linux-stable-rt/arch/x86_64
David McCullough 55e9dce37d [CRYPTO] aes: Fixed array boundary violation
The AES setkey routine writes 64 bytes to the E_KEY area even though
there are only 60 bytes there.  It is in fact safe since E_KEY is
immediately follwed by D_KEY which is initialised afterwards.  However,
doing this may trigger undefined behaviour and makes Coverity unhappy.

So by combining E_KEY and D_KEY into one array we sidestep this issue
altogether.

This problem was reported by Adrian Bunk.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2006-03-21 20:14:10 +11:00
..
boot
crypto [CRYPTO] aes: Fixed array boundary violation 2006-03-21 20:14:10 +11:00
ia32 [PATCH] fstatat64 support 2006-02-11 21:41:10 -08:00
kernel Revert "[PATCH] x86-64: Fix up handling of non canonical user RIPs" 2006-03-14 08:01:47 -08:00
lib [PATCH] x86_64: Undo the earlier changes to remove unrolled copy/memset functions 2006-02-04 16:43:13 -08:00
mm [PATCH] x86_64: Always pass full number of nodes to NUMA hash computation 2006-02-17 08:00:41 -08:00
oprofile
pci [PATCH] arch/x86_64/pci/mmconfig.c NULL noise removal 2006-02-07 20:59:01 -05:00
Kconfig Make Kprobes depend on modules 2006-02-26 20:24:40 -08:00
Kconfig.debug [PATCH] x86_64: Remove CONFIG_INIT_DEBUG 2006-02-04 16:43:13 -08:00
Makefile
defconfig [PATCH] x86_64: Don't set CONFIG_DEBUG_INFO in defconfig 2006-02-20 20:00:10 -08:00