EP_DEPTH; } else { w = EP_WIDTH; } l0 = l1 = 2 * RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, k, w); bn_rec_naf(naf1, &l1, m, EP_WIDTH); l = RLC_MAX(l0, l1); _k = naf0 + l - 1; _m = naf1 + l - 1; if (bn_sign(k) == RLC_NEG) { for (i = 0; i < l0; i++) { naf0[i] = -naf0[i]; } } if (bn_sign(m) == RLC_NEG) { for (i = 0; i < l1; i++) { naf1[i] = -naf1[i]; } } ep2_set_infty(r); for (i = l - 1; i >= 0; i--, _k--, _m--) { ep2_dbl(r, r); n0 = *_k; n1 = *_m; if (n0 > 0) { ep2_add(r, r, t[n0 / 2]); } if (n0 < 0) { ep2_sub(r, r, t[-n0 / 2]); } if (n1 > 0) { ep2_add(r, r, t1[n1 / 2]); } if (n1 < 0) { ep2_sub(r, r, t1[-n1 / 2]); } } /* Convert r to affine coordinates. */ ep2_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation tables. */ if (!gen) { for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_free(t0[i]); } } for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep2_free(t1[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_mul_sim_dig(ep2_t r, const ep2_t p[], const dig_t k[], int len) { ep2_t t; int max; ep2_null(t); max = util_bits_dig(k[0]); for (int i = 1; i < len; i++) { max = RLC_MAX(max, util_bits_dig(k[i])); } RLC_TRY { ep2_new(t); ep2_set_infty(t); for (int i = max - 1; i >= 0; i--) { ep2_dbl(t, t); for (int j = 0; j < len; j++) { if (k[j] & ((dig_t)1 << i)) { ep2_add(t, t, p[j]); } } } ep2_norm(r, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep2_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep2_mul_sim_endom(ep2_t r, const ep2_t p, const bn_t k, ep2_t q, const bn_t m) { int i, j, l, _l[4]; bn_t _k[4], _m[4], n, u; int8_t naf0[4][RLC_FP_BITS + 1]; int8_t naf1[4][RLC_FP_BITS + 1]; ep2_t _p[4], _q[4]; bn_null(n); bn_null(u); RLC_TRY { bn_new(n); bn_new(u); for (i = 0; i < 4; i++) { bn_null(_k[i]); bn_new(_k[i]); bn_null(_m[i]); bn_new(_m[i]); ep2_null(_p[i]); ep2_null(_q[i]); ep2_new(_p[i]); ep2_new(_q[i]); } ep2_norm(_p[0], p); ep2_frb(_p[1], _p[0], 1); ep2_frb(_p[2], _p[1], 1); ep2_frb(_p[3], _p[2], 1); ep2_norm(_q[0], q); ep2_frb(_q[1], _q[0], 1); ep2_frb(_q[2], _q[1], 1); ep2_frb(_q[3], _q[2], 1); ep2_curve_get_ord(n); fp_prime_get_par(u); bn_mod(_k[0], k, n); bn_rec_frb(_k, 4, _k[0], u, n, ep_curve_is_pairf() == EP_BN); bn_mod(_m[0], m, n); bn_rec_frb(_m, 4, _m[0], u, n, ep_curve_is_pairf() == EP_BN); l = 0; for (i = 0; i < 4; i++) { _l[i] = RLC_FP_BITS + 1; bn_rec_naf(naf0[i], &_l[i], _k[i], 2); if (bn_sign(_k[i]) == RLC_NEG) { ep2_neg(_p[i], _p[i]); } l = RLC_MAX(l, _l[i]); _l[i] = RLC_FP_BITS + 1; bn_rec_naf(naf1[i], &_l[i], _m[i], 2); if (bn_sign(_m[i]) == RLC_NEG) { ep2_neg(_q[i], _q[i]); } l = RLC_MAX(l, _l[i]); } ep2_set_infty(r); for (i = l - 1; i >= 0; i--) { ep2_dbl(r, r); for (j = 0; j < 4; j++) { if (naf0[j][i] > 0) { ep2_add(r, r, _p[j]); } if (naf0[j][i] < 0) { ep2_sub(r, r, _p[j]); } if (naf1[j][i] > 0) { ep2_add(r, r, _q[j]); } if (naf1[j][i] < 0) { ep2_sub(r, r, _q[j]); } } } /* Convert r to affine coordinates. */ ep2_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(u); for (i = 0; i < 4; i++) { bn_free(_k[i]); bn_free(_m[i]); ep2_free(_p[i]); ep2_free(_q[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_mul_sim_joint(ep2_t r, const ep2_t p, const bn_t k, const ep2_t q, const bn_t m) { bn_t n, _k, _m; ep2_t t[5]; int i, l, u_i, offset; int8_t jsf[2 * (RLC_FP_BITS + 1)]; if (bn_is_zero(k) || ep2_is_infty(p)) { ep2_mul(r, q, m); return; } if (bn_is_zero(m) || ep2_is_infty(q)) { ep2_mul(r, p, k); return; } bn_null(n); bn_null(_k); bn_null(_m); RLC_TRY { bn_new(n); bn_new(_k); bn_new(_m); for (i = 0; i < 5; i++) { ep2_null(t[i]); ep2_new(t[i]); } ep2_curve_get_ord(n); bn_mod(_k, k, n); bn_mod(_m, m, n); ep2_set_infty(t[0]); ep2_copy(t[1], q); if (bn_sign(_m) == RLC_NEG) { ep2_neg(t[1], t[1]); } ep2_copy(t[2], p); if (bn_sign(_k) == RLC_NEG) { ep2_neg(t[2], t[2]); } ep2_add(t[3], t[2], t[1]); ep2_sub(t[4], t[2], t[1]); #if defined(EP_MIXED) ep2_norm_sim(t + 3, t + 3, 2); #endif l = 2 * (RLC_FP_BITS + 1); bn_rec_jsf(jsf, &l, _k, _m); ep2_set_infty(r); offset = RLC_MAX(bn_bits(_k), bn_bits(_m)) + 1; for (i = l - 1; i >= 0; i--) { ep2_dbl(r, r); if (jsf[i] != 0 && jsf[i] == -jsf[i + offset]) { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep2_sub(r, r, t[4]); } else { ep2_add(r, r, t[4]); } } else { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep2_sub(r, r, t[-u_i]); } else { ep2_add(r, r, t[u_i]); } } } ep2_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(_k); bn_free(_m); for (i = 0; i < 5; i++) { ep2_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_read_bin(ep2_t a, const uint8_t *bin, int len) { if (len == 1) { if (bin[0] == 0) { ep2_set_infty(a); return; } else { RLC_THROW(ERR_NO_BUFFER); return; } } if (len != (2 * RLC_FP_BYTES + 1) && len != (4 * RLC_FP_BYTES + 1)) { RLC_THROW(ERR_NO_BUFFER); return; } a->coord = BASIC; fp2_set_dig(a->z, 1); fp2_read_bin(a->x, bin + 1, 2 * RLC_FP_BYTES); if (len == 2 * RLC_FP_BYTES + 1) { switch(bin[0]) { case 2: fp2_zero(a->y); break; case 3: fp2_zero(a->y); fp_set_bit(a->y[0], 0, 1); fp_zero(a->y[1]); break; default: RLC_THROW(ERR_NO_VALID); break; } ep2_upk(a, a); } if (len == 4 * RLC_FP_BYTES + 1) { if (bin[0] == 4) { fp2_read_bin(a->y, bin + 2 * RLC_FP_BYTES + 1, 2 * RLC_FP_BYTES); } else { RLC_THROW(ERR_NO_VALID); return; } } if (!ep2_on_curve(a)) { RLC_THROW(ERR_NO_VALID); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep2_write_bin(uint8_t *bin, int len, const ep2_t a, int pack) { ep2_t t; ep2_null(t); memset(bin, 0, len); if (ep2_is_infty(a)) { if (len < 1) { RLC_THROW(ERR_NO_BUFFER); return; } else { return; } } RLC_TRY { ep2_new(t); ep2_norm(t, a); if (pack) { if (len < 2 * RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); } else { ep2_pck(t, t); bin[0] = 2 | fp_get_bit(t->y[0], 0); fp2_write_bin(bin + 1, 2 * RLC_FP_BYTES, t->x, 0); } } else { if (len < 4 * RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); } else { bin[0] = 4; fp2_write_bin(bin + 1, 2 * RLC_FP_BYTES, t->x, 0); fp2_write_bin(bin + 2 * RLC_FP_BYTES + 1, 2 * RLC_FP_BYTES, t->y, 0); } } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep2_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_map(ep4_t p, const uint8_t *msg, int len) { bn_t x; fp4_t t0; uint8_t digest[RLC_MD_LEN]; bn_null(x); fp4_null(t0); RLC_TRY { bn_new(x); fp4_new(t0); md_map(digest, msg, len); bn_read_bin(x, digest, RLC_MIN(RLC_FP_BYTES, RLC_MD_LEN)); fp4_zero(p->x); fp_prime_conv(p->x[0][0], x); fp4_set_dig(p->z, 1); while (1) { ep4_rhs(t0, p); if (fp4_srt(p->y, t0)) { p->coord = BASIC; break; } fp_add_dig(p->x[0][0], p->x[0][0], 1); } ep4_mul_cof(p, p); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(x); fp4_free(t0); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep4_mul_naf_imp(ep4_t r, const ep4_t p, const bn_t k) { int l, i, n; int8_t naf[RLC_FP_BITS + 1]; ep4_t t[1 << (EP_WIDTH - 2)]; RLC_TRY { /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_null(t[i]); ep4_new(t[i]); } /* Compute the precomputation table. */ ep4_tab(t, p, EP_WIDTH); /* Compute the w-NAF representation of k. */ l = sizeof(naf); bn_rec_naf(naf, &l, k, EP_WIDTH); ep4_set_infty(r); for (i = l - 1; i >= 0; i--) { ep4_dbl(r, r); n = naf[i]; if (n > 0) { ep4_add(r, r, t[n / 2]); } if (n < 0) { ep4_sub(r, r, t[-n / 2]); } } /* Convert r to affine coordinates. */ ep4_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep4_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep4_mul_glv_imp(ep4_t r, const ep4_t p, const bn_t k) { int sign, i, j, l, _l[8]; bn_t n, _k[8], u, v; int8_t naf[8][RLC_FP_BITS + 1]; ep4_t q[8]; bn_null(n); bn_null(u); bn_null(v); RLC_TRY { bn_new(n); bn_new(u); bn_new(v); for (i = 0; i < 8; i++) { bn_null(_k[i]); ep4_null(q[i]); bn_new(_k[i]); ep4_new(q[i]); } bn_abs(v, k); ep4_curve_get_ord(n); if (bn_cmp_abs(v, n) == RLC_GT) { bn_mod(v, v, n); } fp_prime_get_par(u); sign = bn_sign(u); bn_abs(u, u); ep4_norm(q[0], p); for (i = 0; i < 8; i++) { bn_mod(_k[i], v, u); bn_div(v, v, u); if ((sign == RLC_NEG) && (i % 2 != 0)) { bn_neg(_k[i], _k[i]); } if (bn_sign(k) == RLC_NEG) { bn_neg(_k[i], _k[i]); } if (i > 0) { ep4_frb(q[i], q[i - 1], 1); } } l = 0; for (i = 0; i < 8; i++) { if (bn_sign(_k[i]) == RLC_NEG) { ep4_neg(q[i], q[i]); } _l[i] = RLC_FP_BITS + 1; bn_rec_naf(naf[i], &_l[i], _k[i], 2); l = RLC_MAX(l, _l[i]); } ep4_set_infty(r); for (j = l - 1; j >= 0; j--) { ep4_dbl(r, r); for (i = 0; i < 8; i++) { if (naf[i][j] > 0) { ep4_add(r, r, q[i]); } if (naf[i][j] < 0) { ep4_sub(r, r, q[i]); } } } /* Convert r to affine coordinates. */ ep4_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); bn_free(u); bn_free(v); for (i = 0; i < 8; i++) { bn_free(_k[i]); ep4_free(q[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_mul_slide(ep4_t r, const ep4_t p, const bn_t k) { ep4_t t[1 << (EP_WIDTH - 1)], q; int i, j, l; uint8_t win[RLC_FP_BITS + 1]; ep4_null(q); if (bn_is_zero(k) || ep4_is_infty(p)) { ep4_set_infty(r); return; } RLC_TRY { for (i = 0; i < (1 << (EP_WIDTH - 1)); i ++) { ep4_null(t[i]); ep4_new(t[i]); } ep4_new(q); ep4_copy(t[0], p); ep4_dbl(q, p); #if defined(EP_MIXED) ep4_norm(q, q); #endif /* Create table. */ for (i = 1; i < (1 << (EP_WIDTH - 1)); i++) { ep4_add(t[i], t[i - 1], q); } #if defined(EP_MIXED) ep4_norm_sim(t + 1, t + 1, (1 << (EP_WIDTH - 1)) - 1); #endif ep4_set_infty(q); l = RLC_FP_BITS + 1; bn_rec_slw(win, &l, k, EP_WIDTH); for (i = 0; i < l; i++) { if (win[i] == 0) { ep4_dbl(q, q); } else { for (j = 0; j < util_bits_dig(win[i]); j++) { ep4_dbl(q, q); } ep4_add(q, q, t[win[i] >> 1]); } } ep4_norm(r, q); if (bn_sign(k) == RLC_NEG) { ep4_neg(r, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < (1 << (EP_WIDTH - 1)); i++) { ep4_free(t[i]); } ep4_free(q); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep4_mul_pre_ordin(ep4_t *t, const ep4_t p) { int i; ep4_dbl(t[0], p); #if defined(EP_MIXED) ep4_norm(t[0], t[0]); #endif #if EP_DEPTH > 2 ep4_add(t[1], t[0], p); for (i = 2; i < (1 << (EP_DEPTH - 2)); i++) { ep4_add(t[i], t[i - 1], t[0]); } #if defined(EP_MIXED) for (i = 1; i < (1 << (EP_DEPTH - 2)); i++) { ep4_norm(t[i], t[i]); } #endif #endif ep4_copy(t[0], p); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep4_mul_fix_ordin(ep4_t r, const ep4_t *table, const bn_t k) { int len, i, n; int8_t naf[2 * RLC_FP_BITS + 1], *t; if (bn_is_zero(k)) { ep4_set_infty(r); return; } /* Compute the w-TNAF representation of k. */ len = 2 * RLC_FP_BITS + 1; bn_rec_naf(naf, &len, k, EP_DEPTH); t = naf + len - 1; ep4_set_infty(r); for (i = len - 1; i >= 0; i--, t--) { ep4_dbl(r, r); n = *t; if (n > 0) { ep4_add(r, r, table[n / 2]); } if (n < 0) { ep4_sub(r, r, table[-n / 2]); } } /* Convert r to affine coordinates. */ ep4_norm(r, r); if (bn_sign(k) == RLC_NEG) { ep4_neg(r, r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_mul_sim_trick(ep4_t r, const ep4_t p, const bn_t k, const ep4_t q, const bn_t m) { ep4_t t0[1 << (EP_WIDTH / 2)]; ep4_t t1[1 << (EP_WIDTH / 2)]; ep4_t t[1 << EP_WIDTH]; bn_t n; int l0, l1, w = EP_WIDTH / 2; uint8_t w0[2 * RLC_FP_BITS], w1[2 * RLC_FP_BITS]; bn_null(n); if (bn_is_zero(k) || ep4_is_infty(p)) { ep4_mul(r, q, m); return; } if (bn_is_zero(m) || ep4_is_infty(q)) { ep4_mul(r, p, k); return; } RLC_TRY { bn_new(n); ep4_curve_get_ord(n); for (int i = 0; i < (1 << w); i++) { ep4_null(t0[i]); ep4_null(t1[i]); ep4_new(t0[i]); ep4_new(t1[i]); } for (int i = 0; i < (1 << EP_WIDTH); i++) { ep4_null(t[i]); ep4_new(t[i]); } ep4_set_infty(t0[0]); ep4_copy(t0[1], p); if (bn_sign(k) == RLC_NEG) { ep4_neg(t0[1], t0[1]); } for (int i = 2; i < (1 << w); i++) { ep4_add(t0[i], t0[i - 1], t0[1]); } ep4_set_infty(t1[0]); ep4_copy(t1[1], q); if (bn_sign(m) == RLC_NEG) { ep4_neg(t1[1], t1[1]); } for (int i = 1; i < (1 << w); i++) { ep4_add(t1[i], t1[i - 1], t1[1]); } for (int i = 0; i < (1 << w); i++) { for (int j = 0; j < (1 << w); j++) { ep4_add(t[(i << w) + j], t0[i], t1[j]); } } #if defined(EP_MIXED) ep4_norm_sim(t + 1, t + 1, (1 << (EP_WIDTH)) - 1); #endif l0 = l1 = RLC_CEIL(2 * RLC_FP_BITS, w); bn_rec_win(w0, &l0, k, w); bn_rec_win(w1, &l1, m, w); for (int i = l0; i < l1; i++) { w0[i] = 0; } for (int i = l1; i < l0; i++) { w1[i] = 0; } ep4_set_infty(r); for (int i = RLC_MAX(l0, l1) - 1; i >= 0; i--) { for (int j = 0; j < w; j++) { ep4_dbl(r, r); } ep4_add(r, r, t[(w0[i] << w) + w1[i]]); } ep4_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(n); for (int i = 0; i < (1 << w); i++) { ep4_free(t0[i]); ep4_free(t1[i]); } for (int i = 0; i < (1 << EP_WIDTH); i++) { ep4_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_mul_sim_joint(ep4_t r, const ep4_t p, const bn_t k, const ep4_t q, const bn_t m) { ep4_t t[5]; int