aboutsummaryrefslogtreecommitdiff
path: root/aezref/aezv5
diff options
context:
space:
mode:
authorDaniel Schadt <kingdread@gmx.de>2025-04-16 19:21:29 +0200
committerDaniel Schadt <kingdread@gmx.de>2025-04-16 19:21:29 +0200
commit66814768f8c172d6996d037064924c908245a951 (patch)
treeb9230abc1372d258e6b12d7e02db2dae32647ba8 /aezref/aezv5
parent5e05745e93a126673f2ba96d1746637fe0a3f52d (diff)
downloadzears-66814768f8c172d6996d037064924c908245a951.tar.gz
zears-66814768f8c172d6996d037064924c908245a951.tar.bz2
zears-66814768f8c172d6996d037064924c908245a951.zip
fuzz against aez crate
I just want to ensure that we get the same encrypted values as the reference (which seems fine), but for some reason, I get a lot of crashes in aez: AddressSanitizer:DEADLYSIGNAL ================================================================= ==15467==ERROR: AddressSanitizer: SEGV on unknown address 0x7b34b0420000 (pc 0x6371fcd8f682 bp 0x7ffceb91abf0 sp 0x7ffceb91a950 T0) ==15467==The signal is caused by a READ memory access. #0 0x6371fcd8f682 in _mm_loadu_si128 /usr/lib/gcc/x86_64-pc-linux-gnu/14.2.1/include/emmintrin.h:706:10 #1 0x6371fcd8f682 in loadu /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/aez5-impls/aesni/encrypt.c:107:46 #2 0x6371fcd8f682 in cipher_aez_core /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/aez5-impls/aesni/encrypt.c:572:32 #3 0x6371fcd8d581 in aez::Aez::encrypt::h56048920113a17d9 /home/daniel/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/aez-0.0.7/src/lib.rs:118:13 The crash
Diffstat (limited to 'aezref/aezv5')
0 files changed, 0 insertions, 0 deletions