[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230921124237.2364827-1-gaurav.jain@nxp.com>
Date: Thu, 21 Sep 2023 18:12:37 +0530
From: Gaurav Jain <gaurav.jain@....com>
To: Horia Geanta <horia.geanta@....com>,
Pankaj Gupta <pankaj.gupta@....com>,
Varun Sethi <V.Sethi@....com>,
Meenakshi Aggarwal <meenakshi.aggarwal@....com>,
Herbert Xu <herbert@...dor.apana.org.au>,
"David S . Miller" <davem@...emloft.net>,
Aisheng Dong <aisheng.dong@....com>
Cc: Silvano Di Ninno <silvano.dininno@....com>,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-imx@....com, Gaurav Jain <gaurav.jain@....com>
Subject: [PATCH] crypto: caam/jr - fix Chacha20 + Poly1305 self test failure
key buffer is not copied in chachapoly_setkey function,
results in wrong output for encryption/decryption operation.
fix this by memcpy the key in caam_ctx key arrary
Fixes: d6bbd4eea243 ("crypto: caam/jr - add support for Chacha20 + Poly1305")
Signed-off-by: Gaurav Jain <gaurav.jain@....com>
---
drivers/crypto/caam/caamalg.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c
index eba2d750c3b0..066f08a3a040 100644
--- a/drivers/crypto/caam/caamalg.c
+++ b/drivers/crypto/caam/caamalg.c
@@ -575,7 +575,8 @@ static int chachapoly_setkey(struct crypto_aead *aead, const u8 *key,
if (keylen != CHACHA_KEY_SIZE + saltlen)
return -EINVAL;
- ctx->cdata.key_virt = key;
+ memcpy(ctx->key, key, keylen);
+ ctx->cdata.key_virt = ctx->key;
ctx->cdata.keylen = keylen - saltlen;
return chachapoly_set_sh_desc(aead);
--
2.25.1
Powered by blists - more mailing lists