On Thu, May 10, 2007 at 11:57:17AM +0200, Sebastian Siewior wrote:
> setkey() in {cipher,blkcipher,ablkcipher,hash}.c does not respect the
> requested alignment by the algorithm. This patch fixes it.
Thanks for the patch!
> +static int setkey_unaligned(struct crypto_tfm *tfm, const u8 *key, unsigned
> int keylen,
> + unsigned long alignmask)
> +{
> + struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher;
> + u8 buffer[keylen + alignmask];
Hmm, I'm not comfortable with this since keylen could be unbounded,
especially for hash algorithms. How about getting the memory via
kmalloc instead?
Cheers,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <[EMAIL PROTECTED]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html