i, l, u_i, offset; int8_t jsf[4 * (RLC_FP_BITS + 1)]; if (bn_is_zero(k) || ep4_is_infty(p)) { ep4_mul(r, q, m); return; } if (bn_is_zero(m) || ep4_is_infty(q)) { ep4_mul(r, p, k); return; } RLC_TRY { for (i = 0; i < 5; i++) { ep4_null(t[i]); ep4_new(t[i]); } ep4_set_infty(t[0]); ep4_copy(t[1], q); if (bn_sign(m) == RLC_NEG) { ep4_neg(t[1], t[1]); } ep4_copy(t[2], p); if (bn_sign(k) == RLC_NEG) { ep4_neg(t[2], t[2]); } ep4_add(t[3], t[2], t[1]); ep4_sub(t[4], t[2], t[1]); #if defined(EP_MIXED) ep4_norm_sim(t + 3, t + 3, 2); #endif l = 4 * (RLC_FP_BITS + 1); bn_rec_jsf(jsf, &l, k, m); ep4_set_infty(r); offset = RLC_MAX(bn_bits(k), bn_bits(m)) + 1; for (i = l - 1; i >= 0; i--) { ep4_dbl(r, r); if (jsf[i] != 0 && jsf[i] == -jsf[i + offset]) { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep4_sub(r, r, t[4]); } else { ep4_add(r, r, t[4]); } } else { u_i = jsf[i] * 2 + jsf[i + offset]; if (u_i < 0) { ep4_sub(r, r, t[-u_i]); } else { ep4_add(r, r, t[u_i]); } } } ep4_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < 5; i++) { ep4_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static void ep4_mul_sim_plain(ep4_t r, const ep4_t p, const bn_t k, const ep4_t q, const bn_t m, ep4_t *t) { int i, l, l0, l1, n0, n1, w, gen; int8_t naf0[2 * RLC_FP_BITS + 1], naf1[2 * RLC_FP_BITS + 1], *_k, *_m; ep4_t t0[1 << (EP_WIDTH - 2)]; ep4_t t1[1 << (EP_WIDTH - 2)]; RLC_TRY { gen = (t == NULL ? 0 : 1); if (!gen) { for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_null(t0[i]); ep4_new(t0[i]); } ep4_tab(t0, p, EP_WIDTH); t = (ep4_t *)t0; } /* Prepare the precomputation table. */ for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_null(t1[i]); ep4_new(t1[i]); } /* Compute the precomputation table. */ ep4_tab(t1, q, EP_WIDTH); /* Compute the w-TNAF representation of k. */ if (gen) { w = EP_DEPTH; } else { w = EP_WIDTH; } l0 = l1 = 2 * RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, k, w); bn_rec_naf(naf1, &l1, m, EP_WIDTH); l = RLC_MAX(l0, l1); _k = naf0 + l - 1; _m = naf1 + l - 1; if (bn_sign(k) == RLC_NEG) { for (i = 0; i < l0; i++) { naf0[i] = -naf0[i]; } } if (bn_sign(m) == RLC_NEG) { for (i = 0; i < l1; i++) { naf1[i] = -naf1[i]; } } ep4_set_infty(r); for (i = l - 1; i >= 0; i--, _k--, _m--) { ep4_dbl(r, r); n0 = *_k; n1 = *_m; if (n0 > 0) { ep4_add(r, r, t[n0 / 2]); } if (n0 < 0) { ep4_sub(r, r, t[-n0 / 2]); } if (n1 > 0) { ep4_add(r, r, t1[n1 / 2]); } if (n1 < 0) { ep4_sub(r, r, t1[-n1 / 2]); } } /* Convert r to affine coordinates. */ ep4_norm(r, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { /* Free the precomputation tables. */ if (!gen) { for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_free(t0[i]); } } for (i = 0; i < (1 << (EP_WIDTH - 2)); i++) { ep4_free(t1[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_mul_sim_dig(ep4_t r, const ep4_t p[], const dig_t k[], int len) { ep4_t t; int max; ep4_null(t); max = util_bits_dig(k[0]); for (int i = 1; i < len; i++) { max = RLC_MAX(max, util_bits_dig(k[i])); } RLC_TRY { ep4_new(t); ep4_set_infty(t); for (int i = max - 1; i >= 0; i--) { ep4_dbl(t, t); for (int j = 0; j < len; j++) { if (k[j] & ((dig_t)1 << i)) { ep4_add(t, t, p[j]); } } } ep4_norm(r, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep4_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_write_bin(uint8_t *bin, int len, const ep4_t a, int pack) { ep4_t t; ep4_null(t); memset(bin, 0, len); if (ep4_is_infty(a)) { if (len < 1) { RLC_THROW(ERR_NO_BUFFER); return; } else { return; } } RLC_TRY { ep4_new(t); ep4_norm(t, a); if (len < 8 * RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); } else { bin[0] = 4; fp4_write_bin(bin + 1, 4 * RLC_FP_BYTES, t->x); fp4_write_bin(bin + 4 * RLC_FP_BYTES + 1, 4 * RLC_FP_BYTES, t->y); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { ep4_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void ep4_read_bin(ep4_t a, const uint8_t *bin, int len) { if (len == 1) { if (bin[0] == 0) { ep4_set_infty(a); return; } else { RLC_THROW(ERR_NO_BUFFER); return; } } if (len != (8 * RLC_FP_BYTES + 1)) { RLC_THROW(ERR_NO_BUFFER); return; } a->coord = BASIC; fp4_set_dig(a->z, 1); fp4_read_bin(a->x, bin + 1, 4 * RLC_FP_BYTES); if (len == 8 * RLC_FP_BYTES + 1) { if (bin[0] == 4) { fp4_read_bin(a->y, bin + 4 * RLC_FP_BYTES + 1, 4 * RLC_FP_BYTES); } else { RLC_THROW(ERR_NO_VALID); return; } } if (!ep4_on_curve(a)) { RLC_THROW(ERR_NO_VALID); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_exp_basic(fb_t c, const fb_t a, const bn_t b) { int i, l; fb_t r; if (bn_is_zero(b)) { fb_set_dig(c, 1); return; } fb_null(r); RLC_TRY { fb_new(r); l = bn_bits(b); fb_copy(r, a); for (i = l - 2; i >= 0; i--) { fb_sqr(r, r); if (bn_get_bit(b, i)) { fb_mul(r, r, a); } } if (bn_sign(b) == RLC_NEG) { fb_inv(c, r); } else { fb_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fb_free(r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_exp_slide(fb_t c, const fb_t a, const bn_t b) { fb_t t[1 << (FB_WIDTH - 1)], r; int i, j, l; uint8_t win[RLC_FB_BITS + 1]; fb_null(r); if (bn_is_zero(b)) { fb_set_dig(c, 1); return; } /* Initialize table. */ for (i = 0; i < (1 << (FB_WIDTH - 1)); i++) { fb_null(t[i]); } RLC_TRY { for (i = 0; i < (1 << (FB_WIDTH - 1)); i ++) { fb_new(t[i]); } fb_new(r); fb_copy(t[0], a); fb_sqr(r, a); /* Create table. */ for (i = 1; i < 1 << (FB_WIDTH - 1); i++) { fb_mul(t[i], t[i - 1], r); } fb_set_dig(r, 1); l = RLC_FB_BITS + 1; bn_rec_slw(win, &l, b, FB_WIDTH); for (i = 0; i < l; i++) { if (win[i] == 0) { fb_sqr(r, r); } else { for (j = 0; j < util_bits_dig(win[i]); j++) { fb_sqr(r, r); } fb_mul(r, r, t[win[i] >> 1]); } } if (bn_sign(b) == RLC_NEG) { fb_inv(c, r); } else { fb_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < (1 << (FB_WIDTH - 1)); i++) { fb_free(t[i]); } fb_free(r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_write_bin(uint8_t *bin, int len, const fb_t a) { bn_t t; bn_null(t); if (len != RLC_FB_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } RLC_TRY { bn_new(t); bn_read_raw(t, a, RLC_FB_DIGS); bn_write_bin(bin, len, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_read_str(fb_t a, const char *str, int len, int radix) { bn_t t; bn_null(t); if (!valid_radix(radix)) { RLC_THROW(ERR_NO_VALID); } RLC_TRY { bn_new(t); bn_read_str(t, str, len, radix); if (bn_bits(t) > RLC_FB_BITS) { RLC_THROW(ERR_NO_BUFFER); } fb_zero(a); dv_copy(a, t->dp, t->used); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static int log_radix(int radix) { int l = 0; while (radix > 0) { radix = radix / 2; l++; } return --l; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fb_get_bit(const fb_t a, int bit) { int d; RLC_RIP(bit, d, bit); return (a[d] >> bit) & 1; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_write_str(char *str, int len, const fb_t a, int radix) { fb_t t; int d, l, i, j; char c; fb_null(t); l = fb_size_str(a, radix); if (len < l) { RLC_THROW(ERR_NO_BUFFER); return; } len = l; l = log_radix(radix); if (!valid_radix(radix)) { RLC_THROW(ERR_NO_VALID); return; } if (fb_is_zero(a) == 1) { *str++ = '0'; *str = '\0'; return; } RLC_TRY { fb_new(t); fb_copy(t, a); j = 0; while (!fb_is_zero(t)) { d = t[0] % radix; fb_rshb_low(t, t, l); str[j] = util_conv_char(d); j++; } /* Reverse the digits of the string. */ i = 0; j = len - 2; while (i < j) { c = str[i]; str[i] = str[j]; str[j] = c; ++i; --j; } str[len - 1] = '\0'; } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fb_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_print(const fb_t a) { int i; /* Suppress possible unused parameter warning. */ (void)a; for (i = RLC_FB_DIGS - 1; i > 0; i--) { util_print_dig(a[i], 1); util_print(" "); } util_print_dig(a[0], 1); util_print("\n"); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_read_bin(fb_t a, const uint8_t *bin, int len) { bn_t t; bn_null(t); if (len != RLC_FB_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } RLC_TRY { bn_new(t); bn_read_bin(t, bin, len); fb_copy(a, t->dp); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_set_bit(fb_t a, int bit, int value) { int d; dig_t mask; RLC_RIP(bit, d, bit); mask = (dig_t)1 << bit; if (value == 1) { a[d] |= mask; } else { a[d] &= ~mask; } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fb_rand(fb_t a) { int bits, digits; rand_bytes((uint8_t *)a, RLC_FB_DIGS * sizeof(dig_t)); RLC_RIP(bits, digits, RLC_FB_BITS); if (bits > 0) { dig_t mask = RLC_MASK(bits); a[RLC_FB_DIGS - 1] &= mask; } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
static int valid_radix(int radix) { while (radix > 0) { if (radix != 1 && radix % 2 == 1) return 0; radix = radix / 2; } return 1; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fb_bits(const fb_t a) { int i = RLC_FB_DIGS - 1; while (i >= 0 && a[i] == 0) { i--; } if (i > 0) { return (i << RLC_DIG_LOG) + util_bits_dig(a[i]); } else { return util_bits_dig(a[0]); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fb_size_str(const fb_t a, int radix) { bn_t t; int digits = 0; bn_null(t); if (!valid_radix(radix)) { RLC_THROW(ERR_NO_VALID); return 0; } RLC_TRY { bn_new(t); bn_read_raw(t, a, RLC_FB_DIGS); digits = bn_size_str(t, radix); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } return digits; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_exp_basic(fp_t c, const fp_t a, const bn_t b) { int i, l; fp_t r; fp_null(r); if (bn_is_zero(b)) { fp_set_dig(c, 1); return; } RLC_TRY { fp_new(r); l = bn_bits(b); fp_copy(r, a); for (i = l - 2; i >= 0; i--) { fp_sqr(r, r); if (bn_get_bit(b, i)) { fp_mul(r, r, a); } } if (bn_sign(b) == RLC_NEG) { fp_inv(c, r); } else { fp_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp_free(r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_exp_slide(fp_t c, const fp_t a, const bn_t b) { fp_t t[1 << (FP_WIDTH - 1)], r; int i, j, l; uint8_t win[RLC_FP_BITS + 1]; fp_null(r); if (bn_is_zero(b)) { fp_set_dig(c, 1); return; } /* Initialize table. */ for (i = 0; i < (1 << (FP_WIDTH - 1)); i++) { fp_null(t[i]); } RLC_TRY { for (i = 0; i < (1 << (FP_WIDTH - 1)); i ++) { fp_new(t[i]); } fp_new(r); fp_copy(t[0], a); fp_sqr(r, a); /* Create table. */ for (i = 1; i < 1 << (FP_WIDTH - 1); i++) { fp_mul(t[i], t[i - 1], r); } fp_set_dig(r, 1); l = RLC_FP_BITS + 1; bn_rec_slw(win, &l, b, FP_WIDTH); for (i = 0; i < l; i++) { if (win[i] == 0) { fp_sqr(r, r); } else { for (j = 0; j < util_bits_dig(win[i]); j++) { fp_sqr(r, r); } fp_mul(r, r, t[win[i] >> 1]); } } if (bn_sign(b) == RLC_NEG) { fp_inv(c, r); } else { fp_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < (1 << (FP_WIDTH - 1)); i++) { fp_free(t[i]); } fp_free(r); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_prime_set_pmers(const int *f, int len) { bn_t p, t; bn_null(p); bn_null(t); RLC_TRY { bn_new(p); bn_new(t); if (len >= RLC_TERMS) { RLC_THROW(ERR_NO_VALID); return; } bn_set_2b(p, f[len - 1]); for (int i = len - 2; i > 0; i--) { if (f[i] > 0) { bn_set_2b(t, f[i]); bn_add(p, p, t); } else { bn_set_2b(t, -f[i]); bn_sub(p, p, t); } } if (f[0] > 0) { bn_add_dig(p, p, f[0]); } else { bn_sub_dig(p, p, -f[0]); } #if FP_RDC == QUICK || !defined(STRIP) ctx_t *ctx = core_get(); for (int i = 0; i < len; i++) { ctx->sps[i] = f[i]; } ctx->sps[len] = 0; ctx->sps_len = len; #endif /* FP_RDC == QUICK */ fp_prime_set(p); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(p); bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fp_size_str(const fp_t a, int radix) { bn_t t; int digits = 0; bn_null(t); RLC_TRY { bn_new(t); fp_prime_back(t, a); digits = bn_size_str(t, radix); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } return digits; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_read_bin(fp_t a, const uint8_t *bin, int len) { bn_t t; bn_null(t); if (len != RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } RLC_TRY { bn_new(t); bn_read_bin(t, bin, len); /* Reject values out of bounds. */ if (bn_sign(t) == RLC_NEG || bn_cmp(t, &core_get()->prime) != RLC_LT) { RLC_THROW(ERR_NO_VALID); } else { if (bn_is_zero(t)) { fp_zero(a); } else { if (t->used == 1) { fp_prime_conv_dig(a, t->dp[0]); } else { fp_prime_conv(a, t); } } } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fp_get_bit(const fp_t a, int bit) { int d; RLC_RIP(bit, d, bit); return (a[d] >> bit) & 1; }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_read_str(fp_t a, const char *str, int len, int radix) { bn_t t; bn_null(t); RLC_TRY { bn_new(t); bn_read_str(t, str, len, radix); if (bn_is_zero(t)) { fp_zero(a); } else { if (t->used == 1) { fp_prime_conv_dig(a, t->dp[0]); if (bn_sign(t) == RLC_NEG) { fp_neg(a, a); } } else { fp_prime_conv(a, t); } } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
int fp_bits(const fp_t a) { int i = RLC_FP_DIGS - 1; while (i >= 0 && a[i] == 0) { i--; } if (i > 0) { return (i << RLC_DIG_LOG) + util_bits_dig(a[i]); } else { return util_bits_dig(a[0]); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_write_bin(uint8_t *bin, int len, const fp_t a) { bn_t t; bn_null(t); if (len != RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } RLC_TRY { bn_new(t); fp_prime_back(t, a); bn_write_bin(bin, len, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_write_str(char *str, int len, const fp_t a, int radix) { bn_t t; bn_null(t); RLC_TRY { bn_new(t); fp_prime_back(t, a); bn_write_str(str, len, t, radix); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp_set_bit(fp_t a, int bit, int value) { int d; dig_t mask; RLC_RIP(bit, d, bit); mask = (dig_t)1 << bit; if (value == 1) { a[d] |= mask; } else { a[d] &= ~mask; } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp8_exp_cyc(fp8_t c, const fp8_t a, const bn_t b) { fp8_t r, s, t[1 << (FP_WIDTH - 2)]; int i, l; int8_t naf[RLC_FP_BITS + 1], *k; if (bn_is_zero(b)) { return fp8_set_dig(c, 1); } fp8_null(r); fp8_null(s); RLC_TRY { fp8_new(r); fp8_new(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i ++) { fp8_null(t[i]); fp8_new(t[i]); } #if FP_WIDTH > 2 fp8_sqr_cyc(t[0], a); fp8_mul(t[1], t[0], a); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp8_mul(t[i], t[i - 1], t[0]); } #endif fp8_copy(t[0], a); l = RLC_FP_BITS + 1; fp8_set_dig(r, 1); bn_rec_naf(naf, &l, b, FP_WIDTH); k = naf + l - 1; for (i = l - 1; i >= 0; i--, k--) { fp8_sqr_cyc(r, r); if (*k > 0) { fp8_mul(r, r, t[*k / 2]); } if (*k < 0) { fp8_inv_cyc(s, t[-*k / 2]); fp8_mul(r, r, s); } } if (bn_sign(b) == RLC_NEG) { fp8_inv_cyc(c, r); } else { fp8_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp8_free(r); fp8_free(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i++) { fp8_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp2_exp_cyc(fp2_t c, const fp2_t a, const bn_t b) { fp2_t r, s, t[1 << (FP_WIDTH - 2)]; int i, l; int8_t naf[RLC_FP_BITS + 1], *k; if (bn_is_zero(b)) { return fp2_set_dig(c, 1); } fp2_null(r); fp2_null(s); RLC_TRY { fp2_new(r); fp2_new(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i ++) { fp2_null(t[i]); fp2_new(t[i]); } #if FP_WIDTH > 2 fp2_sqr(t[0], a); fp2_mul(t[1], t[0], a); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp2_mul(t[i], t[i - 1], t[0]); } #endif fp2_copy(t[0], a); l = RLC_FP_BITS + 1; fp2_set_dig(r, 1); bn_rec_naf(naf, &l, b, FP_WIDTH); k = naf + l - 1; for (i = l - 1; i >= 0; i--, k--) { fp2_sqr(r, r); if (*k > 0) { fp2_mul(r, r, t[*k / 2]); } if (*k < 0) { fp2_inv_cyc(s, t[-*k / 2]); fp2_mul(r, r, s); } } if (bn_sign(b) == RLC_NEG) { fp2_inv_cyc(c, r); } else { fp2_copy(c, r); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp2_free(r); fp2_free(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i++) { fp2_free(t[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp24_exp_cyc_sim(fp24_t e, const fp24_t a, const bn_t b, const fp24_t c, const bn_t d) { int i, l, n0, n1, l0, l1; int8_t naf0[RLC_FP_BITS + 1], naf1[RLC_FP_BITS + 1], *_k, *_m; fp24_t r, t0[1 << (EP_WIDTH - 2)]; fp24_t s, t1[1 << (EP_WIDTH - 2)]; if (bn_is_zero(b)) { return fp24_exp_cyc(e, c, d); } if (bn_is_zero(d)) { return fp24_exp_cyc(e, a, b); } fp24_null(r); fp24_null(s); RLC_TRY { fp24_new(r); fp24_new(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i ++) { fp24_null(t0[i]); fp24_null(t1[i]); fp24_new(t0[i]); fp24_new(t1[i]); } #if FP_WIDTH > 2 fp24_sqr(t0[0], a); fp24_mul(t0[1], t0[0], a); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp24_mul(t0[i], t0[i - 1], t0[0]); } fp24_sqr(t1[0], c); fp24_mul(t1[1], t1[0], c); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp24_mul(t1[i], t1[i - 1], t1[0]); } #endif fp24_copy(t0[0], a); fp24_copy(t1[0], c); l0 = l1 = RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, b, FP_WIDTH); bn_rec_naf(naf1, &l1, d, FP_WIDTH); l = RLC_MAX(l0, l1); if (bn_sign(b) == RLC_NEG) { for (i = 0; i < l0; i++) { naf0[i] = -naf0[i]; } } if (bn_sign(d) == RLC_NEG) { for (i = 0; i < l1; i++) { naf1[i] = -naf1[i]; } } _k = naf0 + l - 1; _m = naf1 + l - 1; fp24_set_dig(r, 1); for (i = l - 1; i >= 0; i--, _k--, _m--) { fp24_sqr(r, r); n0 = *_k; n1 = *_m; if (n0 > 0) { fp24_mul(r, r, t0[n0 / 2]); } if (n0 < 0) { fp24_inv_cyc(s, t0[-n0 / 2]); fp24_mul(r, r, s); } if (n1 > 0) { fp24_mul(r, r, t1[n1 / 2]); } if (n1 < 0) { fp24_inv_cyc(s, t1[-n1 / 2]); fp24_mul(r, r, s); } } fp24_copy(e, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp24_free(r); fp24_free(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i++) { fp24_free(t0[i]); fp24_free(t1[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp24_exp_cyc_sps(fp24_t c, const fp24_t a, const int *b, int len, int sign) { int i, j, k, w = len; fp24_t t, *u = RLC_ALLOCA(fp24_t, w); if (len == 0) { RLC_FREE(u); fp24_set_dig(c, 1); return; } fp24_null(t); RLC_TRY { if (u == NULL) { RLC_THROW(ERR_NO_MEMORY); } for (i = 0; i < w; i++) { fp24_null(u[i]); fp24_new(u[i]); } fp24_new(t); fp24_copy(t, a); if (b[0] == 0) { for (j = 0, i = 1; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp24_sqr_pck(t, t); } if (b[i] < 0) { fp24_inv_cyc(u[i - 1], t); } else { fp24_copy(u[i - 1], t); } } fp24_back_cyc_sim(u, u, w - 1); fp24_copy(c, a); for (i = 0; i < w - 1; i++) { fp24_mul(c, c, u[i]); } } else { for (j = 0, i = 0; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp24_sqr_pck(t, t); } if (b[i] < 0) { fp24_inv_cyc(u[i], t); } else { fp24_copy(u[i], t); } } fp24_back_cyc_sim(u, u, w); fp24_copy(c, u[0]); for (i = 1; i < w; i++) { fp24_mul(c, c, u[i]); } } if (sign == RLC_NEG) { fp24_inv_cyc(c, c); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < w; i++) { fp24_free(u[i]); } fp24_free(t); RLC_FREE(u); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp12_exp_cyc_sps(fp12_t c, const fp12_t a, const int *b, int len, int sign) { int i, j, k, w = len; fp12_t t, *u = RLC_ALLOCA(fp12_t, w); if (len == 0) { RLC_FREE(u); fp12_set_dig(c, 1); return; } fp12_null(t); RLC_TRY { if (u == NULL) { RLC_THROW(ERR_NO_MEMORY); } for (i = 0; i < w; i++) { fp12_null(u[i]); fp12_new(u[i]); } fp12_new(t); fp12_copy(t, a); if (b[0] == 0) { for (j = 0, i = 1; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp12_sqr_pck(t, t); } if (b[i] < 