forked from luck/tmp_suning_uos_patched
crypto: qat - comply with crypto_kpp_maxsize()
crypto_kpp_maxsize() asks for the output buffer size without caring for errors. It allways assume that will be called after a valid setkey. Comply with it and return what he wants. Signed-off-by: Tudor Ambarus <tudor.ambarus@microchip.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
d0efb48b86
commit
85ac98cbac
|
@ -521,11 +521,11 @@ static int qat_dh_set_secret(struct crypto_kpp *tfm, const void *buf,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static int qat_dh_max_size(struct crypto_kpp *tfm)
|
||||
static unsigned int qat_dh_max_size(struct crypto_kpp *tfm)
|
||||
{
|
||||
struct qat_dh_ctx *ctx = kpp_tfm_ctx(tfm);
|
||||
|
||||
return ctx->p ? ctx->p_size : -EINVAL;
|
||||
return ctx->p_size;
|
||||
}
|
||||
|
||||
static int qat_dh_init_tfm(struct crypto_kpp *tfm)
|
||||
|
|
Loading…
Reference in New Issue
Block a user