Stephan Mueller ce5481d01f crypto: drbg - fix failure of generating multiple of 2**16 bytes
The function drbg_generate_long slices the request into 2**16 byte
or smaller chunks. However, the loop, however invokes the random number
generation function with zero bytes when the request size is a multiple
of 2**16 bytes. The fix prevents zero bytes requests.

Signed-off-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2014-08-01 22:36:14 +08:00
..
2014-04-18 14:20:48 +02:00
2013-04-25 21:01:47 +08:00
2014-08-01 22:35:55 +08:00
2013-02-04 21:16:53 +08:00
2010-02-16 20:33:49 +08:00
2014-08-01 22:35:55 +08:00
2008-08-29 15:50:02 +10:00
2014-08-01 22:35:55 +08:00
2013-07-09 10:33:30 -07:00
2013-07-09 10:33:30 -07:00
2014-06-25 21:51:53 +08:00
2011-08-06 18:32:45 -07:00
2014-08-01 22:35:55 +08:00
2014-08-01 22:35:55 +08:00