[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1722859.P06iN7WPkX@myon.chronox.de>
Date: Sat, 02 Jan 2016 10:20:16 +0100
From: Stephan Mueller <smueller@...onox.de>
To: Herbert Xu <herbert@...dor.apana.org.au>
Cc: Dmitry Vyukov <dvyukov@...gle.com>,
"David S. Miller" <davem@...emloft.net>,
linux-crypto@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
syzkaller <syzkaller@...glegroups.com>,
Kostya Serebryany <kcc@...gle.com>,
Alexander Potapenko <glider@...gle.com>,
Sasha Levin <sasha.levin@...cle.com>,
Eric Dumazet <edumazet@...gle.com>
Subject: Re: [PATCH v2] crypto: af_alg - Disallow bind/setkey/... after accept(2)
Am Freitag, 1. Januar 2016, 21:12:40 schrieb Stephan Mueller:
Hi Herbert,
> Am Mittwoch, 30. Dezember 2015, 11:47:53 schrieb Herbert Xu:
>
> Hi Herbert,
>
> > On Tue, Dec 29, 2015 at 07:36:14PM +0100, Dmitry Vyukov wrote:
> > > Hello,
> > >
> > > On commit 8513342170278468bac126640a5d2d12ffbff106
> > > + crypto: algif_skcipher - Use new skcipher interface
> > > + crypto: algif_skcipher - Require setkey before accept(2)
> > > + crypto: af_alg - Disallow bind/setkey/... after accept(2)
> >
> > OK there is a silly bug in the last patch. Here is an updated
> > version.
>
> With this patch, the AF_ALG interface stops working. I tested the HMAC
> operation and I am unable to set the key with the following call:
>
> ret = setsockopt(handle->tfmfd, SOL_ALG, ALG_SET_KEY, key, keylen);
>
> This call returns EBUSY.
Please disregard my email. I did not update my library to the newly requested
order of performing the setkey before the accept call. After the update of my
library I can confirm that the modification works for all AF_ALG interfaces.
--
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists