diff options
author | Kees Cook <keescook@chromium.org> | 2018-09-19 04:10:38 +0200 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2018-09-28 06:46:06 +0200 |
commit | b350bee5ea0f4db75d4c6191a2e95db16f40c278 (patch) | |
tree | 163e804e6cc008a8d899df4fbc9c894c5b2e056e /crypto/ecb.c | |
parent | crypto: fix a memory leak in rsa-kcs1pad's encryption mode (diff) | |
download | linux-b350bee5ea0f4db75d4c6191a2e95db16f40c278.tar.xz linux-b350bee5ea0f4db75d4c6191a2e95db16f40c278.zip |
crypto: skcipher - Introduce crypto_sync_skcipher
In preparation for removal of VLAs due to skcipher requests on the stack
via SKCIPHER_REQUEST_ON_STACK() usage, this introduces the infrastructure
for the "sync skcipher" tfm, which is for handling the on-stack cases of
skcipher, which are always non-ASYNC and have a known limited request
size.
The crypto API additions:
struct crypto_sync_skcipher (wrapper for struct crypto_skcipher)
crypto_alloc_sync_skcipher()
crypto_free_sync_skcipher()
crypto_sync_skcipher_setkey()
crypto_sync_skcipher_get_flags()
crypto_sync_skcipher_set_flags()
crypto_sync_skcipher_clear_flags()
crypto_sync_skcipher_blocksize()
crypto_sync_skcipher_ivsize()
crypto_sync_skcipher_reqtfm()
skcipher_request_set_sync_tfm()
SYNC_SKCIPHER_REQUEST_ON_STACK() (with tfm type check)
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/ecb.c')
0 files changed, 0 insertions, 0 deletions