aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/drivers/crypto/qce
diff options
context:
space:
mode:
authorSivaprakash Murugesan <sivaprak@codeaurora.org>2020-06-22 11:45:05 +0530
committerHerbert Xu <herbert@gondor.apana.org.au>2020-07-03 14:18:34 +1000
commita668ee56ff028139a0926e4d2248c9a573858ba0 (patch)
tree849921f0fa7a5b61586651f39251313b8c44d014 /drivers/crypto/qce
parentcrypto: qce - support zero length test vectors (diff)
downloadwireguard-linux-a668ee56ff028139a0926e4d2248c9a573858ba0.tar.xz
wireguard-linux-a668ee56ff028139a0926e4d2248c9a573858ba0.zip
crypto: qce - re-initialize context on import
crypto testmgr deliberately corrupts the request context while passing vectors to the import. This is to make sure that drivers do not rely on request but they take all the necessary input from io vec passed to it. qce casts the request context from request parameter, since it is corrupted the sub squent hash request fails and qce hangs. To avoid this re-initialize request context on import. The qce import API alreasy takes care of taking the input vectors from passed io vec. Signed-off-by: Sivaprakash Murugesan <sivaprak@codeaurora.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'drivers/crypto/qce')
-rw-r--r--drivers/crypto/qce/sha.c16
1 files changed, 12 insertions, 4 deletions
diff --git a/drivers/crypto/qce/sha.c b/drivers/crypto/qce/sha.c
index ed82520203f9..9e54a667d72f 100644
--- a/drivers/crypto/qce/sha.c
+++ b/drivers/crypto/qce/sha.c
@@ -203,10 +203,18 @@ static int qce_import_common(struct ahash_request *req, u64 in_count,
static int qce_ahash_import(struct ahash_request *req, const void *in)
{
- struct qce_sha_reqctx *rctx = ahash_request_ctx(req);
- unsigned long flags = rctx->flags;
- bool hmac = IS_SHA_HMAC(flags);
- int ret = -EINVAL;
+ struct qce_sha_reqctx *rctx;
+ unsigned long flags;
+ bool hmac;
+ int ret;
+
+ ret = qce_ahash_init(req);
+ if (ret)
+ return ret;
+
+ rctx = ahash_request_ctx(req);
+ flags = rctx->flags;
+ hmac = IS_SHA_HMAC(flags);
if (IS_SHA1(flags) || IS_SHA1_HMAC(flags)) {
const struct sha1_state *state = in;