<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/crypto/echainiv.c, branch v4.14.331</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.14.331</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.14.331'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2016-09-13T10:44:57Z</updated>
<entry>
<title>crypto: echainiv - Replace chaining with multiplication</title>
<updated>2016-09-13T10:44:57Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2016-09-07T10:42:08Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=53a5d5ddccf849dbc27a8c1bba0b43c3a45fb792'/>
<id>urn:sha1:53a5d5ddccf849dbc27a8c1bba0b43c3a45fb792</id>
<content type='text'>
The current implementation uses a global per-cpu array to store
data which are used to derive the next IV.  This is insecure as
the attacker may change the stored data.

This patch removes all traces of chaining and replaces it with
multiplication of the salt and the sequence number.

Fixes: a10f554fa7e0 ("crypto: echainiv - Add encrypted chain IV...")
Cc: stable@vger.kernel.org
Reported-by: Mathias Krause &lt;minipli@googlemail.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Use skcipher</title>
<updated>2016-07-18T09:35:42Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2016-07-12T05:17:43Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=0e8bff47f6d3e863bf1829e020000c249c59ecd2'/>
<id>urn:sha1:0e8bff47f6d3e863bf1829e020000c249c59ecd2</id>
<content type='text'>
This patch replaces use of the obsolete blkcipher with skcipher.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Use generic geniv init/exit helpers</title>
<updated>2015-08-17T08:53:46Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-08-13T09:29:01Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=376e0d697a8194a5ab684d7fc57b2ce5483bda53'/>
<id>urn:sha1:376e0d697a8194a5ab684d7fc57b2ce5483bda53</id>
<content type='text'>
This patch replaces the echainiv init/exit handlers with the generic
geniv helpers.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Remove AEAD compatibility code</title>
<updated>2015-08-17T08:53:43Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-08-13T09:28:56Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=66008d4230f6e599275f1cf01db268fcaaadda44'/>
<id>urn:sha1:66008d4230f6e599275f1cf01db268fcaaadda44</id>
<content type='text'>
Now that we no longer have any legacy AEAD implementations the
compatibility code path can no longer be triggered.  This patch
removes it.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Fix encryption convention</title>
<updated>2015-07-14T06:56:46Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-07-08T23:17:20Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=5499b1a7311f5ec301ac2baa04a3482ee89ac0ab'/>
<id>urn:sha1:5499b1a7311f5ec301ac2baa04a3482ee89ac0ab</id>
<content type='text'>
This patch fixes a bug where we were incorrectly including the
IV in the AD during encryption.  The IV must remain in the plain
text for it to be encrypted.

During decryption there is no need to copy the IV to dst because
it's now part of the AD.

This patch removes an unncessary check on authsize which would be
performed by the underlying decrypt call.

Finally this patch makes use of the type-safe init/exit functions.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Only hold RNG during initialisation</title>
<updated>2015-06-22T07:49:29Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-06-21T11:11:50Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9fcc704dfd7967ebfbdd1031603e4332a905994b'/>
<id>urn:sha1:9fcc704dfd7967ebfbdd1031603e4332a905994b</id>
<content type='text'>
This patch changes the RNG allocation so that we only hold a
reference to the RNG during initialisation.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Move IV seeding into init function</title>
<updated>2015-06-04T07:05:00Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-06-03T06:49:24Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=f261c5fbe7121fd88198f3ee4be4e34a5a268120'/>
<id>urn:sha1:f261c5fbe7121fd88198f3ee4be4e34a5a268120</id>
<content type='text'>
We currently do the IV seeding on the first givencrypt call in
order to conserve entropy.  However, this does not work with
DRBG which cannot be called from interrupt context.  In fact,
with DRBG we don't need to conserve entropy anyway.  So this
patch moves the seeding into the init function.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Fix IV size in context size calculation</title>
<updated>2015-05-28T03:23:18Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-05-27T06:37:34Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9d03aee125d73908ddbe9c1b96338c9b69e1abc0'/>
<id>urn:sha1:9d03aee125d73908ddbe9c1b96338c9b69e1abc0</id>
<content type='text'>
This patch fixes a bug in the context size calculation where we
were still referring to the old cra_aead.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Use common IV generation code</title>
<updated>2015-05-28T03:23:18Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-05-27T06:37:33Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=d97de47ca1d160acdf29f0b4eadf2ae831bd5254'/>
<id>urn:sha1:d97de47ca1d160acdf29f0b4eadf2ae831bd5254</id>
<content type='text'>
This patch makes use of the new common IV generation code.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>crypto: echainiv - Copy AD along with plain text</title>
<updated>2015-05-28T03:23:18Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2015-05-27T06:37:31Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=838c9d561aaae4bc3f4b44046ea08b048ecaffe7'/>
<id>urn:sha1:838c9d561aaae4bc3f4b44046ea08b048ecaffe7</id>
<content type='text'>
As the AD does not necessarily exist in the destination buffer
it must be copied along with the plain text.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
</feed>
