Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7820071rwl; Tue, 10 Jan 2023 05:56:00 -0800 (PST) X-Google-Smtp-Source: AMrXdXsW9y3gmKIxyFIPalsgOjADb+JqXgbq2/2/MQFaNMIuMoaUKa2eZsXvT10PJRQvtmBrni+q X-Received: by 2002:a17:90a:930f:b0:225:be98:f5b5 with SMTP id p15-20020a17090a930f00b00225be98f5b5mr63282047pjo.23.1673358960234; Tue, 10 Jan 2023 05:56:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673358960; cv=none; d=google.com; s=arc-20160816; b=OVr72WppvgW4PCKeDD5UMnKynpw+yR+qjn12mDJhdoUzYC0aoWZjRrkhH6u2TndkYh 5qNOV0i/kTB9m43HJrJvMXrBsBb7UVRgcbizAICkmOCXvAmSGfuJws06tPrIYc/ue+Za u0F6nvE6ixdSwXS+NeR2CIDa5QLKB/f3TD7uKU355sQzc/Kued4fTkBXWYNrLbvRyH6t RmJK8GvtSMjcQXBS/GRpl1NVuzj6VCYH81OhmtkSx0TbG/kLTbekf9OYZzJWnIMLLz5c VBU0kzHmpqHJFW+1OxKndb2gVBpsaSpk5LrscQ/wIpntnzhEOu/8DmokuDq5hLgBUwYu CG8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Bw++1q/WpttUTFptagdBASo7vbIKLpApNOLAXVx9xOg=; b=coUHcfIzeFYDdh4GRwiewWv1EdhfmWgSsg5ikzXiz3V+RiWjJ0IEm+Wy96nbEJx2/1 a/OOv7fOXI61m/Vr3kMWo/7gbP+F9lR5ek4m7buYILJii+HW5wki1+nC/5//dG8mDumC Cy9aUgYuuhxmqpTU/pCOjULLs4H0FYYxLm3FbxDsRV7lrAkBRe5Jd1PTBmA6dBgFqwn9 y/kAGPpQRyrzlFAXPZS0Ev34jOE7VxsDPPDYg3nz5RsipNkl3vO1GpdV01S9u0IOTr0U BmVTXdV4s4wU+3QLJ1cOlTo7TXssEHsWoLJbbq0CRss3lAvdDn++O7o/XOp7oRqw2gHc pAtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@axis.com header.s=axis-central1 header.b=i8SZIszv; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=axis.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id rj4-20020a17090b3e8400b0021e41006030si11869114pjb.76.2023.01.10.05.55.47; Tue, 10 Jan 2023 05:56:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@axis.com header.s=axis-central1 header.b=i8SZIszv; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=axis.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230266AbjAJNvV (ORCPT + 99 others); Tue, 10 Jan 2023 08:51:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43938 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238347AbjAJNu6 (ORCPT ); Tue, 10 Jan 2023 08:50:58 -0500 Received: from smtp1.axis.com (smtp1.axis.com [195.60.68.17]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A159A13D3B; Tue, 10 Jan 2023 05:50:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axis.com; q=dns/txt; s=axis-central1; t=1673358657; x=1704894657; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Bw++1q/WpttUTFptagdBASo7vbIKLpApNOLAXVx9xOg=; b=i8SZIszvcwraT16On8nD778GL02WCVhXiFQ49kbURaOw90e75UyindVf t3OWdq+6LrVdmk12WTpOfKzBqPz3SYLYYKo/fDnNbOwYFjaIanTReVrtC MvILVSDs9Xaooj5cbfczWgWo6jDdVpWDiea9QNFgukDo8Q/7ICQKu4Fiz GRGG/ajjCHeI844TnK4NnAlHHKG0/2sYMW6of6PSug6Qyz4aFIikmBPkZ P+FM7FDu0bj2sL0rna+D4FKPpqHrCsI3UptB7H24jMA1oFLz3tXcvJFnK +qPRYFXePB6l/wJeMj14AbU5iLVkpYMBUDRUpAPQvpzFckRappEMyQ7B7 g==; From: Vincent Whitchurch To: , , , CC: , Vincent Whitchurch , , Subject: [PATCH 05/12] crypto: axis - validate AEAD authsize Date: Tue, 10 Jan 2023 14:50:35 +0100 Message-ID: <20230110135042.2940847-6-vincent.whitchurch@axis.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230110135042.2940847-1-vincent.whitchurch@axis.com> References: <20230110135042.2940847-1-vincent.whitchurch@axis.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Validate the AEAD authsize to fix errors like this with CRYPTO_MANAGER_EXTRA_TESTS: alg: aead: artpec-gcm-aes setauthsize unexpectedly succeeded on test vector "random: alen=0 plen=60 authsize=6 klen=17 novrfy=0"; expected_error=-22 Signed-off-by: Vincent Whitchurch --- drivers/crypto/axis/artpec6_crypto.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/crypto/axis/artpec6_crypto.c b/drivers/crypto/axis/artpec6_crypto.c index 87f82c314e48..0ffe6e0045aa 100644 --- a/drivers/crypto/axis/artpec6_crypto.c +++ b/drivers/crypto/axis/artpec6_crypto.c @@ -1274,6 +1274,12 @@ static int artpec6_crypto_aead_set_key(struct crypto_aead *tfm, const u8 *key, return 0; } +static int artpec6_crypto_aead_setauthsize(struct crypto_aead *tfm, + unsigned int authsize) +{ + return crypto_gcm_check_authsize(authsize); +} + static int artpec6_crypto_aead_encrypt(struct aead_request *req) { int ret; @@ -2829,6 +2835,7 @@ static struct aead_alg aead_algos[] = { { .init = artpec6_crypto_aead_init, .setkey = artpec6_crypto_aead_set_key, + .setauthsize = artpec6_crypto_aead_setauthsize, .encrypt = artpec6_crypto_aead_encrypt, .decrypt = artpec6_crypto_aead_decrypt, .ivsize = GCM_AES_IV_SIZE, -- 2.34.1