lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 31 Mar 2019 20:18:13 +0200 From: "Jason A. Donenfeld" <Jason@...c4.com> To: Eric Biggers <ebiggers@...nel.org> Cc: Herbert Xu <herbert@...dor.apana.org.au>, Linux Crypto Mailing List <linux-crypto@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, Netdev <netdev@...r.kernel.org>, Linus Torvalds <torvalds@...ux-foundation.org>, David Miller <davem@...emloft.net>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Samuel Neves <samuel.c.p.neves@...il.com> Subject: Re: [PATCH net-next v9 00/19] WireGuard: Secure Network Tunnel On Sat, Mar 30, 2019 at 6:53 AM Eric Biggers <ebiggers@...nel.org> wrote: > poly1305-simd is among the failing algorithms because it loses carry bits when > handling long "all 0xff bytes" inputs. poly1305-avx2-x86_64.S is definitely > broken, and poly1305-sse2-x86_64.S *might* be too. I am working on a patch... Yea.... yikes. I'm kind of souring on this plan of having to deal with that code in Zinc, versus the extensively studied, fuzzed, and scrutinized code from Andy. Subtle carry bugs like that are kind of a testament to my overall plan of preferring formally verified or heavily used implementations to bespoke ones. This stuff is hard to get right. Jason
Powered by blists - more mailing lists