Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3694362ybv; Mon, 10 Feb 2020 04:51:23 -0800 (PST) X-Google-Smtp-Source: APXvYqw46pAKEKwyTvxm06bqKs7B4rvWb8BQ5t3y5c+baAZIQT8kQLBoYA90OLXVwD64kHuEPTTv X-Received: by 2002:a05:6830:1188:: with SMTP id u8mr943756otq.274.1581339083520; Mon, 10 Feb 2020 04:51:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581339083; cv=none; d=google.com; s=arc-20160816; b=003KisD3w7AWq/mVPscCpQo9Sygu6sLUdjhEiwMTM9pllgY2YHA5i/xBoU5gWWgYA3 PeMnS3yEuRQ5jWTLijIaVc8w8PJQAQetnRAzT1gI1Qkccdq3vfWLIfWwZIR6X9YlBLbv QZ8n6oeWoaP3VVTrrcyHE7O3S+DSzWiiide3x/JKhxg2k+eDqhbUTFYLEjrY0DNzGAYE KMCuHB1q6Q91VEn9Mns/xUNUiNWb/OOKmBTijz00tDPCcJS4/TW08At40n7GDAp2Vsme zIdqAX8B+lbt9uLYQjRUQODgFxn9LZKnMPYFevOe/G0S/O1sY41nhFVOIbLfPOu27SGF Pa/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jnfon0WLR9dlJSA+seDjhZhjcxIGorrBkv3hu6igEGI=; b=mxm+hPZ8c1myG/z67Udo3VLs2id0koa3NfvWaAG509ZTazBAsi0phcFCEK1s1ObE+h zBxnhh2RXDuIdi5ewsPL+4tTaNwjbgHh2owh1aQy14x0KmlFRXFc+T78/Aj7A6D6d/ui YuOihvUYDROtsn4UPZo0Gf20fqBDqIdWIcoTUoCaw3hYkGa9gD383bK3MOCRBK7QGpnH CgC77A3UN0bV8fMshapfIj8OsxZ9McVHvL+kr2uLcvs4xnfpwklV8oQVGYzor3luWuaB 89dd27dxwJvWruA7GcpGZoYfordMND7u4XpldYr50GtXXI3/3/5fxzKVdssJp6vO5PEH Eh6g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QTTokeqB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i25si108600oii.259.2020.02.10.04.51.11; Mon, 10 Feb 2020 04:51:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QTTokeqB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730538AbgBJMn7 (ORCPT + 99 others); Mon, 10 Feb 2020 07:43:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:40016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728523AbgBJMkS (ORCPT ); Mon, 10 Feb 2020 07:40:18 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B6C7520661; Mon, 10 Feb 2020 12:40:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338417; bh=EtqAip2wnqvoXOp3+xaMnhpjYdXXYLsB5O4YTrNPBjs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QTTokeqB0vIu/BU2w55ZnrN7GSlsF7Gu/etS4zcOBLnmuyhdkAYTk9tHAfXaWuZRq dXtAZ7dqwWql21AKoYO5SXcwep0Dk0GH9M8C54Kt/L9/cHFN6zGbxBhDmsgZqwlpBx VqwefaYO6AyOXlTWOloj/Wa6pl6QhViu7c+Gyg1g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gilad Ben-Yossef , Herbert Xu Subject: [PATCH 5.5 116/367] crypto: ccree - fix AEAD decrypt auth fail Date: Mon, 10 Feb 2020 04:30:29 -0800 Message-Id: <20200210122435.326007380@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gilad Ben-Yossef commit 2a6bc713f1cef32e39e3c4e6f2e1a9849da6379c upstream. On AEAD decryption authentication failure we are suppose to zero out the output plaintext buffer. However, we've missed skipping the optional associated data that may prefix the ciphertext. This commit fixes this issue. Signed-off-by: Gilad Ben-Yossef Fixes: e88b27c8eaa8 ("crypto: ccree - use std api sg_zero_buffer") Cc: stable@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccree/cc_aead.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/crypto/ccree/cc_aead.c +++ b/drivers/crypto/ccree/cc_aead.c @@ -237,7 +237,7 @@ static void cc_aead_complete(struct devi * revealed the decrypted message --> zero its memory. */ sg_zero_buffer(areq->dst, sg_nents(areq->dst), - areq->cryptlen, 0); + areq->cryptlen, areq->assoclen); err = -EBADMSG; } /*ENCRYPT*/