diff options
author | Tycho Andersen <tycho@tycho.ws> | 2018-04-24 23:26:37 +0300 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2018-05-11 23:07:45 +0300 |
commit | a964f395614af195cf5c5caa84a9c487b86d5ba5 (patch) | |
tree | 4f816e0c843c2aa721e58ae9f9693054dc1b5396 /security/keys/dh.c | |
parent | 5859cdf55063943192f316b3d6c673fd6fcbee46 (diff) | |
download | linux-a964f395614af195cf5c5caa84a9c487b86d5ba5.tar.xz |
big key: get rid of stack array allocation
We're interested in getting rid of all of the stack allocated arrays in the
kernel [1]. This patch simply hardcodes the iv length to match that of the
hardcoded cipher.
[1]: https://lkml.org/lkml/2018/3/7/621
v2: hardcode the length of the nonce to be the GCM AES IV length, and do a
sanity check in init(), Eric Biggers
v3: * remember to free big_key_aead when sanity check fails
* define a constant for big key IV size so it can be changed along side
the algorithm in the code
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
Reviewed-by: Kees Cook <keescook@chromium.org>
CC: David Howells <dhowells@redhat.com>
CC: James Morris <jmorris@namei.org>
CC: "Serge E. Hallyn" <serge@hallyn.com>
CC: Jason A. Donenfeld <Jason@zx2c4.com>
CC: Eric Biggers <ebiggers3@gmail.com>
Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'security/keys/dh.c')
0 files changed, 0 insertions, 0 deletions