Commit 4cbf87c7 authored by David S. Miller's avatar David S. Miller

Merge branch 'for-upstream' of...

Merge branch 'for-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next

Johan Hedberg says:

====================
pull request: bluetooth-next 2017-06-14

Here's another batch of Bluetooth patches for the 4.13 kernel:

 - Fix for Broadcom controllers not supporting Event Mask Page 2
 - New QCA ROME USB ID for btusb
 - Fix for Security Manager Protocol to use constant-time memcmp
 - Improved support for TI WiLink chips

Please let me know if there are any issues pulling. Thanks.
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents 0331402a 06e41d8a
...@@ -14,6 +14,12 @@ Required properties: ...@@ -14,6 +14,12 @@ Required properties:
- compatible: should be one of the following: - compatible: should be one of the following:
"ti,wl1271-st" "ti,wl1271-st"
"ti,wl1273-st" "ti,wl1273-st"
"ti,wl1281-st"
"ti,wl1283-st"
"ti,wl1285-st"
"ti,wl1801-st"
"ti,wl1805-st"
"ti,wl1807-st"
"ti,wl1831-st" "ti,wl1831-st"
"ti,wl1835-st" "ti,wl1835-st"
"ti,wl1837-st" "ti,wl1837-st"
...@@ -22,6 +28,10 @@ Optional properties: ...@@ -22,6 +28,10 @@ Optional properties:
- enable-gpios : GPIO signal controlling enabling of BT. Active high. - enable-gpios : GPIO signal controlling enabling of BT. Active high.
- vio-supply : Vio input supply (1.8V) - vio-supply : Vio input supply (1.8V)
- vbat-supply : Vbat input supply (2.9-4.8V) - vbat-supply : Vbat input supply (2.9-4.8V)
- clocks : Must contain an entry, for each entry in clock-names.
See ../clocks/clock-bindings.txt for details.
- clock-names : Must include the following entry:
"ext_clock" (External clock provided to the TI combo chip).
Example: Example:
...@@ -31,5 +41,7 @@ Example: ...@@ -31,5 +41,7 @@ Example:
bluetooth { bluetooth {
compatible = "ti,wl1835-st"; compatible = "ti,wl1835-st";
enable-gpios = <&gpio1 7 GPIO_ACTIVE_HIGH>; enable-gpios = <&gpio1 7 GPIO_ACTIVE_HIGH>;
clocks = <&clk32k_wl18xx>;
clock-names = "ext_clock";
}; };
}; };
...@@ -141,6 +141,8 @@ uart1: uart@f7111000 { ...@@ -141,6 +141,8 @@ uart1: uart@f7111000 {
bluetooth { bluetooth {
compatible = "ti,wl1835-st"; compatible = "ti,wl1835-st";
enable-gpios = <&gpio1 7 GPIO_ACTIVE_HIGH>; enable-gpios = <&gpio1 7 GPIO_ACTIVE_HIGH>;
clocks = <&pmic>;
clock-names = "ext_clock";
}; };
}; };
......
...@@ -246,6 +246,27 @@ static struct sk_buff *btbcm_read_verbose_config(struct hci_dev *hdev) ...@@ -246,6 +246,27 @@ static struct sk_buff *btbcm_read_verbose_config(struct hci_dev *hdev)
return skb; return skb;
} }
static struct sk_buff *btbcm_read_controller_features(struct hci_dev *hdev)
{
struct sk_buff *skb;
skb = __hci_cmd_sync(hdev, 0xfc6e, 0, NULL, HCI_INIT_TIMEOUT);
if (IS_ERR(skb)) {
BT_ERR("%s: BCM: Read controller features failed (%ld)",
hdev->name, PTR_ERR(skb));
return skb;
}
if (skb->len != 9) {
BT_ERR("%s: BCM: Controller features length mismatch",
hdev->name);
kfree_skb(skb);
return ERR_PTR(-EIO);
}
return skb;
}
