[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171122195139.121269-1-ebiggers3@gmail.com>
Date: Wed, 22 Nov 2017 11:51:34 -0800
From: Eric Biggers <ebiggers3@...il.com>
To: linux-crypto@...r.kernel.org,
Herbert Xu <herbert@...dor.apana.org.au>
Cc: Theodore Ts'o <tytso@....edu>,
"Jason A . Donenfeld" <Jason@...c4.com>,
Martin Willi <martin@...ongswan.org>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
linux-kernel@...r.kernel.org, Eric Biggers <ebiggers@...gle.com>
Subject: [PATCH 0/5] crypto: chacha20 - Alignment fixes
From: Eric Biggers <ebiggers@...gle.com>
This series fixes potentially unaligned memory accesses when loading the
initial state, key, and IV for ChaCha20, and when outputting each
keystream block.
It also removes the cra_alignmask from the generic and x86 ChaCha20
implementations, once it is no longer needed.
Eric Biggers (5):
crypto: chacha20 - Fix unaligned access when loading constants
crypto: chacha20 - Use unaligned access macros when loading key and IV
crypto: chacha20 - Remove cra_alignmask
crypto: x86/chacha20 - Remove cra_alignmask
crypto: chacha20 - Fix keystream alignment for chacha20_block()
arch/x86/crypto/chacha20_glue.c | 1 -
crypto/chacha20_generic.c | 33 +++++++++++++--------------------
drivers/char/random.c | 24 ++++++++++++------------
include/crypto/chacha20.h | 3 ++-
lib/chacha20.c | 2 +-
5 files changed, 28 insertions(+), 35 deletions(-)
--
2.15.0.448.gf294e3d99a-goog
Powered by blists - more mailing lists