kernel_optimize_test/arch/s390/crypto
Martin Schwidefsky ed961581a7 [S390] prng: fix pointer arithmetic
The git commit c708c57e24 fixed the
access beyond the end of the stack in prng_seed but the pointer
arithmetic is still incorrect. The calculation has been off by
a factor of 64, now it is only off by a factor of 8. prng_seed
is called with a maximum of 16 for nbytes, small enough that
the incorrect calculation stays insides the limits of the stack.
Place parentheses for correct pointer arithmetic.

Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2011-04-27 09:34:45 +02:00
..
aes_s390.c Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 2010-02-26 16:50:02 -08:00
crypt_s390.h [S390] cleanup facility list handling 2010-10-25 16:10:21 +02:00
crypto_des.h crypto: des_s390 - Checkpatch cleanup 2010-05-26 10:41:03 +10:00
des_check_key.c
des_s390.c crypto: des_s390: use generic weak key check 2010-05-21 22:04:46 +10:00
Makefile crypto: des_s390: use generic weak key check 2010-05-21 22:04:46 +10:00
prng.c [S390] prng: fix pointer arithmetic 2011-04-27 09:34:45 +02:00
sha_common.c crypto: sha-s390 - Reset index after processing partial block 2011-02-07 20:26:06 +11:00
sha.h crypto: sha-s390 - Switch to shash 2009-02-18 16:48:07 +08:00
sha1_s390.c crypto: sha-s390 - Fix warnings in import function 2009-09-05 16:27:35 +10:00
sha256_s390.c crypto: sha-s390 - Fix warnings in import function 2009-09-05 16:27:35 +10:00
sha512_s390.c crypto: sha-s390 - Fix warnings in import function 2009-09-05 16:27:35 +10:00