diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2019-08-19 17:22:25 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2019-08-30 18:05:27 +1000 |
commit | 84a0b00aa486c0ab0216771c5cb988e2277b7498 (patch) | |
tree | ce7bbea315d489a23786fd662f64530ae068c413 /net/wireless/pmsr.c | |
parent | 735177ca148af5049e9e98b38eaba0c769182655 (diff) | |
download | linux-84a0b00aa486c0ab0216771c5cb988e2277b7498.tar.bz2 |
crypto: s5p - deal gracefully with bogus input sizes
The s5p skcipher driver returns -EINVAL for zero length inputs, which
deviates from the behavior of the generic ECB template, and causes fuzz
tests to fail. In cases where the input is not a multiple of the AES
block size (and the chaining mode is not CTR), it prints an error to
the kernel log, which is a thing we usually try to avoid in response
to situations that can be triggered by unprivileged users.
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Acked-by: Kamil Konieczny <k.konieczny@partner.samsung.com>
Reviewed-by: Krzysztof Kozlowski <krzk@kernel.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'net/wireless/pmsr.c')
0 files changed, 0 insertions, 0 deletions