* [PATCH] crypto: digest: Fix digesting over memory chunks > 4096 bytes
@ 2017-07-06 18:01 Uwe Kleine-König
2017-07-10 9:03 ` Lucas Stach
0 siblings, 1 reply; 2+ messages in thread
From: Uwe Kleine-König @ 2017-07-06 18:01 UTC (permalink / raw)
To: barebox
There are two different cases that are handled in digest_file_window:
a) the file to digest is memmappable (e.g. /dev/mem)
b) it isn't (e.g. files in /)
In both cases a file is digested in hunks of (up to) 4096 bytes. After
each hunk in b) the buffer that is fed to digest_update() is then
overwritten using read() to get the next hunk to digest. In case a)
however it was forgotten to step forward in the buffer and instead the
same data was handed to digest_update() again and again.
So to fix that increase buffer by the number of bytes already digested
for case a) which is characterized by flags == 0.
Signed-off-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
---
Hello,
this is the obvious and minimal patch to fix this issue. Maybe it is
worth to simplify the function by splitting it in two where each one
handles one of the cases above.
Best regards
Uwe
crypto/digest.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/crypto/digest.c b/crypto/digest.c
index 7a8c3c092d7d..bc6de0b98f46 100644
--- a/crypto/digest.c
+++ b/crypto/digest.c
@@ -272,6 +272,9 @@ int digest_file_window(struct digest *d, const char *filename,
goto out_free;
size -= now;
len += now;
+
+ if (!flags)
+ buf += now;
}
if (sig)
--
2.11.0
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH] crypto: digest: Fix digesting over memory chunks > 4096 bytes
2017-07-06 18:01 [PATCH] crypto: digest: Fix digesting over memory chunks > 4096 bytes Uwe Kleine-König
@ 2017-07-10 9:03 ` Lucas Stach
0 siblings, 0 replies; 2+ messages in thread
From: Lucas Stach @ 2017-07-10 9:03 UTC (permalink / raw)
To: Uwe Kleine-König; +Cc: barebox
Am Donnerstag, den 06.07.2017, 20:01 +0200 schrieb Uwe Kleine-König:
> There are two different cases that are handled in digest_file_window:
>
> a) the file to digest is memmappable (e.g. /dev/mem)
> b) it isn't (e.g. files in /)
>
> In both cases a file is digested in hunks of (up to) 4096 bytes. After
> each hunk in b) the buffer that is fed to digest_update() is then
> overwritten using read() to get the next hunk to digest. In case a)
> however it was forgotten to step forward in the buffer and instead the
> same data was handed to digest_update() again and again.
>
> So to fix that increase buffer by the number of bytes already digested
> for case a) which is characterized by flags == 0.
>
> Signed-off-by: Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
> ---
> Hello,
>
> this is the obvious and minimal patch to fix this issue. Maybe it is
> worth to simplify the function by splitting it in two where each one
> handles one of the cases above.
Yes, making this less confusing to the casual reader of the code seems
like a good idea. I've applied this minimal fix for master.
Regards,
Lucas
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-07-10 9:04 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-07-06 18:01 [PATCH] crypto: digest: Fix digesting over memory chunks > 4096 bytes Uwe Kleine-König
2017-07-10 9:03 ` Lucas Stach
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox