[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5693C35C.1090906@gmail.com>
Date: Mon, 11 Jan 2016 15:59:40 +0100
From: Milan Broz <gmazyland@...il.com>
To: Herbert Xu <herbert@...dor.apana.org.au>
Cc: Stephan Mueller <smueller@...onox.de>,
Dmitry Vyukov <dvyukov@...gle.com>, syzkaller@...glegroups.com,
davem@...emloft.net, linux-crypto@...r.kernel.org,
linux-kernel@...r.kernel.org, kcc@...gle.com, glider@...gle.com,
edumazet@...gle.com, sasha.levin@...cle.com, keescook@...gle.com,
Ondrej Kozina <okozina@...hat.com>
Subject: Re: [PATCH 2/2] crypto: algif_skcipher - Add key check exception for
cipher_null
On 01/11/2016 02:29 PM, Herbert Xu wrote:
> This patch adds an exception to the key check so that cipher_null
> users may continue to use algif_skcipher without setting a key.
>
> Signed-off-by: Herbert Xu <herbert@...dor.apana.org.au>
>
> diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
> index 110bab4..4a5bdb6 100644
> --- a/crypto/algif_skcipher.c
> +++ b/crypto/algif_skcipher.c
> @@ -978,7 +978,7 @@ static int skcipher_accept_parent(void *private, struct sock *sk)
> {
> struct skcipher_tfm *tfm = private;
>
> - if (!tfm->has_key)
> + if (!tfm->has_key && crypto_skcipher_has_setkey(tfm->skcipher))
> return -ENOKEY;
>
> return skcipher_accept_parent_common(private, sk);
Reported-and-tested-by: Milan Broz <gmazyland@...il.com>
Thanks,
Milan
Powered by blists - more mailing lists