cryptosoft: Reject AES-CCM/GCM sessions with invalid key lengths.

Reviewed by:	markj
Sponsored by:	The FreeBSD Foundation
Differential Revision:	https://reviews.freebsd.org/D33195
This commit is contained in:
John Baldwin 2021-12-09 11:52:41 -08:00
parent 6e17a2e00d
commit c172a407fb

View File

@ -1508,6 +1508,15 @@ swcr_probesession(device_t dev, const struct crypto_session_params *csp)
switch (csp->csp_cipher_alg) {
case CRYPTO_AES_NIST_GCM_16:
case CRYPTO_AES_CCM_16:
switch (csp->csp_cipher_klen * 8) {
case 128:
case 192:
case 256:
break;
default:
return (EINVAL);
}
break;
case CRYPTO_CHACHA20_POLY1305:
break;
default: