Skip to content

Commit 781a08d

Browse files
ambarusherbertx
authored andcommitted
crypto: atmel-aes - Fix counter overflow in CTR mode
32 bit counter is not supported by neither of our AES IPs, all implement a 16 bit block counter. Drop the 32 bit block counter logic. Fixes: fcac836 ("crypto: atmel-aes - fix the counter overflow in CTR mode") Signed-off-by: Tudor Ambarus <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
1 parent c65d123 commit 781a08d

File tree

1 file changed

+12
-25
lines changed

1 file changed

+12
-25
lines changed

drivers/crypto/atmel-aes.c

Lines changed: 12 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@
8888
struct atmel_aes_caps {
8989
bool has_dualbuff;
9090
bool has_cfb64;
91-
bool has_ctr32;
9291
bool has_gcm;
9392
bool has_xts;
9493
bool has_authenc;
@@ -1018,8 +1017,9 @@ static int atmel_aes_ctr_transfer(struct atmel_aes_dev *dd)
10181017
struct atmel_aes_ctr_ctx *ctx = atmel_aes_ctr_ctx_cast(dd->ctx);
10191018
struct skcipher_request *req = skcipher_request_cast(dd->areq);
10201019
struct scatterlist *src, *dst;
1021-
u32 ctr, blocks;
10221020
size_t datalen;
1021+
u32 ctr;
1022+
u16 blocks, start, end;
10231023
bool use_dma, fragmented = false;
10241024

10251025
/* Check for transfer completion. */
@@ -1031,27 +1031,17 @@ static int atmel_aes_ctr_transfer(struct atmel_aes_dev *dd)
10311031
datalen = req->cryptlen - ctx->offset;
10321032
blocks = DIV_ROUND_UP(datalen, AES_BLOCK_SIZE);
10331033
ctr = be32_to_cpu(ctx->iv[3]);
1034-
if (dd->caps.has_ctr32) {
1035-
/* Check 32bit counter overflow. */
1036-
u32 start = ctr;
1037-
u32 end = start + blocks - 1;
1038-
1039-
if (end < start) {
1040-
ctr |= 0xffffffff;
1041-
datalen = AES_BLOCK_SIZE * -start;
1042-
fragmented = true;
1043-
}
1044-
} else {
1045-
/* Check 16bit counter overflow. */
1046-
u16 start = ctr & 0xffff;
1047-
u16 end = start + (u16)blocks - 1;
1048-
1049-
if (blocks >> 16 || end < start) {
1050-
ctr |= 0xffff;
1051-
datalen = AES_BLOCK_SIZE * (0x10000-start);
1052-
fragmented = true;
1053-
}
1034+
1035+
/* Check 16bit counter overflow. */
1036+
start = ctr & 0xffff;
1037+
end = start + blocks - 1;
1038+
1039+
if (blocks >> 16 || end < start) {
1040+
ctr |= 0xffff;
1041+
datalen = AES_BLOCK_SIZE * (0x10000 - start);
1042+
fragmented = true;
10541043
}
1044+
10551045
use_dma = (datalen >= ATMEL_AES_DMA_THRESHOLD);
10561046

10571047
/* Jump to offset. */
@@ -2521,7 +2511,6 @@ static void atmel_aes_get_cap(struct atmel_aes_dev *dd)
25212511
{
25222512
dd->caps.has_dualbuff = 0;
25232513
dd->caps.has_cfb64 = 0;
2524-
dd->caps.has_ctr32 = 0;
25252514
dd->caps.has_gcm = 0;
25262515
dd->caps.has_xts = 0;
25272516
dd->caps.has_authenc = 0;
@@ -2532,7 +2521,6 @@ static void atmel_aes_get_cap(struct atmel_aes_dev *dd)
25322521
case 0x500:
25332522
dd->caps.has_dualbuff = 1;
25342523
dd->caps.has_cfb64 = 1;
2535-
dd->caps.has_ctr32 = 1;
25362524
dd->caps.has_gcm = 1;
25372525
dd->caps.has_xts = 1;
25382526
dd->caps.has_authenc = 1;
@@ -2541,7 +2529,6 @@ static void atmel_aes_get_cap(struct atmel_aes_dev *dd)
25412529
case 0x200:
25422530
dd->caps.has_dualbuff = 1;
25432531
dd->caps.has_cfb64 = 1;
2544-
dd->caps.has_ctr32 = 1;
25452532
dd->caps.has_gcm = 1;
25462533
dd->caps.max_burst_size = 4;
25472534
break;

0 commit comments

Comments
 (0)