lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 11 Jan 2017 15:13:40 +0000 From: David Laight <David.Laight@...LAB.COM> To: 'Andy Lutomirski' <luto@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Netdev <netdev@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, Linux Crypto Mailing List <linux-crypto@...r.kernel.org> CC: "Jason A. Donenfeld" <Jason@...c4.com>, Hannes Frederic Sowa <hannes@...essinduktion.org>, Alexei Starovoitov <alexei.starovoitov@...il.com>, Eric Dumazet <edumazet@...gle.com>, "Eric Biggers" <ebiggers3@...il.com>, Tom Herbert <tom@...bertland.com>, "David S. Miller" <davem@...emloft.net>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Herbert Xu <herbert@...dor.apana.org.au> Subject: RE: [PATCH v2 8/8] crypto/testmgr: Allocate only the required output size for hash tests From: Andy Lutomirski > Sent: 10 January 2017 23:25 > There are some hashes (e.g. sha224) that have some internal trickery > to make sure that only the correct number of output bytes are > generated. If something goes wrong, they could potentially overrun > the output buffer. > > Make the test more robust by allocating only enough space for the > correct output size so that memory debugging will catch the error if > the output is overrun. Might be better to test this by allocating an overlong buffer and then explicitly checking that the output hasn't overrun the allowed space. If nothing else the error message will be clearer. David
Powered by blists - more mailing lists