Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp460015ybl; Wed, 28 Aug 2019 00:04:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqxmJYLxMKm9t7MCcvipO8okqd/w/VXvmmyM9Veyn7XXeqHRiLRaLqxXBzA7dm9omC07Z9ty X-Received: by 2002:a17:90a:7f8a:: with SMTP id m10mr2745990pjl.64.1566975881949; Wed, 28 Aug 2019 00:04:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566975881; cv=none; d=google.com; s=arc-20160816; b=ZyGh99U2r8PlYBSHcaryv2prKHhWkm9hcyhgB9DroPCo/6MiG0wl4EyWt5rgFcMD1Y pWCjE8tRV4umrt+Y26BT78QToz2NgvDlH3GhAdP2LKNc0+6jYHl6Wuk8Nq7BfowiF08i mIjcEsd96woUibpa+ysXQBumgBbg6xM/8ZIHLaPi1PvU6Mk7xzke1+BYEeAVRtRurwaY JQWYZq6maMreuMIOnAN+ry9BYKaxNsYNjII12sYoIx2ZP1vlyM+SrggymKkJnPKtNb5o pF34ZUJSrkX/GRydZXLord1FCUgZEv+l65SrJjI9re9d4M358s8WXxdNNwYwWGFa1bdv BlNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=mnpDmT4RkBilrzyveAb7zee9qyWmNELjFqeWAqZXQj8=; b=Gj5ASuJ0wMytE/JcGuJuRg0PYpmlKWAXA4NFHl8jUGLoAL9TCAiQSTWd/mNap0w0mO hsVII0ypEggjwhx7waVfEj6JK5feyF7dfOA88987XYnldyfSJ68qog9X+kXcF/qyE5O8 TcMhZb0Cca4SB7qzV6EYZsmS1Jj7EEEDvUcjMaxuRrtcqXq2pKhnSZeCIina2kybWvok MAMgJrU/LNYEAZrWLZqWWhylL1M5G1PbVruBScTUHDRuzH32QAQ4DzXYp9SqCtboNXIv CEN3hNvLmgUFKJWhr6TPLMHOuGJCfBXw7/aDLCIFzpPdX4lRrjU9vkLNvltsB1DrWwnf EIqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cu3si1202033pjb.74.2019.08.28.00.04.21; Wed, 28 Aug 2019 00:04:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726209AbfH1HEM (ORCPT + 99 others); Wed, 28 Aug 2019 03:04:12 -0400 Received: from nbd.name ([46.4.11.11]:42278 "EHLO nbd.name" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726169AbfH1HEL (ORCPT ); Wed, 28 Aug 2019 03:04:11 -0400 Received: from p5dcfb7c9.dip0.t-ipconnect.de ([93.207.183.201] helo=[192.168.45.104]) by ds12 with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from ) id 1i2rzs-0004V3-3B; Wed, 28 Aug 2019 09:04:00 +0200 Subject: Re: [PATCH 5/5] crypto: mediatek: fix incorrect crypto key setting To: Vic Wu , Herbert Xu Cc: Ryder Lee , linux-kernel@vger.kernel.org, linux-mediatek@lists.infradead.org, linux-crypto@vger.kernel.org, "David S . Miller" , linux-arm-kernel@lists.infradead.org References: <20190828063716.22689-1-vic.wu@mediatek.com> <20190828063716.22689-5-vic.wu@mediatek.com> From: John Crispin Message-ID: Date: Wed, 28 Aug 2019 09:03:58 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20190828063716.22689-5-vic.wu@mediatek.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 28/08/2019 08:37, Vic Wu wrote: > Record crypto key to context during setkey and set the key to > transform state buffer in encrypt/decrypt process. > > Signed-off-by: Vic Wu Thanks for the fix ! Tested-by: John Crispin > --- > drivers/crypto/mediatek/mtk-aes.c | 11 ++++++----- > 1 file changed, 6 insertions(+), 5 deletions(-) > > diff --git a/drivers/crypto/mediatek/mtk-aes.c b/drivers/crypto/mediatek/mtk-aes.c > index 9eeb8b8d..05f21dc8 100644 > --- a/drivers/crypto/mediatek/mtk-aes.c > +++ b/drivers/crypto/mediatek/mtk-aes.c > @@ -107,6 +107,7 @@ struct mtk_aes_reqctx { > struct mtk_aes_base_ctx { > struct mtk_cryp *cryp; > u32 keylen; > + __le32 key[12]; > __le32 keymode; > > mtk_aes_fn start; > @@ -541,6 +542,8 @@ static int mtk_aes_handle_queue(struct mtk_cryp *cryp, u8 id, > backlog->complete(backlog, -EINPROGRESS); > > ctx = crypto_tfm_ctx(areq->tfm); > + /* Write key into state buffer */ > + memcpy(ctx->info.state, ctx->key, sizeof(ctx->key)); > > aes->areq = areq; > aes->ctx = ctx; > @@ -660,7 +663,7 @@ static int mtk_aes_setkey(struct crypto_ablkcipher *tfm, > } > > ctx->keylen = SIZE_IN_WORDS(keylen); > - mtk_aes_write_state_le(ctx->info.state, (const u32 *)key, keylen); > + mtk_aes_write_state_le(ctx->key, (const u32 *)key, keylen); > > return 0; > } > @@ -1093,10 +1096,8 @@ static int mtk_aes_gcm_setkey(struct crypto_aead *aead, const u8 *key, > if (err) > goto out; > > - /* Write key into state buffer */ > - mtk_aes_write_state_le(ctx->info.state, (const u32 *)key, keylen); > - /* Write key(H) into state buffer */ > - mtk_aes_write_state_be(ctx->info.state + ctx->keylen, data->hash, > + mtk_aes_write_state_le(ctx->key, (const u32 *)key, keylen); > + mtk_aes_write_state_be(ctx->key + ctx->keylen, data->hash, > AES_BLOCK_SIZE); > out: > kzfree(data);