Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2416091ybi; Sun, 9 Jun 2019 11:12:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqw1IPEZSQcyuTUSUDsKiQo1VWYp7JwDYHJBuqpNSqjfMeXzrRi7yqSCDE1XBXMSyBovSM6f X-Received: by 2002:a65:5688:: with SMTP id v8mr12516511pgs.138.1560103945760; Sun, 09 Jun 2019 11:12:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560103945; cv=none; d=google.com; s=arc-20160816; b=xuMaKTBj+gim0hg57NIVosARd6sk86leL0b9gdW+zqtb97trjnAIi0/w1U++iJtqT6 cKrS607ERHzi2zjHitrI9vRnCCMEoGAQZadACy7B5jhDyA9MaUV9Mg8Av1tXxbkjfr1F 96S4CeUznjaw8DrlVQ34SVwsj+Y46788kV71MiDYpZeNTtacu0DFEP3iEND5rbW318dj Cs49FJKJQpQlgD2a+SgdHgaUNi94Zj2O7hmYZTXaRrWj8dsXLdGYxz9QVv5WRw7vvXb1 Q9FxDd/I2RYLIsKCPHcsQdDpWyv9yvb7tmdDOsdRGUtzkd/Hyl521CEl08jrPFfyFbzf R2Rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Zmb9GUcDlaqMuIgqkzEqkMW1sXQLg+dY4SfC2fpb6nc=; b=Kkc8VoF4rJWgzkt4pN2KqQGBt5JdhRxoTdBrJKm0cgwPt0/ctfm5mN9eZH8pItzM7u 5wO63pZrpqksPapYiDRs48CqC8WqAqH55H0vkXIJez1HW1OsMwzwlj1F7ZnnpPivXq17 VKYDZoxqLuy4uOKbwfxZLNchyNv3nJUd6hFHPIYdDdM0APzwUzgPtCJZGvMUd3dj2a3Q 9v9wHmXSxE+6V+CxmXG+G3QVHivXa4G7jveVXcox8Ku901No7lfbrOLRMR/5uhsSA/2V 7FRY+9kbnieM3UyCxPPfzfDBGaEyC9DWu20t44ivxkxq5ujgve8YcSz6nskiDY+2st7I 7pow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QNCZOsBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 37si6417466pld.231.2019.06.09.11.12.10; Sun, 09 Jun 2019 11:12:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QNCZOsBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733243AbfFIQ5s (ORCPT + 99 others); Sun, 9 Jun 2019 12:57:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:60866 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733230AbfFIQ5o (ORCPT ); Sun, 9 Jun 2019 12:57:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C7035206DF; Sun, 9 Jun 2019 16:57:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560099464; bh=NELJ4Hu6YiJbJlmxwVlRRrxhcEXBUQ4E/XUnMCsrArw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QNCZOsBZrH3ts+STNvbAZgc4fE1KHvtIqLeoQaDP3cMR6AtoFinjGkLHToFdf+b8G BhR5gZ3+mXLciWf3IcaOPuwJIHJ5R8UDzZOsh3ubnLoXtYu8eIWUCOFqJZm30QyHZO N2aWyjelGVdYP7h4ooQiEqJE3N1ASc9f6C2Fvhfo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tim Chen , Eric Biggers , Herbert Xu Subject: [PATCH 4.4 005/241] crypto: crct10dif-generic - fix use via crypto_shash_digest() Date: Sun, 9 Jun 2019 18:39:07 +0200 Message-Id: <20190609164147.943020718@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190609164147.729157653@linuxfoundation.org> References: <20190609164147.729157653@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers commit 307508d1072979f4435416f87936f87eaeb82054 upstream. The ->digest() method of crct10dif-generic reads the current CRC value from the shash_desc context. But this value is uninitialized, causing crypto_shash_digest() to compute the wrong result. Fix it. Probably this wasn't noticed before because lib/crc-t10dif.c only uses crypto_shash_update(), not crypto_shash_digest(). Likewise, crypto_shash_digest() is not yet tested by the crypto self-tests because those only test the ahash API which only uses shash init/update/final. This bug was detected by my patches that improve testmgr to fuzz algorithms against their generic implementation. Fixes: 2d31e518a428 ("crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework") Cc: # v3.11+ Cc: Tim Chen Signed-off-by: Eric Biggers Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- crypto/crct10dif_generic.c | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) --- a/crypto/crct10dif_generic.c +++ b/crypto/crct10dif_generic.c @@ -65,10 +65,9 @@ static int chksum_final(struct shash_des return 0; } -static int __chksum_finup(__u16 *crcp, const u8 *data, unsigned int len, - u8 *out) +static int __chksum_finup(__u16 crc, const u8 *data, unsigned int len, u8 *out) { - *(__u16 *)out = crc_t10dif_generic(*crcp, data, len); + *(__u16 *)out = crc_t10dif_generic(crc, data, len); return 0; } @@ -77,15 +76,13 @@ static int chksum_finup(struct shash_des { struct chksum_desc_ctx *ctx = shash_desc_ctx(desc); - return __chksum_finup(&ctx->crc, data, len, out); + return __chksum_finup(ctx->crc, data, len, out); } static int chksum_digest(struct shash_desc *desc, const u8 *data, unsigned int length, u8 *out) { - struct chksum_desc_ctx *ctx = shash_desc_ctx(desc); - - return __chksum_finup(&ctx->crc, data, length, out); + return __chksum_finup(0, data, length, out); } static struct shash_alg alg = {