mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2025-01-27 00:04:47 +08:00
crypto: hisilicon/sec - fix auth key size error
[ Upstream commit45f5d0176d
] The authentication algorithm supports a maximum of 128-byte keys. The allocated key memory is insufficient. Fixes:2f072d75d1
("crypto: hisilicon - Add aead support on SEC2") Signed-off-by: Kai Ye <yekai13@huawei.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
parent
996be53de0
commit
c8b1baca99
@ -617,7 +617,7 @@ static int sec_auth_init(struct sec_ctx *ctx)
|
||||
{
|
||||
struct sec_auth_ctx *a_ctx = &ctx->a_ctx;
|
||||
|
||||
a_ctx->a_key = dma_alloc_coherent(ctx->dev, SEC_MAX_KEY_SIZE,
|
||||
a_ctx->a_key = dma_alloc_coherent(ctx->dev, SEC_MAX_AKEY_SIZE,
|
||||
&a_ctx->a_key_dma, GFP_KERNEL);
|
||||
if (!a_ctx->a_key)
|
||||
return -ENOMEM;
|
||||
@ -629,8 +629,8 @@ static void sec_auth_uninit(struct sec_ctx *ctx)
|
||||
{
|
||||
struct sec_auth_ctx *a_ctx = &ctx->a_ctx;
|
||||
|
||||
memzero_explicit(a_ctx->a_key, SEC_MAX_KEY_SIZE);
|
||||
dma_free_coherent(ctx->dev, SEC_MAX_KEY_SIZE,
|
||||
memzero_explicit(a_ctx->a_key, SEC_MAX_AKEY_SIZE);
|
||||
dma_free_coherent(ctx->dev, SEC_MAX_AKEY_SIZE,
|
||||
a_ctx->a_key, a_ctx->a_key_dma);
|
||||
}
|
||||
|
||||
|
@ -7,6 +7,7 @@
|
||||
#define SEC_AIV_SIZE 12
|
||||
#define SEC_IV_SIZE 24
|
||||
#define SEC_MAX_KEY_SIZE 64
|
||||
#define SEC_MAX_AKEY_SIZE 128
|
||||
#define SEC_COMM_SCENE 0
|
||||
#define SEC_MIN_BLOCK_SZ 1
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user