Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp15697pxb; Thu, 7 Jan 2021 19:56:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJxOevEoPcKV9sho2i3RlhNen7r+mpoxaqQUHV2poLK1jBF74M8gW3I/MXmbHyjzQfpfXwux X-Received: by 2002:a50:8b02:: with SMTP id l2mr3798860edl.322.1610078162945; Thu, 07 Jan 2021 19:56:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610078162; cv=none; d=google.com; s=arc-20160816; b=ELmWqL/J+wfCYghbE3wP9dhaXGkYVhEIjdLS3E/uUe6Jie+0o8mHf6ah2cXVBNMt6L aYhSrkgNxjLOrghkSNIUQZylIPwHlO1GSHY2suQUOcbkIIiaQN/Y3VbBhBOVYelz6gq8 EgI4dWGsWTg9Q1grcIk4JMIvv771xaNIzc2cfFhrCM/npBa7bM/1k51JwqvGXKFJ5bsC MrOrxJ1f575Ub2CprxGo6L4LL6o3xPK1JURHiMc0yUhmxIpepKqt+03exdyuwkBel5mr XdeQz/TkxP52PHFx0JpuO5nGhJ7IC44vdtypJLLedHUkYEkczQJMEJ1GpLLlzp1uzhBj xHCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:to:from:date; bh=87F/Lw5yiEzdMs59l8lY98KDaWQaEUEzyyBDsrhvPoQ=; b=LM3EiS6cYu07j/4WRVBaC8wuXBNFd8p1Tuiw8gFdT57lWbcjfpBiLvE+twUHxM7dy6 tANVdFowsI99bzpoF154/EmPXTiNYrOWw/HF84ixnfhORXBDRg9SNk+y3VBMNOMd4dC0 l0YvsKbo7Sm9ZVQrCdLelIXVE8dtWGOS0C5LU5FXSf99CWD9r2qOI50EftsXr/SI4YF/ gq8dYd/l6l4HZV6TX2pB8q5ajJvXhS90+5POs2vlQZ7M4yC4ik0XfKleH3dBZWHOIQNq Ksgtc8KDPP+MGqYMn+lzw9GlbzJ6xYcKwNuuWM06KW4ShyP3IMAJ9OMvLnmhrIZ4EcKQ pRsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u26si3225109edo.164.2021.01.07.19.55.42; Thu, 07 Jan 2021 19:56:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726484AbhAHDzj (ORCPT + 99 others); Thu, 7 Jan 2021 22:55:39 -0500 Received: from helcar.hmeau.com ([216.24.177.18]:39732 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726294AbhAHDzj (ORCPT ); Thu, 7 Jan 2021 22:55:39 -0500 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1kxirS-000688-Cv; Fri, 08 Jan 2021 14:54:51 +1100 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 08 Jan 2021 14:54:50 +1100 Date: Fri, 8 Jan 2021 14:54:50 +1100 From: Herbert Xu To: Linus Torvalds , "David S. Miller" , Linux Kernel Mailing List , Linux Crypto Mailing List Subject: [GIT PULL] Crypto Fixes for 5.11 Message-ID: <20210108035450.GA6191@gondor.apana.org.au> References: <20200803044024.GA6429@gondor.apana.org.au> <20200830223304.GA16882@gondor.apana.org.au> <20201026011159.GA2428@gondor.apana.org.au> <20201227113221.GA28744@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201227113221.GA28744@gondor.apana.org.au> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Linus: This push fixes a functional bug in arm/chacha-neon as well as a potential buffer overflow in ecdh. The following changes since commit 5c8fe583cce542aa0b84adc939ce85293de36e5e: Linux 5.11-rc1 (2020-12-27 15:30:22 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus for you to fetch changes up to 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5: crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100) ---------------------------------------------------------------- Ard Biesheuvel (2): crypto: arm/chacha-neon - add missing counter increment crypto: ecdh - avoid buffer overflow in ecdh_set_secret() arch/arm/crypto/chacha-glue.c | 1 + crypto/ecdh.c | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt