summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRomain Izard <romain.izard.pro@gmail.com>2017-10-31 10:42:35 -0400
committerHerbert Xu <herbert@gondor.apana.org.au>2017-11-03 09:35:35 -0400
commit441f99c90497e15aa3ad1dbabd56187e29614348 (patch)
treebc57636479d687c706c17d6818e9593b498c7f9d
parentd041b557792c85677f17e08eee535eafbd6b9aa2 (diff)
crypto: ccm - preserve the IV buffer
The IV buffer used during CCM operations is used twice, during both the hashing step and the ciphering step. When using a hardware accelerator that updates the contents of the IV buffer at the end of ciphering operations, the value will be modified. In the decryption case, the subsequent setup of the hashing algorithm will interpret the updated IV instead of the original value, which can lead to out-of-bounds writes. Reuse the idata buffer, only used in the hashing step, to preserve the IV's value during the ciphering step in the decryption case. Signed-off-by: Romain Izard <romain.izard.pro@gmail.com> Reviewed-by: Tudor Ambarus <tudor.ambarus@microchip.com> Cc: <stable@vger.kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--crypto/ccm.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/crypto/ccm.c b/crypto/ccm.c
index 1ce37ae0ce56..0a083342ec8c 100644
--- a/crypto/ccm.c
+++ b/crypto/ccm.c
@@ -363,7 +363,7 @@ static int crypto_ccm_decrypt(struct aead_request *req)
363 unsigned int cryptlen = req->cryptlen; 363 unsigned int cryptlen = req->cryptlen;
364 u8 *authtag = pctx->auth_tag; 364 u8 *authtag = pctx->auth_tag;
365 u8 *odata = pctx->odata; 365 u8 *odata = pctx->odata;
366 u8 *iv = req->iv; 366 u8 *iv = pctx->idata;
367 int err; 367 int err;
368 368
369 cryptlen -= authsize; 369 cryptlen -= authsize;
@@ -379,6 +379,8 @@ static int crypto_ccm_decrypt(struct aead_request *req)
379 if (req->src != req->dst) 379 if (req->src != req->dst)
380 dst = pctx->dst; 380 dst = pctx->dst;
381 381
382 memcpy(iv, req->iv, 16);
383
382 skcipher_request_set_tfm(skreq, ctx->ctr); 384 skcipher_request_set_tfm(skreq, ctx->ctr);
383 skcipher_request_set_callback(skreq, pctx->flags, 385 skcipher_request_set_callback(skreq, pctx->flags,
384 crypto_ccm_decrypt_done, req); 386 crypto_ccm_decrypt_done, req);