0) { fp12_inv_cyc(u[i - 1], t); } else { fp12_copy(u[i - 1], t); } } fp12_back_cyc_sim(u, u, w - 1); fp12_copy(c, a); for (i = 0; i < w - 1; i++) { fp12_mul(c, c, u[i]); } } else { for (j = 0, i = 0; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp12_sqr_pck(t, t); } if (b[i] < 0) { fp12_inv_cyc(u[i], t); } else { fp12_copy(u[i], t); } } fp12_back_cyc_sim(u, u, w); fp12_copy(c, u[0]); for (i = 1; i < w; i++) { fp12_mul(c, c, u[i]); } } if (sign == RLC_NEG) { fp12_inv_cyc(c, c); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < w; i++) { fp12_free(u[i]); } fp12_free(t); RLC_FREE(u); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp2_exp_cyc_sim(fp2_t e, const fp2_t a, const bn_t b, const fp2_t c, const bn_t d) { int i, l, n0, n1, l0, l1; int8_t naf0[RLC_FP_BITS + 1], naf1[RLC_FP_BITS + 1], *_k, *_m; fp2_t r, t0[1 << (EP_WIDTH - 2)]; fp2_t s, t1[1 << (EP_WIDTH - 2)]; if (bn_is_zero(b)) { return fp2_exp_cyc(e, c, d); } if (bn_is_zero(d)) { return fp2_exp_cyc(e, a, b); } fp2_null(r); fp2_null(s); RLC_TRY { fp2_new(r); fp2_new(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i ++) { fp2_null(t0[i]); fp2_null(t1[i]); fp2_new(t0[i]); fp2_new(t1[i]); } #if FP_WIDTH > 2 fp2_sqr(t0[0], a); fp2_mul(t0[1], t0[0], a); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp2_mul(t0[i], t0[i - 1], t0[0]); } fp2_sqr(t1[0], c); fp2_mul(t1[1], t1[0], c); for (int i = 2; i < (1 << (FP_WIDTH - 2)); i++) { fp2_mul(t1[i], t1[i - 1], t1[0]); } #endif fp2_copy(t0[0], a); fp2_copy(t1[0], c); l0 = l1 = RLC_FP_BITS + 1; bn_rec_naf(naf0, &l0, b, FP_WIDTH); bn_rec_naf(naf1, &l1, d, FP_WIDTH); l = RLC_MAX(l0, l1); if (bn_sign(b) == RLC_NEG) { for (i = 0; i < l0; i++) { naf0[i] = -naf0[i]; } } if (bn_sign(d) == RLC_NEG) { for (i = 0; i < l1; i++) { naf1[i] = -naf1[i]; } } _k = naf0 + l - 1; _m = naf1 + l - 1; fp2_set_dig(r, 1); for (i = l - 1; i >= 0; i--, _k--, _m--) { fp2_sqr(r, r); n0 = *_k; n1 = *_m; if (n0 > 0) { fp2_mul(r, r, t0[n0 / 2]); } if (n0 < 0) { fp2_inv_cyc(s, t0[-n0 / 2]); fp2_mul(r, r, s); } if (n1 > 0) { fp2_mul(r, r, t1[n1 / 2]); } if (n1 < 0) { fp2_inv_cyc(s, t1[-n1 / 2]); fp2_mul(r, r, s); } } fp2_copy(e, r); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp2_free(r); fp2_free(s); for (i = 0; i < (1 << (FP_WIDTH - 2)); i++) { fp2_free(t0[i]); fp2_free(t1[i]); } } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp48_exp_cyc_sps(fp48_t c, const fp48_t a, const int *b, int len, int sign) { int i, j, k, w = len; fp48_t t, *u = RLC_ALLOCA(fp48_t, w); if (len == 0) { RLC_FREE(u); fp48_set_dig(c, 1); return; } fp48_null(t); RLC_TRY { if (u == NULL) { RLC_THROW(ERR_NO_MEMORY); } for (i = 0; i < w; i++) { fp48_null(u[i]); fp48_new(u[i]); } fp48_new(t); fp48_copy(t, a); if (b[0] == 0) { for (j = 0, i = 1; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp48_sqr_pck(t, t); } if (b[i] < 0) { fp48_inv_cyc(u[i - 1], t); } else { fp48_copy(u[i - 1], t); } } fp48_back_cyc_sim(u, u, w - 1); fp48_copy(c, a); for (i = 0; i < w - 1; i++) { fp48_mul(c, c, u[i]); } } else { for (j = 0, i = 0; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp48_sqr_pck(t, t); } if (b[i] < 0) { fp48_inv_cyc(u[i], t); } else { fp48_copy(u[i], t); } } fp48_back_cyc_sim(u, u, w); fp48_copy(c, u[0]); for (i = 1; i < w; i++) { fp48_mul(c, c, u[i]); } } if (sign == RLC_NEG) { fp48_inv_cyc(c, c); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < w; i++) { fp48_free(u[i]); } fp48_free(t); RLC_FREE(u); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp54_exp_cyc_sps(fp54_t c, const fp54_t a, const int *b, int len, int sign) { int i, j, k, w = len; fp54_t t, *u = RLC_ALLOCA(fp54_t, w); if (len == 0) { RLC_FREE(u); fp54_set_dig(c, 1); return; } fp54_null(t); RLC_TRY { if (u == NULL) { RLC_THROW(ERR_NO_MEMORY); } for (i = 0; i < w; i++) { fp54_null(u[i]); fp54_new(u[i]); } fp54_new(t); fp54_copy(t, a); if (b[0] == 0) { for (j = 0, i = 1; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp54_sqr_pck(t, t); } if (b[i] < 0) { fp54_inv_cyc(u[i - 1], t); } else { fp54_copy(u[i - 1], t); } } fp54_back_cyc_sim(u, u, w - 1); fp54_copy(c, a); for (i = 0; i < w - 1; i++) { fp54_mul(c, c, u[i]); } } else { for (j = 0, i = 0; i < len; i++) { k = (b[i] < 0 ? -b[i] : b[i]); for (; j < k; j++) { fp54_sqr_pck(t, t); } if (b[i] < 0) { fp54_inv_cyc(u[i], t); } else { fp54_copy(u[i], t); } } fp54_back_cyc_sim(u, u, w); fp54_copy(c, u[0]); for (i = 1; i < w; i++) { fp54_mul(c, c, u[i]); } } if (sign == RLC_NEG) { fp54_inv_cyc(c, c); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { for (i = 0; i < w; i++) { fp54_free(u[i]); } fp54_free(t); RLC_FREE(u); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp12_exp_dig(fp12_t c, const fp12_t a, dig_t b) { bn_t _b; fp12_t t, v; int8_t u, naf[RLC_DIG + 1]; int l; if (b == 0) { fp12_set_dig(c, 1); return; } bn_null(_b); fp12_null(t); fp12_null(v); RLC_TRY { bn_new(_b); fp12_new(t); fp12_new(v); fp12_copy(t, a); if (fp12_test_cyc(a)) { fp12_inv_cyc(v, a); bn_set_dig(_b, b); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _b, 2); for (int i = bn_bits(_b) - 2; i >= 0; i--) { fp12_sqr_cyc(t, t); u = naf[i]; if (u > 0) { fp12_mul(t, t, a); } else if (u < 0) { fp12_mul(t, t, v); } } } else { for (int i = util_bits_dig(b) - 2; i >= 0; i--) { fp12_sqr(t, t); if (b & ((dig_t)1 << i)) { fp12_mul(t, t, a); } } } fp12_copy(c, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(_b); fp12_free(t); fp12_free(v); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp24_exp_dig(fp24_t c, const fp24_t a, dig_t b) { bn_t _b; fp24_t t, v; int8_t u, naf[RLC_DIG + 1]; int l; if (b == 0) { fp24_set_dig(c, 1); return; } bn_null(_b); fp24_null(t); fp24_null(v); RLC_TRY { bn_new(_b); fp24_new(t); fp24_new(v); fp24_copy(t, a); if (fp24_test_cyc(a)) { fp24_inv_cyc(v, a); bn_set_dig(_b, b); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _b, 2); for (int i = bn_bits(_b) - 2; i >= 0; i--) { fp24_sqr_cyc(t, t); u = naf[i]; if (u > 0) { fp24_mul(t, t, a); } else if (u < 0) { fp24_mul(t, t, v); } } } else { for (int i = util_bits_dig(b) - 2; i >= 0; i--) { fp24_sqr(t, t); if (b & ((dig_t)1 << i)) { fp24_mul(t, t, a); } } } fp24_copy(c, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(_b); fp24_free(t); fp24_free(v); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp48_exp_dig(fp48_t c, const