static struct sk_buff *btbcm_read_usb_product(struct hci_dev *hdev) static struct sk_buff *btbcm_read_usb_product(struct hci_dev *hdev)
{ {
struct sk_buff *skb; struct sk_buff *skb;
...@@ -417,6 +438,14 @@ int btbcm_setup_patchram(struct hci_dev *hdev) ...@@ -417,6 +438,14 @@ int btbcm_setup_patchram(struct hci_dev *hdev)
BT_INFO("%s: BCM: chip id %u", hdev->name, skb->data[1]); BT_INFO("%s: BCM: chip id %u", hdev->name, skb->data[1]);
kfree_skb(skb); kfree_skb(skb);
/* Read Controller Features */
skb = btbcm_read_controller_features(hdev);
if (IS_ERR(skb))
return PTR_ERR(skb);
BT_INFO("%s: BCM: features 0x%2.2x", hdev->name, skb->data[1]);
kfree_skb(skb);
/* Read Local Name */ /* Read Local Name */
skb = btbcm_read_local_name(hdev); skb = btbcm_read_local_name(hdev);
if (IS_ERR(skb)) if (IS_ERR(skb))
...@@ -540,6 +569,13 @@ int btbcm_setup_apple(struct hci_dev *hdev) ...@@ -540,6 +569,13 @@ int btbcm_setup_apple(struct hci_dev *hdev)
kfree_skb(skb); kfree_skb(skb);
} }
/* Read Controller Features */
skb = btbcm_read_controller_features(hdev);
if (!IS_ERR(skb)) {
BT_INFO("%s: BCM: features 0x%2.2x", hdev->name, skb->data[1]);
kfree_skb(skb);
}
/* Read Local Name */ /* Read Local Name */
skb = btbcm_read_local_name(hdev); skb = btbcm_read_local_name(hdev);
if (!IS_ERR(skb)) { if (!IS_ERR(skb)) {
......
...@@ -266,6 +266,7 @@ static const struct usb_device_id blacklist_table[] = { ...@@ -266,6 +266,7 @@ static const struct usb_device_id blacklist_table[] = {
{ USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME }, { USB_DEVICE(0x0cf3, 0xe301), .driver_info = BTUSB_QCA_ROME },
{ USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME }, { USB_DEVICE(0x0cf3, 0xe360), .driver_info = BTUSB_QCA_ROME },
{ USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME }, { USB_DEVICE(0x0489, 0xe092), .driver_info = BTUSB_QCA_ROME },
{ USB_DEVICE(0x0489, 0xe0a2), .driver_info = BTUSB_QCA_ROME },
{ USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME }, { USB_DEVICE(0x04ca, 0x3011), .driver_info = BTUSB_QCA_ROME },
/* Broadcom BCM2035 */ /* Broadcom BCM2035 */
......
...@@ -762,8 +762,7 @@ static int bcm_acpi_probe(struct bcm_device *dev) ...@@ -762,8 +762,7 @@ static int bcm_acpi_probe(struct bcm_device *dev)
if (id) if (id)
gpio_mapping = (const struct acpi_gpio_mapping *) id->driver_data; gpio_mapping = (const struct acpi_gpio_mapping *) id->driver_data;
ret = acpi_dev_add_driver_gpios(ACPI_COMPANION(&pdev->dev), ret = devm_acpi_dev_add_driver_gpios(&pdev->dev, gpio_mapping);
gpio_mapping);
if (ret) if (ret)
return ret; return ret;
...@@ -834,8 +833,6 @@ static int bcm_remove(struct platform_device *pdev) ...@@ -834,8 +833,6 @@ static int bcm_remove(struct platform_device *pdev)
list_del(&dev->list); list_del(&dev->list);
mutex_unlock(&bcm_device_lock); mutex_unlock(&bcm_device_lock);
acpi_dev_remove_driver_gpios(ACPI_COMPANION(&pdev->dev));
dev_info(&pdev->dev, "%s device unregistered.\n", dev->name); dev_info(&pdev->dev, "%s device unregistered.\n", dev->name);
return 0; return 0;
......
...@@ -1205,9 +1205,19 @@ static const struct dev_pm_ops intel_pm_ops = { ...@@ -1205,9 +1205,19 @@ static const struct dev_pm_ops intel_pm_ops = {
SET_RUNTIME_PM_OPS(intel_suspend_device, intel_resume_device, NULL) SET_RUNTIME_PM_OPS(intel_suspend_device, intel_resume_device, NULL)
}; };
static const struct acpi_gpio_params reset_gpios = { 0, 0, false };
static const struct acpi_gpio_params host_wake_gpios = { 1, 0, false };
static const struct acpi_gpio_mapping acpi_hci_intel_gpios[] = {
{ "reset-gpios", &reset_gpios, 1 },
{ "host-wake-gpios", &host_wake_gpios, 1 },
{ },
};
static int intel_probe(struct platform_device *pdev) static int intel_probe(struct platform_device *pdev)
{ {
struct intel_device *idev; struct intel_device *idev;
int ret;
idev = devm_kzalloc(&pdev->dev, sizeof(*idev), GFP_KERNEL); idev = devm_kzalloc(&pdev->dev, sizeof(*idev), GFP_KERNEL);
if (!idev) if (!idev)
...@@ -1217,6 +1227,10 @@ static int intel_probe(struct platform_device *pdev) ...@@ -1217,6 +1227,10 @@ static int intel_probe(struct platform_device *pdev)
idev->pdev = pdev; idev->pdev = pdev;
ret = devm_acpi_dev_add_driver_gpios(&pdev->dev, acpi_hci_intel_gpios);
if (ret)
dev_dbg(&pdev->dev, "Unable to add GPIO mapping table\n");
idev->reset = devm_gpiod_get(&pdev->dev, "reset", GPIOD_OUT_LOW); idev->reset = devm_gpiod_get(&pdev->dev, "reset", GPIOD_OUT_LOW);
if (IS_ERR(idev->reset)) { if (IS_ERR(idev->reset)) {
dev_err(&pdev->dev, "Unable to retrieve gpio\n"); dev_err(&pdev->dev, "Unable to retrieve gpio\n");
......
...@@ -48,6 +48,7 @@ ...@@ -48,6 +48,7 @@
#include <linux/serdev.h> #include <linux/serdev.h>
#include <linux/skbuff.h> #include <linux/skbuff.h>
#include <linux/ti_wilink_st.h> #include <linux/ti_wilink_st.h>
#include <linux/clk.h>
#include <net/bluetooth/bluetooth.h> #include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h> #include <net/bluetooth/hci_core.h>
...@@ -84,6 +85,7 @@ struct ll_device { ...@@ -84,6 +85,7 @@ struct ll_device {
struct hci_uart hu; struct hci_uart hu;
struct serdev_device *serdev; struct serdev_device *serdev;
struct gpio_desc *enable_gpio; struct gpio_desc *enable_gpio;
struct clk *ext_clk;
}; };
struct ll_struct { struct ll_struct {
...@@ -146,8 +148,12 @@ static int ll_open(struct hci_uart *hu) ...@@ -146,8 +148,12 @@ static int ll_open(struct hci_uart *hu)
hu->priv = ll; hu->priv = ll;
if (hu->serdev) if (hu->serdev) {
struct ll_device *lldev = serdev_device_get_drvdata(hu->serdev);
serdev_device_open(hu->serdev); serdev_device_open(hu->serdev);
if (!IS_ERR(lldev->ext_clk))
clk_prepare_enable(lldev->ext_clk);
}
return 0; return 0;
} }
...@@ -181,6 +187,8 @@ static int ll_close(struct hci_uart *hu) ...@@ -181,6 +187,8 @@ static int ll_close(struct hci_uart *hu)
struct ll_device *lldev = serdev_device_get_drvdata(hu->serdev); struct ll_device *lldev = serdev_device_get_drvdata(hu->serdev);
gpiod_set_value_cansleep(lldev->enable_gpio, 0); gpiod_set_value_cansleep(lldev->enable_gpio, 0);
clk_disable_unprepare(lldev->ext_clk);
serdev_device_close(hu->serdev); serdev_device_close(hu->serdev);
} }
...@@ -721,6 +729,10 @@ static int hci_ti_probe(struct serdev_device *serdev) ...@@ -721,6 +729,10 @@ static int hci_ti_probe(struct serdev_device *serdev)
if (IS_ERR(lldev->enable_gpio)) if (IS_ERR(lldev->enable_gpio))
return PTR_ERR(lldev->enable_gpio); return PTR_ERR(lldev->enable_gpio);
lldev->ext_clk = devm_clk_get(&serdev->dev, "ext_clock");
if (IS_ERR(lldev->ext_clk) && PTR_ERR(lldev->ext_clk) != -ENOENT)
return PTR_ERR(lldev->ext_clk);
of_property_read_u32(serdev->dev.of_node, "max-speed", &max_speed); of_property_read_u32(serdev->dev.of_node, "max-speed", &max_speed);
hci_uart_set_speeds(hu, 115200, max_speed); hci_uart_set_speeds(hu, 115200, max_speed);
...@@ -741,6 +753,14 @@ static void hci_ti_remove(struct serdev_device *serdev) ...@@ -741,6 +753,14 @@ static void hci_ti_remove(struct serdev_device *serdev)
} }
static const struct of_device_id hci_ti_of_match[] = { static const struct of_device_id hci_ti_of_match[] = {
{ .compatible = "ti,wl1271-st" },
{ .compatible = "ti,wl1273-st" },
{ .compatible = "ti,wl1281-st" },
{ .compatible = "ti,wl1283-st" },
{ .compatible = "ti,wl1285-st" },
{ .compatible = "ti,wl1801-st" },
{ .compatible = "ti,wl1805-st" },
{ .compatible = "ti,wl1807-st" },
{ .compatible = "ti,wl1831-st" }, { .compatible = "ti,wl1831-st" },
{ .compatible = "ti,wl1835-st" }, { .compatible = "ti,wl1835-st" },
{ .compatible = "ti,wl1837-st" }, { .compatible = "ti,wl1837-st" },
......
...@@ -548,6 +548,7 @@ static void hci_set_event_mask_page_2(struct hci_request *req) ...@@ -548,6 +548,7 @@ static void hci_set_event_mask_page_2(struct hci_request *req)
{ {
struct hci_dev *hdev = req->hdev; struct hci_dev *hdev = req->hdev;
u8 events[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; u8 events[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
bool changed = false;
/* If Connectionless Slave Broadcast master role is supported /* If Connectionless Slave Broadcast master role is supported
* enable all necessary events for it. * enable all necessary events for it.
...@@ -557,6 +558,7 @@ static void hci_set_event_mask_page_2(struct hci_request *req) ...@@ -557,6 +558,7 @@ static void hci_set_event_mask_page_2(struct hci_request *req)
events[1] |= 0x80; /* Synchronization Train Complete */ events[1] |= 0x80; /* Synchronization Train Complete */
events[2] |= 0x10; /* Slave Page Response Timeout */ events[2] |= 0x10; /* Slave Page Response Timeout */
events[2] |= 0x20; /* CSB Channel Map Change */ events[2] |= 0x20; /* CSB Channel Map Change */
changed = true;
} }
/* If Connectionless Slave Broadcast slave role is supported /* If Connectionless Slave Broadcast slave role is supported
...@@ -567,13 +569,24 @@ static void hci_set_event_mask_page_2(struct hci_request *req) ...@@ -567,13 +569,24 @@ static void hci_set_event_mask_page_2(struct hci_request *req)
events[2] |= 0x02; /* CSB Receive */ events[2] |= 0x02; /* CSB Receive */
events[2] |= 0x04; /* CSB Timeout */ events[2] |= 0x04; /* CSB Timeout */
events[2] |= 0x08; /* Truncated Page Complete */ events[2] |= 0x08; /* Truncated Page Complete */
changed = true;
} }
/* Enable Authenticated Payload Timeout Expired event if supported */ /* Enable Authenticated Payload Timeout Expired event if supported */
if (lmp_ping_capable(hdev) || hdev->le_features[0] & HCI_LE_PING) if (lmp_ping_capable(hdev) || hdev->le_features[0] & HCI_LE_PING) {
events[2] |= 0x80; events[2] |= 0x80;
changed = true;
}
hci_req_add(req, HCI_OP_SET_EVENT_MASK_PAGE_2, sizeof(events), events); /* Some Broadcom based controllers indicate support for Set Event
* Mask Page 2 command, but then actually do not support it. Since
* the default value is all bits set to zero, the command is only
* required if the event mask has to be changed. In case no change
* to the event mask is needed, skip this command.
*/
if (changed)
hci_req_add(req, HCI_OP_SET_EVENT_MASK_PAGE_2,
sizeof(events), events);
} }
static int hci_init3_req(struct hci_request *req, unsigned long opt) static int hci_init3_req(struct hci_request *req, unsigned long opt)
......
...@@ -23,6 +23,7 @@ ...@@ -23,6 +23,7 @@
#include <linux/debugfs.h> #include <linux/debugfs.h>
#include <linux/scatterlist.h> #include <linux/scatterlist.h>
#include <linux/crypto.h> #include <linux/crypto.h>
#include <crypto/algapi.h>
#include <crypto/b128ops.h> #include <crypto/b128ops.h>
#include <crypto/hash.h> #include <crypto/hash.h>
...@@ -523,7 +524,7 @@ bool smp_irk_matches(struct hci_dev *hdev, const u8 irk[16], ...@@ -523,7 +524,7 @@ bool smp_irk_matches(struct hci_dev *hdev, const u8 irk[16],
if (err) if (err)
return false; return false;
return !memcmp(bdaddr->b, hash, 3); return !crypto_memneq(bdaddr->b, hash, 3);
} }
int smp_generate_rpa(struct hci_dev *hdev, const u8 irk[16], bdaddr_t *rpa) int smp_generate_rpa(struct hci_dev *hdev, const u8 irk[16], bdaddr_t *rpa)
...@@ -579,7 +580,7 @@ int smp_generate_oob(struct hci_dev *hdev, u8 hash[16], u8 rand[16]) ...@@ -579,7 +580,7 @@ int smp_generate_oob(struct hci_dev *hdev, u8 hash[16], u8 rand[16])
/* This is unlikely, but we need to check that /* This is unlikely, but we need to check that
* we didn't accidentially generate a debug key. * we didn't accidentially generate a debug key.
*/ */
if (memcmp(smp->local_sk, debug_sk, 32)) if (crypto_memneq(smp->local_sk, debug_sk, 32))
break; break;
} }
smp->debug_key = false; smp->debug_key = false;
...@@ -993,7 +994,7 @@ static u8 smp_random(struct smp_chan *smp) ...@@ -993,7 +994,7 @@ static u8 smp_random(struct smp_chan *smp)
if (ret) if (ret)
return SMP_UNSPECIFIED; return SMP_UNSPECIFIED;
if (memcmp(smp->pcnf, confirm, sizeof(smp->pcnf)) != 0) { if (crypto_memneq(smp->pcnf, confirm, sizeof(smp->pcnf))) {
BT_ERR("Pairing failed (confirmation values mismatch)"); BT_ERR("Pairing failed (confirmation values mismatch)");
return SMP_CONFIRM_FAILED; return SMP_CONFIRM_FAILED;
} }
...@@ -1512,7 +1513,7 @@ static u8 sc_passkey_round(struct smp_chan *smp, u8 smp_op) ...@@ -1512,7 +1513,7 @@ static u8 sc_passkey_round(struct smp_chan *smp, u8 smp_op)
smp->rrnd, r, cfm)) smp->rrnd, r, cfm))
return SMP_UNSPECIFIED; return SMP_UNSPECIFIED;
if (memcmp(smp->pcnf, cfm, 16)) if (crypto_memneq(smp->pcnf, cfm, 16))
return SMP_CONFIRM_FAILED; return SMP_CONFIRM_FAILED;
smp->passkey_round++; smp->passkey_round++;
...@@ -1908,7 +1909,7 @@ static u8 sc_send_public_key(struct smp_chan *smp) ...@@ -1908,7 +1909,7 @@ static u8 sc_send_public_key(struct smp_chan *smp)
/* This is unlikely, but we need to check that /* This is unlikely, but we need to check that
* we didn't accidentially generate a debug key. * we didn't accidentially generate a debug key.
*/ */
if (memcmp(smp->local_sk, debug_sk, 32)) if (crypto_memneq(smp->local_sk, debug_sk, 32))
break; break;
} }
} }
...@@ -2176,7 +2177,7 @@ static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb) ...@@ -2176,7 +2177,7 @@ static u8 smp_cmd_pairing_random(struct l2cap_conn *conn, struct sk_buff *skb)
if (err) if (err)
return SMP_UNSPECIFIED; return SMP_UNSPECIFIED;
if (memcmp(smp->pcnf, cfm, 16)) if (crypto_memneq(smp->pcnf, cfm, 16))
return SMP_CONFIRM_FAILED; return SMP_CONFIRM_FAILED;
} else { } else {
smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd), smp_send_cmd(conn, SMP_CMD_PAIRING_RANDOM, sizeof(smp->prnd),
...@@ -2660,7 +2661,7 @@ static int smp_cmd_public_key(struct l2cap_conn *conn, struct sk_buff *skb) ...@@ -2660,7 +2661,7 @@ static int smp_cmd_public_key(struct l2cap_conn *conn, struct sk_buff *skb)
if (err) if (err)
return SMP_UNSPECIFIED; return SMP_UNSPECIFIED;
if (memcmp(cfm.confirm_val, smp->pcnf, 16)) if (crypto_memneq(cfm.confirm_val, smp->pcnf, 16))
return SMP_CONFIRM_FAILED; return SMP_CONFIRM_FAILED;
} }
...@@ -2693,7 +2694,7 @@ static int smp_cmd_public_key(struct l2cap_conn *conn, struct sk_buff *skb) ...@@ -2693,7 +2694,7 @@ static int smp_cmd_public_key(struct l2cap_conn *conn, struct sk_buff *skb)
else else
hcon->pending_sec_level = BT_SECURITY_FIPS; hcon->pending_sec_level = BT_SECURITY_FIPS;
if (!memcmp(debug_pk, smp->remote_pk, 64)) if (!crypto_memneq(debug_pk, smp->remote_pk, 64))
set_bit(SMP_FLAG_DEBUG_KEY, &smp->flags); set_bit(SMP_FLAG_DEBUG_KEY, &smp->flags);
if (smp->method == DSP_PASSKEY) { if (smp->method == DSP_PASSKEY) {
...@@ -2792,7 +2793,7 @@ static int smp_cmd_dhkey_check(struct l2cap_conn *conn, struct sk_buff *skb) ...@@ -2792,7 +2793,7 @@ static int smp_cmd_dhkey_check(struct l2cap_conn *conn, struct sk_buff *skb)
if (err) if (err)
return SMP_UNSPECIFIED; return SMP_UNSPECIFIED;
if (memcmp(check->e, e, 16)) if (crypto_memneq(check->e, e, 16))
return SMP_DHKEY_CHECK_FAILED; return SMP_DHKEY_CHECK_FAILED;
if (!hcon->out) { if (!hcon->out) {
...@@ -3506,10 +3507,10 @@ static int __init test_debug_key(void) ...@@ -3506,10 +3507,10 @@ static int __init test_debug_key(void)
if (!generate_ecdh_keys(pk, sk)) if (!generate_ecdh_keys(pk, sk))
return -EINVAL; return -EINVAL;
if (memcmp(sk, debug_sk, 32)) if (crypto_memneq(sk, debug_sk, 32))
return -EINVAL; return -EINVAL;
if (memcmp(pk, debug_pk, 64)) if (crypto_memneq(pk, debug_pk, 64))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3529,7 +3530,7 @@ static int __init test_ah(struct crypto_cipher *tfm_aes) ...@@ -3529,7 +3530,7 @@ static int __init test_ah(struct crypto_cipher *tfm_aes)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 3)) if (crypto_memneq(res, exp, 3))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3559,7 +3560,7 @@ static int __init test_c1(struct crypto_cipher *tfm_aes) ...@@ -3559,7 +3560,7 @@ static int __init test_c1(struct crypto_cipher *tfm_aes)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 16)) if (crypto_memneq(res, exp, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3584,7 +3585,7 @@ static int __init test_s1(struct crypto_cipher *tfm_aes) ...@@ -3584,7 +3585,7 @@ static int __init test_s1(struct crypto_cipher *tfm_aes)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 16)) if (crypto_memneq(res, exp, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3616,7 +3617,7 @@ static int __init test_f4(struct crypto_shash *tfm_cmac) ...@@ -3616,7 +3617,7 @@ static int __init test_f4(struct crypto_shash *tfm_cmac)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 16)) if (crypto_memneq(res, exp, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3650,10 +3651,10 @@ static int __init test_f5(struct crypto_shash *tfm_cmac) ...@@ -3650,10 +3651,10 @@ static int __init test_f5(struct crypto_shash *tfm_cmac)
if (err) if (err)
return err; return err;
if (memcmp(mackey, exp_mackey, 16)) if (crypto_memneq(mackey, exp_mackey, 16))
return -EINVAL; return -EINVAL;
if (memcmp(ltk, exp_ltk, 16)) if (crypto_memneq(ltk, exp_ltk, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3686,7 +3687,7 @@ static int __init test_f6(struct crypto_shash *tfm_cmac) ...@@ -3686,7 +3687,7 @@ static int __init test_f6(struct crypto_shash *tfm_cmac)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 16)) if (crypto_memneq(res, exp, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
...@@ -3740,7 +3741,7 @@ static int __init test_h6(struct crypto_shash *tfm_cmac) ...@@ -3740,7 +3741,7 @@ static int __init test_h6(struct crypto_shash *tfm_cmac)
if (err) if (err)
return err; return err;
if (memcmp(res, exp, 16)) if (crypto_memneq(res, exp, 16))
return -EINVAL; return -EINVAL;
return 0; return 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment