Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp106932pxv; Fri, 30 Jul 2021 20:28:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWzhl0LiNqPW08eP5CKjAwuctuno9bzqVuCLxrWhbWCIlBK0dRgXeklly5KcF1oW+Z1PgI X-Received: by 2002:a17:906:c304:: with SMTP id s4mr5772088ejz.346.1627702092897; Fri, 30 Jul 2021 20:28:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627702092; cv=none; d=google.com; s=arc-20160816; b=y6AsB3cdyiS49RI6TcMhegod9druW4oYkndvzCHs7sfC5BY2V3FoWkX+PIcpwgRbhB fIn346A1B5sR0SzDGg4en/oTwiDomsuoFVPegoHYVG726ariQi8uGX2562iJhbxA/App s4nQb2vud0YbsBQNfmvR4XAyAO2n2Tvx3ZlMaX6mMQuC/yI/GV7SBgprDpGCfyxTC0Dx GHmW8jhsHBT/7UbtRF0DHOHikQWYXyTWvO0m2iMP1dzd8iqFJzWNHyahToNwoWjWr9Wn ANP9DR4TlFgQAPSzkCtlJD0tFoyzBBNZsx0sgVwzX/BxcNiG94DH1g6ARocnsJtMekSM Yt3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=K+TEK2emv3axT/HyD0W1SAJIxVXjnoLJ2nfvQBlO31U=; b=S4N9WoYBeSWwx/VT8QkwZUCp9bv0eibw2LWguTcIJN/OY0SACcTfliFhsLE6e17ifW ++kNtpjOdaP8krZBg/EX29OPY6G9EeZhKBdzbqR031P4s8nDIQ38U4MTPIGu7+rSiGOH llQhwGielTyYmCfNCRyY28JWnlp6cCogKNrYsIeBxnn78NTKlixfhbaXctdtL/tyzx05 fLMafwZB6RTgEO9DeAYmx+HucJtSX4nZb76SxWBCfJEXpOOdnijk5SAnFZVTg8e/S/7j CFhectecUaFkwcyug0yw9bqSS5QrqgrT8jY+OkRxqj0E4rwBdFjVjpW28t3Y154mOW6H xsgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nd35si4437263ejc.274.2021.07.30.20.27.47; Fri, 30 Jul 2021 20:28:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235546AbhGaD1k (ORCPT + 99 others); Fri, 30 Jul 2021 23:27:40 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:12431 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231395AbhGaD1j (ORCPT ); Fri, 30 Jul 2021 23:27:39 -0400 Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Gc8kT6mnXzcjNw; Sat, 31 Jul 2021 11:24:01 +0800 (CST) Received: from dggpeml500012.china.huawei.com (7.185.36.15) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:30 +0800 Received: from huawei.com (10.69.192.56) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 31 Jul 2021 11:27:29 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH 3/5] crypto: hisilicon/sec - fix the max length of AAD for the CCM mode Date: Sat, 31 Jul 2021 11:26:34 +0800 Message-ID: <1627701996-4589-4-git-send-email-yekai13@huawei.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1627701996-4589-1-git-send-email-yekai13@huawei.com> References: <1627701996-4589-1-git-send-email-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Fix the maximum length of AAD for the CCM mode due to the hardware limited Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index b3ac1bd..010bde9 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -63,6 +63,7 @@ #define SEC_AUTH_CIPHER 0x1 #define SEC_MAX_MAC_LEN 64 #define SEC_MAX_AAD_LEN 65535 +#define SEC_MAX_CCM_AAD_LEN 65279 #define SEC_TOTAL_MAC_SZ (SEC_MAX_MAC_LEN * QM_Q_DEPTH) #define SEC_PBUF_SZ 512 @@ -2218,6 +2219,10 @@ static int sec_aead_spec_check(struct sec_ctx *ctx, struct sec_req *sreq) } if (c_mode == SEC_CMODE_CCM) { + if (unlikely(req->assoclen > SEC_MAX_CCM_AAD_LEN)) { + dev_err(dev, "CCM input aad parameter is too long!\n"); + return -EINVAL; + } ret = aead_iv_demension_check(req); if (ret) { dev_err(dev, "aead input iv param error!\n"); -- 2.7.4