mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-29 17:22:07 +00:00
crypto: rsa - comply with crypto_akcipher_maxsize()
crypto_akcipher_maxsize() asks for the output buffer size without caring for errors. It allways assume that will be called after a valid setkey. Comply with it and return what he wants. Signed-off-by: Tudor Ambarus <tudor.ambarus@microchip.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
561f8e2df9
commit
1c23b466e9
@ -337,11 +337,11 @@ static int rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key,
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
static int rsa_max_size(struct crypto_akcipher *tfm)
|
||||
static unsigned int rsa_max_size(struct crypto_akcipher *tfm)
|
||||
{
|
||||
struct rsa_mpi_key *pkey = akcipher_tfm_ctx(tfm);
|
||||
|
||||
return pkey->n ? mpi_get_size(pkey->n) : -EINVAL;
|
||||
return mpi_get_size(pkey->n);
|
||||
}
|
||||
|
||||
static void rsa_exit_tfm(struct crypto_akcipher *tfm)
|
||||
|
Loading…
Reference in New Issue
Block a user