fp48_t a, dig_t b) { bn_t _b; fp48_t t, v; int8_t u, naf[RLC_DIG + 1]; int l; if (b == 0) { fp48_set_dig(c, 1); return; } bn_null(_b); fp48_null(t); fp48_null(v); RLC_TRY { bn_new(_b); fp48_new(t); fp48_new(v); fp48_copy(t, a); if (fp48_test_cyc(a)) { fp48_inv_cyc(v, a); bn_set_dig(_b, b); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _b, 2); for (int i = bn_bits(_b) - 2; i >= 0; i--) { fp48_sqr_cyc(t, t); u = naf[i]; if (u > 0) { fp48_mul(t, t, a); } else if (u < 0) { fp48_mul(t, t, v); } } } else { for (int i = util_bits_dig(b) - 2; i >= 0; i--) { fp48_sqr(t, t); if (b & ((dig_t)1 << i)) { fp48_mul(t, t, a); } } } fp48_copy(c, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(_b); fp48_free(t); fp48_free(v); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp54_exp_dig(fp54_t c, const fp54_t a, dig_t b) { bn_t _b; fp54_t t, v; int8_t u, naf[RLC_DIG + 1]; int l; if (b == 0) { fp54_set_dig(c, 1); return; } bn_null(_b); fp54_null(t); fp54_null(v); RLC_TRY { bn_new(_b); fp54_new(t); fp54_new(v); fp54_copy(t, a); if (fp54_test_cyc(a)) { fp54_inv_cyc(v, a); bn_set_dig(_b, b); l = RLC_DIG + 1; bn_rec_naf(naf, &l, _b, 2); for (int i = bn_bits(_b) - 2; i >= 0; i--) { fp54_sqr_cyc(t, t); u = naf[i]; if (u > 0) { fp54_mul(t, t, a); } else if (u < 0) { fp54_mul(t, t, v); } } } else { for (int i = util_bits_dig(b) - 2; i >= 0; i--) { fp54_sqr(t, t); if (b & ((dig_t)1 << i)) { fp54_mul(t, t, a); } } } fp54_copy(c, t); } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { bn_free(_b); fp54_free(t); fp54_free(v); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp4_read_bin(fp4_t a, const uint8_t *bin, int len) { if (len != 4 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp2_read_bin(a[0], bin, 2 * RLC_FP_BYTES); fp2_read_bin(a[1], bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp6_read_bin(fp6_t a, const uint8_t *bin, int len) { if (len != 6 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp2_read_bin(a[0], bin, 2 * RLC_FP_BYTES); fp2_read_bin(a[1], bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); fp2_read_bin(a[2], bin + 4 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp2_read_bin(fp2_t a, const uint8_t *bin, int len) { if (len != RLC_FP_BYTES + 1 && len != 2 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } if (len == RLC_FP_BYTES + 1) { fp_read_bin(a[0], bin, RLC_FP_BYTES); fp_zero(a[1]); fp_set_bit(a[1], 0, bin[RLC_FP_BYTES]); fp2_upk(a, a); } if (len == 2 * RLC_FP_BYTES) { fp_read_bin(a[0], bin, RLC_FP_BYTES); fp_read_bin(a[1], bin + RLC_FP_BYTES, RLC_FP_BYTES); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp48_write_bin(uint8_t *bin, int len, const fp48_t a, int pack) { fp48_t t; fp48_null(t); RLC_TRY { fp48_new(t); if (pack) { if (len != 32 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp48_pck(t, a); fp8_write_bin(bin, 8 * RLC_FP_BYTES, a[0][1]); fp8_write_bin(bin + 8 * RLC_FP_BYTES, 8 * RLC_FP_BYTES, a[0][2]); fp8_write_bin(bin + 16 * RLC_FP_BYTES, 8 * RLC_FP_BYTES, a[1][0]); fp8_write_bin(bin + 24 * RLC_FP_BYTES, 8 * RLC_FP_BYTES, a[1][2]); } else { if (len != 48 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp24_write_bin(bin, 24 * RLC_FP_BYTES, a[0], 0); fp24_write_bin(bin + 24 * RLC_FP_BYTES, 24 * RLC_FP_BYTES, a[1], 0); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp48_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp8_write_bin(uint8_t *bin, int len, const fp8_t a) { if (len != 8 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp4_write_bin(bin, 4 * RLC_FP_BYTES, a[0]); fp4_write_bin(bin + 4 * RLC_FP_BYTES, 4 * RLC_FP_BYTES, a[1]); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp12_write_bin(uint8_t *bin, int len, const fp12_t a, int pack) { fp12_t t; fp12_null(t); RLC_TRY { fp12_new(t); if (pack) { if (len != 8 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp12_pck(t, a); fp2_write_bin(bin, 2 * RLC_FP_BYTES, a[0][1], 0); fp2_write_bin(bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[0][2], 0); fp2_write_bin(bin + 4 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[1][0], 0); fp2_write_bin(bin + 6 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[1][2], 0); } else { if (len != 12 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp6_write_bin(bin, 6 * RLC_FP_BYTES, a[0]); fp6_write_bin(bin + 6 * RLC_FP_BYTES, 6 * RLC_FP_BYTES, a[1]); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp12_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp24_write_bin(uint8_t *bin, int len, const fp24_t a, int pack) { fp24_t t; fp24_null(t); RLC_TRY { fp24_new(t); if (pack) { if (len != 16 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp24_pck(t, a); fp4_write_bin(bin, 4 * RLC_FP_BYTES, a[1][0]); fp4_write_bin(bin + 4 * RLC_FP_BYTES, 4 * RLC_FP_BYTES, a[1][1]); fp4_write_bin(bin + 8 * RLC_FP_BYTES, 4 * RLC_FP_BYTES, a[2][0]); fp4_write_bin(bin + 12 * RLC_FP_BYTES, 4 * RLC_FP_BYTES, a[2][1]); } else { if (len != 24 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp8_write_bin(bin, 8 * RLC_FP_BYTES, a[0]); fp8_write_bin(bin + 8 * RLC_FP_BYTES, 8 * RLC_FP_BYTES, a[1]); fp8_write_bin(bin + 16 * RLC_FP_BYTES, 8 * RLC_FP_BYTES, a[2]); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp24_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp12_read_bin(fp12_t a, const uint8_t *bin, int len) { if (len != 8 * RLC_FP_BYTES && len != 12 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } if (len == 8 * RLC_FP_BYTES) { fp2_zero(a[0][0]); fp2_read_bin(a[0][1], bin, 2 * RLC_FP_BYTES); fp2_read_bin(a[0][2], bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); fp2_read_bin(a[1][0], bin + 4 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); fp2_zero(a[1][1]); fp2_read_bin(a[1][2], bin + 6 * RLC_FP_BYTES, 2 * RLC_FP_BYTES); fp12_back_cyc(a, a); } if (len == 12 * RLC_FP_BYTES) { fp6_read_bin(a[0], bin, 6 * RLC_FP_BYTES); fp6_read_bin(a[1], bin + 6 * RLC_FP_BYTES, 6 * RLC_FP_BYTES); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp2_write_bin(uint8_t *bin, int len, const fp2_t a, int pack) { fp2_t t; fp2_null(t); RLC_TRY { fp2_new(t); if (pack && fp2_test_cyc(a)) { if (len < RLC_FP_BYTES + 1) { RLC_THROW(ERR_NO_BUFFER); return; } else { fp2_pck(t, a); fp_write_bin(bin, RLC_FP_BYTES, t[0]); bin[RLC_FP_BYTES] = fp_get_bit(t[1], 0); } } else { if (len < 2 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } else { fp_write_bin(bin, RLC_FP_BYTES, a[0]); fp_write_bin(bin + RLC_FP_BYTES, RLC_FP_BYTES, a[1]); } } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp2_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp9_read_bin(fp9_t a, const uint8_t *bin, int len) { if (len != 9 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp3_read_bin(a[0], bin, 3 * RLC_FP_BYTES); fp3_read_bin(a[1], bin + 3 * RLC_FP_BYTES, 3 * RLC_FP_BYTES); fp3_read_bin(a[2], bin + 6 * RLC_FP_BYTES, 3 * RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp4_write_bin(uint8_t *bin, int len, const fp4_t a) { if (len != 4 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp2_write_bin(bin, 2 * RLC_FP_BYTES, a[0], 0); fp2_write_bin(bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[1], 0); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp9_write_bin(uint8_t *bin, int len, const fp9_t a) { if (len != 9 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp3_write_bin(bin, 3 * RLC_FP_BYTES, a[0]); fp3_write_bin(bin + 3 * RLC_FP_BYTES, 3 * RLC_FP_BYTES, a[1]); fp3_write_bin(bin + 6 * RLC_FP_BYTES, 3 * RLC_FP_BYTES, a[2]); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp18_write_bin(uint8_t *bin, int len, const fp18_t a) { if (len != 18 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp9_write_bin(bin, 9 * RLC_FP_BYTES, a[0]); fp9_write_bin(bin + 9 * RLC_FP_BYTES, 9 * RLC_FP_BYTES, a[1]); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp24_read_bin(fp24_t a, const uint8_t *bin, int len) { if (len != 16 * RLC_FP_BYTES && len != 24 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } if (len == 16 * RLC_FP_BYTES) { fp4_zero(a[0][0]); fp4_zero(a[0][1]); fp4_read_bin(a[1][0], bin, 4 * RLC_FP_BYTES); fp4_read_bin(a[1][1], bin + 4 * RLC_FP_BYTES, 4 * RLC_FP_BYTES); fp4_read_bin(a[2][0], bin + 8 * RLC_FP_BYTES, 4 * RLC_FP_BYTES); fp4_read_bin(a[2][1], bin + 12 * RLC_FP_BYTES, 4 * RLC_FP_BYTES); fp24_back_cyc(a, a); } if (len == 24 * RLC_FP_BYTES) { fp8_read_bin(a[0], bin, 8 * RLC_FP_BYTES); fp8_read_bin(a[1], bin + 8 * RLC_FP_BYTES, 8 * RLC_FP_BYTES); fp8_read_bin(a[2], bin + 16 * RLC_FP_BYTES, 8 * RLC_FP_BYTES); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp6_write_bin(uint8_t *bin, int len, const fp6_t a) { if (len != 6 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp2_write_bin(bin, 2 * RLC_FP_BYTES, a[0], 0); fp2_write_bin(bin + 2 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[1], 0); fp2_write_bin(bin + 4 * RLC_FP_BYTES, 2 * RLC_FP_BYTES, a[2], 0); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp54_read_bin(fp54_t a, const uint8_t *bin, int len) { if (len != 36 * RLC_FP_BYTES && len != 54 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } if (len == 36 * RLC_FP_BYTES) { fp9_zero(a[0][0]); fp9_zero(a[0][1]); fp9_read_bin(a[1][0], bin, 9 * RLC_FP_BYTES); fp9_read_bin(a[1][1], bin + 9 * RLC_FP_BYTES, 9 * RLC_FP_BYTES); fp9_read_bin(a[2][0], bin + 18 * RLC_FP_BYTES, 9 * RLC_FP_BYTES); fp9_read_bin(a[2][1], bin + 27 * RLC_FP_BYTES, 9 * RLC_FP_BYTES); fp54_back_cyc(a, a); } if (len == 54 * RLC_FP_BYTES) { fp18_read_bin(a[0], bin, 18 * RLC_FP_BYTES); fp18_read_bin(a[1], bin + 18 * RLC_FP_BYTES, 18 * RLC_FP_BYTES); fp18_read_bin(a[2], bin + 36 * RLC_FP_BYTES, 18 * RLC_FP_BYTES); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp8_read_bin(fp8_t a, const uint8_t *bin, int len) { if (len != 8 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp4_read_bin(a[0], bin, 4 * RLC_FP_BYTES); fp4_read_bin(a[1], bin + 4 * RLC_FP_BYTES, 4 * RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp18_read_bin(fp18_t a, const uint8_t *bin, int len) { if (len != 18 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp9_read_bin(a[0], bin, 9 * RLC_FP_BYTES); fp9_read_bin(a[1], bin + 9 * RLC_FP_BYTES, 9 * RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp48_read_bin(fp48_t a, const uint8_t *bin, int len) { if (len != 32 * RLC_FP_BYTES && len != 48 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } if (len == 32 * RLC_FP_BYTES) { fp8_zero(a[0][0]); fp8_read_bin(a[0][1], bin, 8 * RLC_FP_BYTES); fp8_read_bin(a[0][2], bin + 8 * RLC_FP_BYTES, 8 * RLC_FP_BYTES); fp8_read_bin(a[1][0], bin + 16 * RLC_FP_BYTES, 8 * RLC_FP_BYTES); fp8_zero(a[1][1]); fp8_read_bin(a[1][2], bin + 24 * RLC_FP_BYTES, 8 * RLC_FP_BYTES); fp48_back_cyc(a, a); } if (len == 48 * RLC_FP_BYTES) { fp24_read_bin(a[0], bin, 24 * RLC_FP_BYTES); fp24_read_bin(a[1], bin + 24 * RLC_FP_BYTES, 24 * RLC_FP_BYTES); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp54_write_bin(uint8_t *bin, int len, const fp54_t a, int pack) { fp54_t t; fp54_null(t); RLC_TRY { fp54_new(t); if (pack) { if (len != 36 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp54_pck(t, a); fp9_write_bin(bin, 9 * RLC_FP_BYTES, a[1][0]); fp9_write_bin(bin + 9 * RLC_FP_BYTES, 9 * RLC_FP_BYTES, a[1][1]); fp9_write_bin(bin + 18 * RLC_FP_BYTES, 9 * RLC_FP_BYTES, a[2][0]); fp9_write_bin(bin + 27 * RLC_FP_BYTES, 9 * RLC_FP_BYTES, a[2][1]); } else { if (len != 54 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); } fp18_write_bin(bin, 18 * RLC_FP_BYTES, a[0]); fp18_write_bin(bin + 18 * RLC_FP_BYTES, 18 * RLC_FP_BYTES, a[1]); fp18_write_bin(bin + 36 * RLC_FP_BYTES, 18 * RLC_FP_BYTES, a[2]); } } RLC_CATCH_ANY { RLC_THROW(ERR_CAUGHT); } RLC_FINALLY { fp54_free(t); } }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp3_read_bin(fp3_t a, const uint8_t *bin, int len) { if (len != 3 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp_read_bin(a[0], bin, RLC_FP_BYTES); fp_read_bin(a[1], bin + RLC_FP_BYTES, RLC_FP_BYTES); fp_read_bin(a[2], bin + 2 * RLC_FP_BYTES, RLC_FP_BYTES); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void fp3_write_bin(uint8_t *bin, int len, const fp3_t a) { if (len != 3 * RLC_FP_BYTES) { RLC_THROW(ERR_NO_BUFFER); return; } fp_write_bin(bin, RLC_FP_BYTES, a[0]); fp_write_bin(bin + RLC_FP_BYTES, RLC_FP_BYTES, a[1]); fp_write_bin(bin + 2 * RLC_FP_BYTES, RLC_FP_BYTES, a[2]); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable
void md_map_b2s256(uint8_t *hash, const uint8_t *msg, int len) { memset(hash, 0, RLC_MD_LEN_B2S256); blake2s(hash, RLC_MD_LEN_B2S256, msg, len, NULL, 0); }
0
C
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
https://cwe.mitre.org/data/definitions/190.html
vulnerable