summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorT Pratham <t-pratham@ti.com>2025-10-08 15:03:14 +0530
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2025-12-18 14:02:32 +0100
commit12b413f5460c393d1151a37f591140693eca0f84 (patch)
treeb4763809f8fad2bd8a2df4fe637cd8796f52483b /crypto
parent67c42f3ec0bdff098c804b9132ad204c2804829c (diff)
downloadlinux-12b413f5460c393d1151a37f591140693eca0f84.tar.gz
linux-12b413f5460c393d1151a37f591140693eca0f84.tar.bz2
linux-12b413f5460c393d1151a37f591140693eca0f84.zip
crypto: aead - Fix reqsize handling
[ Upstream commit 9b04d8f00569573796dd05397f5779135593eb24 ] Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash and acomp from the commit description as subsequent commits add necessary changes in these alg frameworks. However, this is being recommended for use in all crypto algs instead of setting reqsize using crypto_*_set_reqsize(). Using cra_reqsize in aead algorithms, hence, causes memory corruptions and crashes as the underlying functions in the algorithm framework have not been updated to set the reqsize properly from cra_reqsize. [1] Add proper set_reqsize calls in the aead init function to properly initialize reqsize for these algorithms in the framework. [1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b Fixes: afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") Signed-off-by: T Pratham <t-pratham@ti.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/aead.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/aead.c b/crypto/aead.c
index 5d14b775036e..51ab3af691af 100644
--- a/crypto/aead.c
+++ b/crypto/aead.c
@@ -120,6 +120,7 @@ static int crypto_aead_init_tfm(struct crypto_tfm *tfm)
struct aead_alg *alg = crypto_aead_alg(aead);
crypto_aead_set_flags(aead, CRYPTO_TFM_NEED_KEY);
+ crypto_aead_set_reqsize(aead, crypto_tfm_alg_reqsize(tfm));
aead->authsize = alg->maxauthsize;