04/07/2022 09:50, Akhil Goyal: > > On Sat, Jul 2, 2022 at 4:59 PM Gowrishankar Muthukrishnan > > <gmuthukri...@marvell.com> wrote: > > > > > > There is wrong size used for allocation of digest buffer which in > > > some cases cause memory corruption. Also, fixed places where memory > > > leak is observed. This fix would enable sha 384 and 512 NIST vectors > > > be supported fully. > > > > > > Fixes: 93d797d94f1 ("examples/fips_validation: add parsing for sha") > > > > This sha1 is not valid anymore, or maybe Akhil will squash the fix in > > the next-crypto tree before reaching main. > Fixed the SHA and applied on top of next-crypto as I had already asked Thomas > to pull the tree.
David did some good comments, I will wait for a better version of the patch.