diff options
author | Daniel Schadt <kingdread@gmx.de> | 2025-04-16 19:21:29 +0200 |
---|---|---|
committer | Daniel Schadt <kingdread@gmx.de> | 2025-04-16 19:21:29 +0200 |
commit | 66814768f8c172d6996d037064924c908245a951 (patch) | |
tree | b9230abc1372d258e6b12d7e02db2dae32647ba8 /Spec.pdf | |
parent | 5e05745e93a126673f2ba96d1746637fe0a3f52d (diff) | |
download | zears-66814768f8c172d6996d037064924c908245a951.tar.gz zears-66814768f8c172d6996d037064924c908245a951.tar.bz2 zears-66814768f8c172d6996d037064924c908245a951.zip |
fuzz against aez crate
I just want to ensure that we get the same encrypted values as the
reference (which seems fine), but for some reason, I get a lot of
crashes in aez:
AddressSanitizer:DEADLYSIGNAL
=================================================================
==15467==ERROR: AddressSanitizer: SEGV on unknown address 0x7b34b0420000 (pc 0x6371fcd8f682 bp 0x7ffceb91abf0 sp 0x7ffceb91a950 T0)
==15467==The signal is caused by a READ memory access.
#0 0x6371fcd8f682 in _mm_loadu_si128 /usr/lib/gcc/x86_64-pc-linux-gnu/14.2.1/include/emmintrin.h:706:10
#1 0x6371fcd8f682 in loadu /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/aez5-impls/aesni/encrypt.c:107:46
#2 0x6371fcd8f682 in cipher_aez_core /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/aez5-impls/aesni/encrypt.c:572:32
#3 0x6371fcd8d581 in aez::Aez::encrypt::h56048920113a17d9 /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/src/lib.rs:118:13
The crash
Diffstat (limited to 'Spec.pdf')
0 files changed, 0 insertions, 0 deletions