Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1081210pxf; Fri, 2 Apr 2021 00:13:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxHxH2pZdjpSGDB8EaDXeASsZ5Z6oU3lyHtir0jyFKkvOVkup024zKeIagfCHJSU13c9t1A X-Received: by 2002:a17:907:d1f:: with SMTP id gn31mr12779094ejc.536.1617347611038; Fri, 02 Apr 2021 00:13:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617347611; cv=none; d=google.com; s=arc-20160816; b=VrYQQAvf8iiKf5DIXLhimkWo0cDZcWKKAafPDODz2M7RVr/8LBmxAreNYibsJVeJQm k1c3xd1PE8nsYGEWslNb0CwEjO3VW1WhkxRwms6O/N3sMTuNMNsKP22CpdW1r+P4YhB1 deVsbWZAm6RZLAVE1y6t0FlBAKbx/dOJ2eF2cs2PxR4js3lEOF6axiR/Offz6IXPF+yB lSAsxy0IgICBQvwkTZ5N43Lv1GoWQseTpccw5poqSwx69hTprjHtxLPjHBgdG143eIqj AlgBkO5XT8KzL/InH07GlnrH5S3YSzohlama/207aaIRujTsJbe2278mWY4yJRoHs7zL MHYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=S6MH+M5wrueVgZhhJ5SUKpNlowTTC+7ETD0FiBHvfS0=; b=y28y1qT6Y+TBF/XJ3pcpG6wL4mhBiwIjndH4j5JpgiB7KcXeSm59lGg1nR+GbcZuPp 0doc8UVxXicqOWUPACLcpEmLUrN2uknIHoh72d/xplbIiKR/M92dt0wm/+lE0nqfIEOD 17eGPoaACvzsVnfMKc908JESChjK7pgCdafaLwS5PWuLOYfnaxavYOYQihT71/h6tUAF lYf5zR66Lc9yoHK4uxW7H7ZXLKhYTogDL+LRSUFMEjsvh3dhRYjj68PRwZ06WrSkcaG6 9Yy4zWGE1X/XhcDaQgvlrrTaprwiOeC1OZsiASeqTiU5baL1C5X92jscyys5YxhArWVv kiNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b14si6067645eds.379.2021.04.02.00.13.07; Fri, 02 Apr 2021 00:13:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233521AbhDBHMn (ORCPT + 99 others); Fri, 2 Apr 2021 03:12:43 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:51434 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229594AbhDBHMk (ORCPT ); Fri, 2 Apr 2021 03:12:40 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1lSDyk-0001JW-7X; Fri, 02 Apr 2021 18:12:27 +1100 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 02 Apr 2021 18:12:26 +1100 Date: Fri, 2 Apr 2021 18:12:26 +1100 From: Herbert Xu To: Meng Yu Cc: davem@davemloft.net, linux-crypto@vger.kernel.org, xuzaibo@huawei.com, wangzhou1@hisilicon.com, linux-kernel@vger.kernel.org, shenyang39@huawei.com Subject: Re: [PATCH] crypto: hisilicon/hpre - rsa key should not be empty Message-ID: <20210402071225.GA10423@gondor.apana.org.au> References: <1616739212-7751-1-git-send-email-yumeng18@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1616739212-7751-1-git-send-email-yumeng18@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 26, 2021 at 02:13:32PM +0800, Meng Yu wrote: > We should ensure key is not empty before we set key. > > Signed-off-by: Meng Yu > --- > drivers/crypto/hisilicon/hpre/hpre_crypto.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/drivers/crypto/hisilicon/hpre/hpre_crypto.c b/drivers/crypto/hisilicon/hpre/hpre_crypto.c > index 53068d2..7cf7d80 100644 > --- a/drivers/crypto/hisilicon/hpre/hpre_crypto.c > +++ b/drivers/crypto/hisilicon/hpre/hpre_crypto.c > @@ -1093,6 +1093,9 @@ static int hpre_rsa_setpubkey(struct crypto_akcipher *tfm, const void *key, > struct hpre_ctx *ctx = akcipher_tfm_ctx(tfm); > int ret; > > + if (!key || !keylen) > + return -EINVAL; > + > ret = crypto_akcipher_set_pub_key(ctx->rsa.soft_tfm, key, keylen); Does this fix a real bug? Wouldn't the soft fallback setkey catch this anyhow? Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt