)]}'
{
  "log": [
    {
      "commit": "516280e735b034216de97eb7ba080ec6acbfc58f",
      "tree": "625eb7ab4da7686c8d28ab01c196ee406b8469b9",
      "parents": [
        "bac1b5c4696f217afeac5b29874a337bc39da717"
      ],
      "author": {
        "name": "Jarod Wilson",
        "email": "jarod@redhat.com",
        "time": "Thu Jan 22 19:58:15 2009 +1100"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Tue Jan 27 17:11:15 2009 +1100"
      },
      "message": "crypto: ccm - Fix handling of null assoc data\n\nIts a valid use case to have null associated data in a ccm vector, but\nthis case isn\u0027t being handled properly right now.\n\nThe following ccm decryption/verification test vector, using the\nrfc4309 implementation regularly triggers a panic, as will any\nother vector with null assoc data:\n\n* key: ab2f8a74b71cd2b1ff802e487d82f8b9\n* iv: c6fb7d800d13abd8a6b2d8\n* Associated Data: [NULL]\n* Tag Length: 8\n* input: d5e8939fc7892e2b\n\nThe resulting panic looks like so:\n\nUnable to handle kernel paging request at ffff810064ddaec0 RIP: \n [\u003cffffffff8864c4d7\u003e] :ccm:get_data_to_compute+0x1a6/0x1d6\nPGD 8063 PUD 0 \nOops: 0002 [1] SMP \nlast sysfs file: /module/libata/version\nCPU 0\nModules linked in: crypto_tester_kmod(U) seqiv krng ansi_cprng chainiv rng ctr aes_generic aes_x86_64 ccm cryptomgr testmgr_cipher testmgr aead crypto_blkcipher crypto_a\nlgapi des ipv6 xfrm_nalgo crypto_api autofs4 hidp l2cap bluetooth nfs lockd fscache nfs_acl sunrpc ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink xt_\ntcpudp iptable_filter ip_tables x_tables dm_mirror dm_log dm_multipath scsi_dh dm_mod video hwmon backlight sbs i2c_ec button battery asus_acpi acpi_memhotplug ac lp sg \nsnd_intel8x0 snd_ac97_codec ac97_bus snd_seq_dummy snd_seq_oss joydev snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss ide_cd snd_pcm floppy parport_p\nc shpchp e752x_edac snd_timer e1000 i2c_i801 edac_mc snd soundcore snd_page_alloc i2c_core cdrom parport serio_raw pcspkr ata_piix libata sd_mod scsi_mod ext3 jbd uhci_h\ncd ohci_hcd ehci_hcd\nPid: 12844, comm: crypto-tester Tainted: G      2.6.18-128.el5.fips1 #1\nRIP: 0010:[\u003cffffffff8864c4d7\u003e]  [\u003cffffffff8864c4d7\u003e] :ccm:get_data_to_compute+0x1a6/0x1d6\nRSP: 0018:ffff8100134434e8  EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff8100104898b0 RCX: ffffffffab6aea10\nRDX: 0000000000000010 RSI: ffff8100104898c0 RDI: ffff810064ddaec0\nRBP: 0000000000000000 R08: ffff8100104898b0 R09: 0000000000000000\nR10: ffff8100103bac84 R11: ffff8100104898b0 R12: ffff810010489858\nR13: ffff8100104898b0 R14: ffff8100103bac00 R15: 0000000000000000\nFS:  00002ab881adfd30(0000) GS:ffffffff803ac000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b\nCR2: ffff810064ddaec0 CR3: 0000000012a88000 CR4: 00000000000006e0\nProcess crypto-tester (pid: 12844, threadinfo ffff810013442000, task ffff81003d165860)\nStack:  ffff8100103bac00 ffff8100104898e8 ffff8100134436f8 ffffffff00000000\n 0000000000000000 ffff8100104898b0 0000000000000000 ffff810010489858\n 0000000000000000 ffff8100103bac00 ffff8100134436f8 ffffffff8864c634\nCall Trace:\n [\u003cffffffff8864c634\u003e] :ccm:crypto_ccm_auth+0x12d/0x140\n [\u003cffffffff8864cf73\u003e] :ccm:crypto_ccm_decrypt+0x161/0x23a\n [\u003cffffffff88633643\u003e] :crypto_tester_kmod:cavs_test_rfc4309_ccm+0x4a5/0x559\n[...]\n\nThe above is from a RHEL5-based kernel, but upstream is susceptible too.\n\nThe fix is trivial: in crypto/ccm.c:crypto_ccm_auth(), pctx-\u003eilen contains\nwhatever was in memory when pctx was allocated if assoclen is 0. The tested\nfix is to simply add an else clause setting pctx-\u003eilen to 0 for the\nassoclen \u003d\u003d 0 case, so that get_data_to_compute() doesn\u0027t try doing\nthings its not supposed to.\n\nSigned-off-by: Jarod Wilson \u003cjarod@redhat.com\u003e\nAcked-by: Neil Horman \u003cnhorman@tuxdriver.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    },
    {
      "commit": "4a49b499dfa0c9e42be6d6fdd771f3434c776278",
      "tree": "f9fe2be3cf378271dca62ba6e91f63a83604a051",
      "parents": [
        "d29ce988aeb459203c74f14747f4f77e1829ef78"
      ],
      "author": {
        "name": "Joy Latten",
        "email": "latten@austin.ibm.com",
        "time": "Wed Dec 12 20:25:13 2007 +0800"
      },
      "committer": {
        "name": "Herbert Xu",
        "email": "herbert@gondor.apana.org.au",
        "time": "Fri Jan 11 08:16:53 2008 +1100"
      },
      "message": "[CRYPTO] ccm: Added CCM mode\n\nThis patch adds Counter with CBC-MAC (CCM) support.\nRFC 3610 and NIST Special Publication 800-38C were referenced.\n\nSigned-off-by: Joy Latten \u003clatten@austin.ibm.com\u003e\nSigned-off-by: Herbert Xu \u003cherbert@gondor.apana.org.au\u003e\n"
    }
  ]
}
