Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto updates from Herbert Xu: "Here is the crypto update for 5.3: API: - Test shash interface directly in testmgr - cra_driver_name is now mandatory Algorithms: - Replace arc4 crypto_cipher with library helper - Implement 5 way interleave for ECB, CBC and CTR on arm64 - Add xxhash - Add continuous self-test on noise source to drbg - Update jitter RNG Drivers: - Add support for SHA204A random number generator - Add support for 7211 in iproc-rng200 - Fix fuzz test failures in inside-secure - Fix fuzz test failures in talitos - Fix fuzz test failures in qat" * 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (143 commits) crypto: stm32/hash - remove interruptible condition for dma crypto: stm32/hash - Fix hmac issue more than 256 bytes crypto: stm32/crc32 - rename driver file crypto: amcc - remove memset after dma_alloc_coherent crypto: ccp - Switch to SPDX license identifiers crypto: ccp - Validate the the error value used to index error messages crypto: doc - Fix formatting of new crypto engine content crypto: doc - Add parameter documentation crypto: arm64/aes-ce - implement 5 way interleave for ECB, CBC and CTR crypto: arm64/aes-ce - add 5 way interleave routines crypto: talitos - drop icv_ool crypto: talitos - fix hash on SEC1. crypto: talitos - move struct talitos_edesc into talitos.h lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE crypto/NX: Set receive window credits to max number of CRBs in RxFIFO crypto: asymmetric_keys - select CRYPTO_HASH where needed crypto: serpent - mark __serpent_setkey_sbox noinline crypto: testmgr - dynamically allocate crypto_shash crypto: testmgr - dynamically allocate testvec_config crypto: talitos - eliminate unneeded 'done' functions at build time ...
This commit is contained in:
@@ -7,6 +7,7 @@
|
||||
*/
|
||||
|
||||
#include <linux/err.h>
|
||||
#include <linux/fips.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/init.h>
|
||||
#include <linux/slab.h>
|
||||
@@ -18,7 +19,7 @@
|
||||
|
||||
#include <net/lib80211.h>
|
||||
|
||||
#include <linux/crypto.h>
|
||||
#include <crypto/arc4.h>
|
||||
#include <linux/crc32.h>
|
||||
|
||||
MODULE_AUTHOR("Jouni Malinen");
|
||||
@@ -31,52 +32,31 @@ struct lib80211_wep_data {
|
||||
u8 key[WEP_KEY_LEN + 1];
|
||||
u8 key_len;
|
||||
u8 key_idx;
|
||||
struct crypto_cipher *tx_tfm;
|
||||
struct crypto_cipher *rx_tfm;
|
||||
struct arc4_ctx tx_ctx;
|
||||
struct arc4_ctx rx_ctx;
|
||||
};
|
||||
|
||||
static void *lib80211_wep_init(int keyidx)
|
||||
{
|
||||
struct lib80211_wep_data *priv;
|
||||
|
||||
if (fips_enabled)
|
||||
return NULL;
|
||||
|
||||
priv = kzalloc(sizeof(*priv), GFP_ATOMIC);
|
||||
if (priv == NULL)
|
||||
goto fail;
|
||||
return NULL;
|
||||
priv->key_idx = keyidx;
|
||||
|
||||
priv->tx_tfm = crypto_alloc_cipher("arc4", 0, 0);
|
||||
if (IS_ERR(priv->tx_tfm)) {
|
||||
priv->tx_tfm = NULL;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
priv->rx_tfm = crypto_alloc_cipher("arc4", 0, 0);
|
||||
if (IS_ERR(priv->rx_tfm)) {
|
||||
priv->rx_tfm = NULL;
|
||||
goto fail;
|
||||
}
|
||||
/* start WEP IV from a random value */
|
||||
get_random_bytes(&priv->iv, 4);
|
||||
|
||||
return priv;
|
||||
|
||||
fail:
|
||||
if (priv) {
|
||||
crypto_free_cipher(priv->tx_tfm);
|
||||
crypto_free_cipher(priv->rx_tfm);
|
||||
kfree(priv);
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void lib80211_wep_deinit(void *priv)
|
||||
{
|
||||
struct lib80211_wep_data *_priv = priv;
|
||||
if (_priv) {
|
||||
crypto_free_cipher(_priv->tx_tfm);
|
||||
crypto_free_cipher(_priv->rx_tfm);
|
||||
}
|
||||
kfree(priv);
|
||||
kzfree(priv);
|
||||
}
|
||||
|
||||
/* Add WEP IV/key info to a frame that has at least 4 bytes of headroom */
|
||||
@@ -128,7 +108,6 @@ static int lib80211_wep_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
|
||||
u32 crc, klen, len;
|
||||
u8 *pos, *icv;
|
||||
u8 key[WEP_KEY_LEN + 3];
|
||||
int i;
|
||||
|
||||
/* other checks are in lib80211_wep_build_iv */
|
||||
if (skb_tailroom(skb) < 4)
|
||||
@@ -156,10 +135,8 @@ static int lib80211_wep_encrypt(struct sk_buff *skb, int hdr_len, void *priv)
|
||||
icv[2] = crc >> 16;
|
||||
icv[3] = crc >> 24;
|
||||
|
||||
crypto_cipher_setkey(wep->tx_tfm, key, klen);
|
||||
|
||||
for (i = 0; i < len + 4; i++)
|
||||
crypto_cipher_encrypt_one(wep->tx_tfm, pos + i, pos + i);
|
||||
arc4_setkey(&wep->tx_ctx, key, klen);
|
||||
arc4_crypt(&wep->tx_ctx, pos, pos, len + 4);
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -177,7 +154,6 @@ static int lib80211_wep_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
|
||||
u32 crc, klen, plen;
|
||||
u8 key[WEP_KEY_LEN + 3];
|
||||
u8 keyidx, *pos, icv[4];
|
||||
int i;
|
||||
|
||||
if (skb->len < hdr_len + 8)
|
||||
return -1;
|
||||
@@ -198,9 +174,8 @@ static int lib80211_wep_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
|
||||
/* Apply RC4 to data and compute CRC32 over decrypted data */
|
||||
plen = skb->len - hdr_len - 8;
|
||||
|
||||
crypto_cipher_setkey(wep->rx_tfm, key, klen);
|
||||
for (i = 0; i < plen + 4; i++)
|
||||
crypto_cipher_decrypt_one(wep->rx_tfm, pos + i, pos + i);
|
||||
arc4_setkey(&wep->rx_ctx, key, klen);
|
||||
arc4_crypt(&wep->rx_ctx, pos, pos, plen + 4);
|
||||
|
||||
crc = ~crc32_le(~0, pos, plen);
|
||||
icv[0] = crc;
|
||||
|
Reference in New Issue
Block a user