summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTudor-Dan Ambarus <tudor.ambarus@microchip.com>2017-05-25 10:18:13 +0300
committerHerbert Xu <herbert@gondor.apana.org.au>2017-06-10 12:04:30 +0800
commit1c23b466e999911d3dd7af2ac0ec7bee8cc85635 (patch)
treec9f5e762738508c51392f840b9637621325d6f3b
parent561f8e2df990a7a2859a98bd208d0f7dc932c3f7 (diff)
downloadop-kernel-dev-1c23b466e999911d3dd7af2ac0ec7bee8cc85635.zip
op-kernel-dev-1c23b466e999911d3dd7af2ac0ec7bee8cc85635.tar.gz
crypto: rsa - comply with crypto_akcipher_maxsize()
crypto_akcipher_maxsize() asks for the output buffer size without caring for errors. It allways assume that will be called after a valid setkey. Comply with it and return what he wants. Signed-off-by: Tudor Ambarus <tudor.ambarus@microchip.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--crypto/rsa.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/rsa.c b/crypto/rsa.c
index 4c280b6..b067f3a 100644
--- a/crypto/rsa.c
+++ b/crypto/rsa.c
@@ -337,11 +337,11 @@ err:
return -ENOMEM;
}
-static int rsa_max_size(struct crypto_akcipher *tfm)
+static unsigned int rsa_max_size(struct crypto_akcipher *tfm)
{
struct rsa_mpi_key *pkey = akcipher_tfm_ctx(tfm);
- return pkey->n ? mpi_get_size(pkey->n) : -EINVAL;
+ return mpi_get_size(pkey->n);
}
static void rsa_exit_tfm(struct crypto_akcipher *tfm)
OpenPOWER on IntegriCloud