Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp830508ybt; Fri, 19 Jun 2020 15:08:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxyR4tYmQ+HZnB/2xfbm59XJw2QXdc7fB4ee8Trn6sBUE/mBHKsB1ZnRB1d6x/tKiuQ+X/n X-Received: by 2002:a05:6402:128b:: with SMTP id w11mr5218460edv.377.1592604483496; Fri, 19 Jun 2020 15:08:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592604483; cv=none; d=google.com; s=arc-20160816; b=b13xULaSF77Bc5iyZl7ZkRIUhLf1dPbDTfXgesdxwFmySkH0ra75SKkNeu6pVeARIy +k1h9u8GNI1PL4ZG2QutNQvfwUJ6uE+aB/Fq/KSqt6YSX3SGRfy0lML7jFyWse1XYsJe srSWlHkzR46iMt/HyPfjiTaqHbUao08nstpx2ixpx/qyZL0GLhSWZpcyTlZGQAKwEXao PhUJURNt1CsQCk8hbOYU9tfsSc2gj2K1CrYCZp/A5VWuVnghUcBTkJZklEaVmB42yW+1 FOAbN8TY+6igVoInSPqPq9ZuiGf5P6k1gtulrZxAIMkG0AOKhy+QrEdF7AqeEt+LIJGg JjTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DzGBIbkxdw0DQwRMqnKHSj9Scv41gywtWHJqfvEbqew=; b=KZfOoz/jL1cNTGmgowAgmienuhcDZBJGhsxVsonmzatRERv2DMzqgY0CwOZecQ3GrF ekgQ0z5twmvHypk8zdttntwEDsqBKvJL7AHDcpUFTwP0uz1u90kDSPm2iUYXUsRtiWxu KpmWfg0o+tZAy8I8Jh9x0Ayv49bNAcpp7kZccKCD2qTwOwWoS/JieMTyGJJukH7nlSOL qZUX6McLr5cFN7wwnjOM7oczJk3cesEYXCnk6FQz/diylEXK8ElmB/My5Sr8l9nRG1j7 rHid2xssGgQEK3HALYIyyWtm2G5mSDlCvynHIBmPnsw+xrpFJ6WJR7GNG1nRjJy2LYGs OyaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c6ilzuTf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de11si4820832edb.306.2020.06.19.15.07.41; Fri, 19 Jun 2020 15:08:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c6ilzuTf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393470AbgFSPZw (ORCPT + 99 others); Fri, 19 Jun 2020 11:25:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:54722 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393131AbgFSPXL (ORCPT ); Fri, 19 Jun 2020 11:23:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 48C882158C; Fri, 19 Jun 2020 15:23:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592580190; bh=WbypKLIbtcVOwzPyhZ4KFwIQhQ7w3yZw6d1nuMf9yqk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c6ilzuTfkf2AfTX2QFgCIHoYuEKg5y/tz6ZYWrgTERAYfE14zJgL84MLHcP6YYNDc QskIWtwZV8LRn0K2WwNT03g70rjV6eiulpKXPUAgrm41J/pvphrXBvBCbADLkl1PdR Xc+o/BZ3VThp8LfWwTn7hJmPclv1NozA9ad1+rQc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ayush Sawal , Devulapally Shiva Krishna , "David S. Miller" , Sasha Levin Subject: [PATCH 5.7 157/376] Crypto/chcr: fix for ccm(aes) failed test Date: Fri, 19 Jun 2020 16:31:15 +0200 Message-Id: <20200619141717.754197512@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141710.350494719@linuxfoundation.org> References: <20200619141710.350494719@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Devulapally Shiva Krishna [ Upstream commit 10b0c75d7bc19606fa9a62c8ab9180e95c0e0385 ] The ccm(aes) test fails when req->assoclen > ~240bytes. The problem is the value assigned to auth_offset is wrong. As auth_offset is unsigned char, it can take max value as 255. So fix it by making it unsigned int. Signed-off-by: Ayush Sawal Signed-off-by: Devulapally Shiva Krishna Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/crypto/chelsio/chcr_algo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/chelsio/chcr_algo.c b/drivers/crypto/chelsio/chcr_algo.c index 446fb896ee6d..6c2cd36048ea 100644 --- a/drivers/crypto/chelsio/chcr_algo.c +++ b/drivers/crypto/chelsio/chcr_algo.c @@ -2925,7 +2925,7 @@ static void fill_sec_cpl_for_aead(struct cpl_tx_sec_pdu *sec_cpl, unsigned int mac_mode = CHCR_SCMD_AUTH_MODE_CBCMAC; unsigned int rx_channel_id = reqctx->rxqidx / ctx->rxq_perchan; unsigned int ccm_xtra; - unsigned char tag_offset = 0, auth_offset = 0; + unsigned int tag_offset = 0, auth_offset = 0; unsigned int assoclen; if (get_aead_subtype(tfm) == CRYPTO_ALG_SUB_TYPE_AEAD_RFC4309) -- 2.25.1