crypto: arm64/aes - fix handling sub-block CTS-CBC inputs
authorEric Biggers <ebiggers@google.com>
Wed, 3 Oct 2018 05:22:15 +0000 (22:22 -0700)
committerHerbert Xu <herbert@gondor.apana.org.au>
Mon, 8 Oct 2018 05:47:02 +0000 (13:47 +0800)
In the new arm64 CTS-CBC implementation, return an error code rather
than crashing on inputs shorter than AES_BLOCK_SIZE bytes.  Also set
cra_blocksize to AES_BLOCK_SIZE (like is done in the cts template) to
indicate the minimum input size.

Fixes: dd597fb33ff0 ("crypto: arm64/aes-blk - add support for CTS-CBC mode")
Signed-off-by: Eric Biggers <ebiggers@google.com>
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
arch/arm64/crypto/aes-glue.c

index 26d2b02..1e67662 100644 (file)
@@ -243,8 +243,11 @@ static int cts_cbc_encrypt(struct skcipher_request *req)
 
        skcipher_request_set_tfm(&rctx->subreq, tfm);
 
-       if (req->cryptlen == AES_BLOCK_SIZE)
+       if (req->cryptlen <= AES_BLOCK_SIZE) {
+               if (req->cryptlen < AES_BLOCK_SIZE)
+                       return -EINVAL;
                cbc_blocks = 1;
+       }
 
        if (cbc_blocks > 0) {
                unsigned int blocks;
@@ -305,8 +308,11 @@ static int cts_cbc_decrypt(struct skcipher_request *req)
 
        skcipher_request_set_tfm(&rctx->subreq, tfm);
 
-       if (req->cryptlen == AES_BLOCK_SIZE)
+       if (req->cryptlen <= AES_BLOCK_SIZE) {
+               if (req->cryptlen < AES_BLOCK_SIZE)
+                       return -EINVAL;
                cbc_blocks = 1;
+       }
 
        if (cbc_blocks > 0) {
                unsigned int blocks;
@@ -486,14 +492,13 @@ static struct skcipher_alg aes_algs[] = { {
                .cra_driver_name        = "__cts-cbc-aes-" MODE,
                .cra_priority           = PRIO,
                .cra_flags              = CRYPTO_ALG_INTERNAL,
-               .cra_blocksize          = 1,
+               .cra_blocksize          = AES_BLOCK_SIZE,
                .cra_ctxsize            = sizeof(struct crypto_aes_ctx),
                .cra_module             = THIS_MODULE,
        },
        .min_keysize    = AES_MIN_KEY_SIZE,
        .max_keysize    = AES_MAX_KEY_SIZE,
        .ivsize         = AES_BLOCK_SIZE,
-       .chunksize      = AES_BLOCK_SIZE,
        .walksize       = 2 * AES_BLOCK_SIZE,
        .setkey         = skcipher_aes_setkey,
        .encrypt        = cts_cbc_encrypt,