Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1950969ybz; Sat, 2 May 2020 11:28:48 -0700 (PDT) X-Google-Smtp-Source: APiQypKlca2bvBIeim+bhsd+1ZDqGT3rXhGgkpNEYhzdNaZ13hIWeD1fQt0BJOMqqHw/7D7T1HDd X-Received: by 2002:aa7:d718:: with SMTP id t24mr8322102edq.20.1588444128042; Sat, 02 May 2020 11:28:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588444128; cv=none; d=google.com; s=arc-20160816; b=ffWBrRr7xaCSuPvKKDSEdCV1cgz8v62icLQXrO/erGy/LwVUs+FgdH8QsiU+o7got7 cBy6yt3t+IjXdxqYTXkM35KEuS0+qDomaaKukJcmun7+f4twdL+GzTpviUiPiHIld+mM 9BaQEqvUtHfHjUUrs5iZt8KcSUugkvWGGGxnIz50d1vxmHpIheaZND6eYJmsydmHDa21 oZ5k3F0JL5+74yWMwYtXvBEmdVtbPn8tlcvOOATR3O3SxSJl7R8BBlBvUfzy3nGkjun4 wEHPnRoN0dr2pwXkD3qHz+5Me7cbUfut9r1e0tD5AqnhYse1Ikzqys5biy+MTxUlfJHT 2z5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=S6GdpuNr/GXBU/YB0u3bmd4AYjf38cJJlariyrrDLx0=; b=QWt3n4E6b7xnJaidvD1AlxMfAfJ5aXrSugl4keFToAGuYdRPNyyodWOsinbrvs3TT9 vvOMp2HxkmFnyNdbDkP6p/8X/0ccdtw7S/BdcLPaDS9BUMJhJmod6Eycr4qH0YeohiYf SGGvUJBm2ab4omCJLuSzOk3uxOtaJnlpjZALAr7L9xYrKzA/gq9nUrNMKUuva+huGaDd nnJFFfTASyrdQVYJAGe5xG/dOjsdTEBe38voqdxy30kLM/2HZi5iZUm7L6avgio4tPdA kqCPJ0WU1I8/t/tIInXPL8ARb5et9E8UxsvMHOWJcWSqfLyaBrjT68N0c3mOu7iDZjfm +LiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=N3ixzjM7; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j13si4005417edt.371.2020.05.02.11.28.11; Sat, 02 May 2020 11:28:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=N3ixzjM7; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728419AbgEBS2I (ORCPT + 99 others); Sat, 2 May 2020 14:28:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:54608 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728415AbgEBS2I (ORCPT ); Sat, 2 May 2020 14:28:08 -0400 Received: from sol.hsd1.ca.comcast.net (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DEBB20757; Sat, 2 May 2020 18:28:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588444087; bh=cCmn2mCi34UzXJr2dq7JnXx4lYXQMsRd9Knm/QvGdQE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=N3ixzjM7pKpsC+3fxs/xq6sFiJoJ+QN3bIzuUU8aTYcvqONZhBlRY9jiCYBW61Zb9 8LK9f3dhwzHlGceUj3qRvIKuDZOwGr4EupJXe9ZUG3xiYdGYxg8KV0bebrM7NKFU0L cjKE09fnzlGvcQ1fOsRdM7Zkbpd91PFj4vyGLmZ8= From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org, "Jason A . Donenfeld" , Theodore Ts'o , Paolo Abeni , mptcp@lists.01.org Subject: [PATCH 1/7] mptcp: use SHA256_BLOCK_SIZE, not SHA_MESSAGE_BYTES Date: Sat, 2 May 2020 11:24:21 -0700 Message-Id: <20200502182427.104383-2-ebiggers@kernel.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200502182427.104383-1-ebiggers@kernel.org> References: <20200502182427.104383-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers In preparation for naming the SHA-1 stuff in properly and moving it to a more appropriate header, fix the HMAC-SHA256 code in mptcp_crypto_hmac_sha() to use SHA256_BLOCK_SIZE instead of "SHA_MESSAGE_BYTES" which is actually the SHA-1 block size. (Fortunately these are both 64 bytes, so this wasn't a "real" bug...) Cc: Paolo Abeni Cc: mptcp@lists.01.org Signed-off-by: Eric Biggers --- net/mptcp/crypto.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/net/mptcp/crypto.c b/net/mptcp/crypto.c index c151628bd4161a..81b06d875f9249 100644 --- a/net/mptcp/crypto.c +++ b/net/mptcp/crypto.c @@ -61,7 +61,7 @@ void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) put_unaligned_be64(key2, key2be); /* Generate key xored with ipad */ - memset(input, 0x36, SHA_MESSAGE_BYTES); + memset(input, 0x36, SHA256_BLOCK_SIZE); for (i = 0; i < 8; i++) input[i] ^= key1be[i]; for (i = 0; i < 8; i++) @@ -78,7 +78,7 @@ void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) sha256_final(&state, &input[SHA256_BLOCK_SIZE]); /* Prepare second part of hmac */ - memset(input, 0x5C, SHA_MESSAGE_BYTES); + memset(input, 0x5C, SHA256_BLOCK_SIZE); for (i = 0; i < 8; i++) input[i] ^= key1be[i]; for (i = 0; i < 8; i++) -- 2.26.2