crypto/lrw.c
72 static int setkey(struct crypto_skcipher *parent, const u8 *key,
73 unsigned int keylen)
74 {
75 struct priv *ctx = crypto_skcipher_ctx(parent);
76 struct crypto_skcipher *child = ctx->child;
77 int err, bsize = LRW_BLOCK_SIZE;
78 const u8 *tweak = key + keylen - bsize;
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Smatch thinks that keylen is user controlled from zero to some upper
bound. How do we know it's >= LRW_BLOCK_SIZE (16)?
I find the crypto code sort of hard to follow... There are a bunch of
setkey pointers and they're sometimes called recursively. Is there
some trick or hints?
79 be128 tmp = { 0 };
80 int i;
81
82 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK);
83 crypto_skcipher_set_flags(child,
crypto_skcipher_get_flags(parent) &
84 CRYPTO_TFM_REQ_MASK);
85 err = crypto_skcipher_setkey(child, key, keylen - bsize);
86 crypto_skcipher_set_flags(parent,
crypto_skcipher_get_flags(child) &
87 CRYPTO_TFM_RES_MASK);
88 if (err)
89 return err;
90
91 if (ctx->table)
92 gf128mul_free_64k(ctx->table);
93
94 /* initialize multiplication table for Key2 */
95 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak);
96 if (!ctx->table)
97 return -ENOMEM;
98
99 /* initialize optimization table */
100 for (i = 0; i < 128; i++) {
101 setbit128_bbe(&tmp, i);
102 ctx->mulinc[i] = tmp;
103 gf128mul_64k_bbe(&ctx->mulinc[i], ctx->table);
104 }
105
106 return 0;
107 }
regards,
dan carpenter