- memset(&ctx, 0, sizeof(ctx));
- if (EVP_CipherInit(&ctx, sa->evp, secret, NULL, 0) < 0)
- (*ndo->ndo_warning)(ndo, "espkey init failed");
-
- p = ivoff;
- EVP_CipherInit(&ctx, NULL, NULL, p, 0);
- EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
- EVP_CIPHER_CTX_cleanup(&ctx);
- advance = ivoff - (const u_char *)esp + ivlen;
+ ctx = EVP_CIPHER_CTX_new();
+ if (ctx != NULL) {
+ if (EVP_CipherInit(ctx, sa->evp, secret, NULL, 0) < 0)
+ (*ndo->ndo_warning)(ndo, "espkey init failed");
+
+ p = ivoff;
+ EVP_CipherInit(ctx, NULL, NULL, p, 0);
+ len = ep - (p + ivlen);
+
+ /* We need a block size */
+ block_size = EVP_CIPHER_CTX_block_size(ctx);
+ /* We need the buffer size to be multiple of a block size */
+ output_buffer_size = len + (block_size - len % block_size);
+ output_buffer = (u_char *)calloc(output_buffer_size, sizeof(u_char));
+ /* EVP_Cipher output buffer should be different from the input one.
+ * Also it should be of size that is multiple of cipher block size. */
+ EVP_Cipher(ctx, output_buffer, p + ivlen, len);
+ EVP_CIPHER_CTX_free(ctx);
+ memcpy(p + ivlen, output_buffer, len);
+ free(output_buffer);
+ advance = ivoff - (const u_char *)esp + ivlen;
+ } else
+ advance = sizeof(struct newesp);