Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4538913pxv; Tue, 20 Jul 2021 06:13:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOBv0yoimkqK6h/QCgCq8V+SKQiu23bhvsVaxASq7OEP5RhMlJfkJle3MQGL18N1dB0FQx X-Received: by 2002:a17:907:397:: with SMTP id ss23mr31922035ejb.470.1626786791582; Tue, 20 Jul 2021 06:13:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626786791; cv=none; d=google.com; s=arc-20160816; b=ofMddVBRlgr0F56J0gZVCQ+lXC8MeWciSTcTDNx51r6tY1iUEOVxro47VayROuMqhk tbPD+KFB4ZI1fKJQfnzHK6mslnZ7iXjIomPON0X/QmVS29Qmj66IqgGUSITgTXSXr3Ba iOHfnazKdw8cmvYYLo5WEpwSGIduxZB5VAKYLj14PBeIpWp64TQ58i5gdd6qdvXOgi/F pWE/45yBYcqfyC9bJZmUKM4/nYGmfsdOKK1Jh8PNHDZScvujRgaTYvEuxijWHch5bQ/f Im0aqn7xJV/rNXy3+Wg939RcWc5vIPhwefTa7wkUBX7xPltxNtxBo9GdPjqFbxBPrmqY KmaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:message-id:date:subject:cc:to:from; bh=5UjZKIapTwOfOsjySCAwyRXgIx8eJd12kmsCv5NOlY8=; b=N2E/Epti+m/XvJXB7DPiIPUxHZsZTkayOvcsTULTaRTyN06GJ7mog7xM06/F9C/rSU AzCsVx2fYGJjmi96c1rBDVywT70vNvAPVnbBtEU6C0EOehySblcCLE4Fr4QDy8qVm/XR 78ln/j6uHsX8KIp5vWJtbYzs9nTejOcMnrkcXZwvGE0V6+0CFmjU510LaEDCkjCaY2tm W1R9aK8nKawMKZlcUpbXGa9NOVTtlDFd6yyuTU3PspIdeIGrzhowxQYByk9uG72RRFk7 WerOuhZRQszIPZ9YgHQx5A/9SiJl7TqPKDuUvu/Ah5Q39jYWUPhBhPBIt63IgYo6GSXl BGWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m19si17563874ejn.748.2021.07.20.06.12.40; Tue, 20 Jul 2021 06:13:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236394AbhGTMbx (ORCPT + 99 others); Tue, 20 Jul 2021 08:31:53 -0400 Received: from smtpbg126.qq.com ([106.55.201.22]:26786 "EHLO smtpbg587.qq.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S232473AbhGTMba (ORCPT ); Tue, 20 Jul 2021 08:31:30 -0400 X-Greylist: delayed 506 seconds by postgrey-1.27 at vger.kernel.org; Tue, 20 Jul 2021 08:31:29 EDT X-QQ-mid: bizesmtp48t1626786092tzpucwkl Received: from localhost.localdomain (unknown [125.70.163.19]) by esmtp6.qq.com (ESMTP) with id ; Tue, 20 Jul 2021 21:01:30 +0800 (CST) X-QQ-SSF: 0100000000400080B000B00A0000000 X-QQ-FEAT: QiB9IW2pbdELcbxTZh3ALvEfJuv/cKfiB1Sgs9+zAap2LDX7uELg/zrJw7mXo LCArt9ZnyYCpMPfPv84aIAqD1PFZcLqJ1pAn7juYQxgZgvNAecBHTMMvZuUMvAjZIxTiwtF 3v3HeJgZP1hQuec3h1mof2XoCuV849eJ8C08AS+gQ3cCEEcXwcljoQf1kCZvXBWWjHukv6s 25JZ9nq32sO7m2hswDQUeQE6RMo2MipAFDuKzwyGmkrPSEOTjWwQ1cPPQ9JRgP1bdhspvK4 mTst0UxBugvg0ubqNmo8v6xk7sLBExUEUU+aP2B8re5w3hfUKLPnC1OOmwyks3cIcI/Q== X-QQ-GoodBg: 0 From: Jason Wang To: herbert@gondor.apana.org.au Cc: clabbe.montjoie@gmail.com, davem@davemloft.net, mripard@kernel.org, wens@csie.org, jernej.skrabec@gmail.com, colin.king@canonical.com, linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-sunxi@lists.linux.dev, linux-kernel@vger.kernel.org, Jason Wang Subject: [PATCH] crypto: sun8i-ss - Use kfree_sensitive Date: Tue, 20 Jul 2021 21:01:04 +0800 Message-Id: <20210720130104.42867-1-wangborong@cdjrlc.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:cdjrlc.com:qybgspam:qybgspam2 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The kfree_sensitive is a kernel API to clear sensitive information that should not be leaked to other future users of the same memory objects and free the memory. Its function is the same as the combination of memzero_explicit and kfree. Thus, we can replace the combination APIs with the single kfree_sensitive API. Signed-off-by: Jason Wang --- drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c b/drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c index 3191527928e4..246a6782674c 100644 --- a/drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c +++ b/drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c @@ -20,8 +20,7 @@ int sun8i_ss_prng_seed(struct crypto_rng *tfm, const u8 *seed, struct sun8i_ss_rng_tfm_ctx *ctx = crypto_rng_ctx(tfm); if (ctx->seed && ctx->slen != slen) { - memzero_explicit(ctx->seed, ctx->slen); - kfree(ctx->seed); + kfree_sensitive(ctx->seed); ctx->slen = 0; ctx->seed = NULL; } @@ -48,8 +47,7 @@ void sun8i_ss_prng_exit(struct crypto_tfm *tfm) { struct sun8i_ss_rng_tfm_ctx *ctx = crypto_tfm_ctx(tfm); - memzero_explicit(ctx->seed, ctx->slen); - kfree(ctx->seed); + kfree_sensitive(ctx->seed); ctx->seed = NULL; ctx->slen = 0; } @@ -167,9 +165,8 @@ int sun8i_ss_prng_generate(struct crypto_rng *tfm, const u8 *src, /* Update seed */ memcpy(ctx->seed, d + dlen, ctx->slen); } - memzero_explicit(d, todo); err_free: - kfree(d); + kfree_sensitive(d); return err; } -- 2.32.0