mirror of
https://github.com/followmsi/android_kernel_google_msm.git
synced 2024-11-06 23:17:41 +00:00
823b470f64
Incorrect HMAC values are generated in following scenarios. - In case of a single transfer with a packet shorter than the block size, the HMAC generated is incorrect. This is due to the "FIRST" bit in AUTH_CFG register not being set. When calling HMAC_final for a transfer with a single packet (with no prior HMAC updates), the "FIRST" and "LAST" bit in AUTH_CFG register needs to be set. Currently FIRST bit is being cleared incorrectly for all scenarios. - In a scenario of a mac key input larger than block size, the key needs to be hashed. The key hashing operation is crashing. This is due to a NULL, unintialized pointer to the device handle. This is fixed by intializing the pointer correctly. Further more, key size is uninitialized, resulting in corruption of buffer. Change-Id: Iec736f2130e509fcaf631a2c71c5483514666617 Signed-off-by: Mona Hossain <mhossain@codeaurora.org> |
||
---|---|---|
.. | ||
amcc | ||
caam | ||
msm | ||
geode-aes.c | ||
geode-aes.h | ||
hifn_795x.c | ||
ixp4xx_crypto.c | ||
Kconfig | ||
Makefile | ||
mv_cesa.c | ||
mv_cesa.h | ||
n2_asm.S | ||
n2_core.c | ||
n2_core.h | ||
omap-aes.c | ||
omap-sham.c | ||
padlock-aes.c | ||
padlock-sha.c | ||
picoxcell_crypto.c | ||
picoxcell_crypto_regs.h | ||
s5p-sss.c | ||
talitos.c | ||
talitos.h | ||
tegra-aes.c | ||
tegra-aes.h |