mirror of
https://github.com/torvalds/linux.git
synced 2024-11-10 14:11:52 +00:00
crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()
ecdh_set_secret() casts a void* pointer to a const u64* in order to feed it into ecc_is_key_valid(). This is not generally permitted by the C standard, and leads to actual misalignment faults on ARMv6 cores. In some cases, these are fixed up in software, but this still leads to performance hits that are entirely avoidable. So let's copy the key into the ctx buffer first, which we will do anyway in the common case, and which guarantees correct alignment. Cc: <stable@vger.kernel.org> Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
05c2a70591
commit
17858b140b
@ -53,12 +53,13 @@ static int ecdh_set_secret(struct crypto_kpp *tfm, const void *buf,
|
|||||||
return ecc_gen_privkey(ctx->curve_id, ctx->ndigits,
|
return ecc_gen_privkey(ctx->curve_id, ctx->ndigits,
|
||||||
ctx->private_key);
|
ctx->private_key);
|
||||||
|
|
||||||
if (ecc_is_key_valid(ctx->curve_id, ctx->ndigits,
|
|
||||||
(const u64 *)params.key, params.key_size) < 0)
|
|
||||||
return -EINVAL;
|
|
||||||
|
|
||||||
memcpy(ctx->private_key, params.key, params.key_size);
|
memcpy(ctx->private_key, params.key, params.key_size);
|
||||||
|
|
||||||
|
if (ecc_is_key_valid(ctx->curve_id, ctx->ndigits,
|
||||||
|
ctx->private_key, params.key_size) < 0) {
|
||||||
|
memzero_explicit(ctx->private_key, params.key_size);
|
||||||
|
return -EINVAL;
|
||||||
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user