| 2c6b3438 | 09-Mar-2022 |
Piotr Bronowski <[email protected]> |
crypto/ipsec_mb: fix GCM requested digest length
This patch removes coverity defect CID 375828: Untrusted value as argument (TAINTED_SCALAR)
Coverity issue: 375828 Fixes: ceb863938708 ("crypto/aesn
crypto/ipsec_mb: fix GCM requested digest length
This patch removes coverity defect CID 375828: Untrusted value as argument (TAINTED_SCALAR)
Coverity issue: 375828 Fixes: ceb863938708 ("crypto/aesni_gcm: support all truncated digest sizes") Cc: [email protected]
Signed-off-by: Piotr Bronowski <[email protected]> Acked-by: Ciara Power <[email protected]>
show more ...
|
| a501609e | 23-Feb-2022 |
Pablo de Lara <[email protected]> |
crypto/ipsec_mb: fix length and offset settings
KASUMI, SNOW3G and ZUC require lengths and offsets to be set in bits or bytes depending on the algorithm. There were some algorithms that were mixing
crypto/ipsec_mb: fix length and offset settings
KASUMI, SNOW3G and ZUC require lengths and offsets to be set in bits or bytes depending on the algorithm. There were some algorithms that were mixing these two, so this commit is fixing this issue.
Fixes: ae8e085c608d ("crypto/aesni_mb: support KASUMI F8/F9") Fixes: 6c42e0cf4d12 ("crypto/aesni_mb: support SNOW3G-UEA2/UIA2") Fixes: fd8df85487c4 ("crypto/aesni_mb: support ZUC-EEA3/EIA3") Fixes: 8c835018de84 ("crypto/ipsec_mb: support ZUC-256 for aesni_mb") Cc: [email protected]
Signed-off-by: Pablo de Lara <[email protected]>
show more ...
|
| 96d0dc2a | 23-Feb-2022 |
Pablo de Lara <[email protected]> |
crypto/ipsec_mb: fix ZUC operation overwrite
ZUC PMD batches crypto operations depending on their type (encryption + tag generation, tag verification + decryption, etc), to allow parallelization. Th
crypto/ipsec_mb: fix ZUC operation overwrite
ZUC PMD batches crypto operations depending on their type (encryption + tag generation, tag verification + decryption, etc), to allow parallelization. The array used to store the pointers to these operations was always the same array provided by dequeue_burst() function, and it was looping around the same positions (from 0 to ZUC_MAX_BURST - 1).
A new internal array is used to avoid overwriting the pointers of the array provided by dequeue_burst() function.
Fixes: cf7685d68f00 ("crypto/zuc: add driver for ZUC library") Cc: [email protected]
Signed-off-by: Pablo de Lara <[email protected]>
show more ...
|
| bd376973 | 23-Feb-2022 |
Pablo de Lara <[email protected]> |
crypto/ipsec_mb: fix ZUC authentication verify
ZUC authentication is done over multiple buffers at a time. When authentication verification is done, multiple scratch buffers are using to generate th
crypto/ipsec_mb: fix ZUC authentication verify
ZUC authentication is done over multiple buffers at a time. When authentication verification is done, multiple scratch buffers are using to generate the tags that will be compared afterwards. However, the same scratch buffer was used always, instead of having different ones for each crypto operation.
Fixes: 0b133c36ad7d ("crypto/zuc: support IPsec Multi-buffer lib v0.54") Cc: [email protected]
Signed-off-by: Pablo de Lara <[email protected]>
show more ...
|
| 4582f79c | 20-Jan-2022 |
Pablo de Lara <[email protected]> |
crypto/ipsec_mb: fix buffer overrun
Memory for ZUC cipher/auth key in session had to be expanded to 32 bytes, instead of 16 bytes, when adding ZUC-256 support. However, impact is low as this memory
crypto/ipsec_mb: fix buffer overrun
Memory for ZUC cipher/auth key in session had to be expanded to 32 bytes, instead of 16 bytes, when adding ZUC-256 support. However, impact is low as this memory is part of a union with bigger size than 32 bytes.
Coverity issue: 374374 Coverity issue: 374379 Fixes: 8c835018de84 ("crypto/ipsec_mb: support ZUC-256 for aesni_mb") Cc: [email protected]
Signed-off-by: Pablo de Lara <[email protected]> Acked-by: Ciara Power <[email protected]>
show more ...
|
| 21bdbf24 | 10-Dec-2021 |
Ciara Power <[email protected]> |
crypto/ipsec_mb: fix tainted data for session
Downcasting a void * to struct aesni_gcm_session * caused the session data to be treated as tainted. Removing the void * temporary variable and adding a
crypto/ipsec_mb: fix tainted data for session
Downcasting a void * to struct aesni_gcm_session * caused the session data to be treated as tainted. Removing the void * temporary variable and adding a cast avoids this issue.
Coverity issue: 374377 Fixes: 746825e5c0ea ("crypto/ipsec_mb: move aesni_gcm PMD") Cc: [email protected]
Signed-off-by: Ciara Power <[email protected]> Acked-by: Fan Zhang <[email protected]>
show more ...
|
| 581c39b1 | 10-Dec-2021 |
Ciara Power <[email protected]> |
crypto/ipsec_mb: fix queue cleanup null pointer dereference
The qp was being used in the cleanup without checking if it was non NULL. A check is now added to verify qp is non NULL before use.
Cover
crypto/ipsec_mb: fix queue cleanup null pointer dereference
The qp was being used in the cleanup without checking if it was non NULL. A check is now added to verify qp is non NULL before use.
Coverity issue: 374375 Fixes: c75542ae4200 ("crypto/ipsec_mb: introduce IPsec_mb framework") Cc: [email protected]
Signed-off-by: Ciara Power <[email protected]> Acked-by: Fan Zhang <[email protected]>
show more ...
|
| 746825e5 | 15-Oct-2021 |
Piotr Bronowski <[email protected]> |
crypto/ipsec_mb: move aesni_gcm PMD
This patch removes the crypto/aesni_gcm folder and gathers all aesni-gcm PMD implementation specific details into a single file, pmd_aesni_gcm.c in the crypto/ips
crypto/ipsec_mb: move aesni_gcm PMD
This patch removes the crypto/aesni_gcm folder and gathers all aesni-gcm PMD implementation specific details into a single file, pmd_aesni_gcm.c in the crypto/ipsec_mb folder. A redundant check for iv length is removed.
GCM ops are stored in the queue pair for multi process support, they are updated during queue pair setup for both primary and secondary processes.
GCM ops are also set per lcore for the CPU crypto mode.
Signed-off-by: Piotr Bronowski <[email protected]> Signed-off-by: Ciara Power <[email protected]> Acked-by: Ray Kinsella <[email protected]> Acked-by: Fan Zhang <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|