summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorTudor-Dan Ambarus <tudor.ambarus@microchip.com>2017-05-25 09:18:13 +0200
committerHerbert Xu <herbert@gondor.apana.org.au>2017-06-10 06:04:30 +0200
commit1c23b466e999911d3dd7af2ac0ec7bee8cc85635 (patch)
treec9f5e762738508c51392f840b9637621325d6f3b /crypto
parentcrypto: akcipher - assume key is already set in maxsize (diff)
downloadlinux-1c23b466e999911d3dd7af2ac0ec7bee8cc85635.tar.xz
linux-1c23b466e999911d3dd7af2ac0ec7bee8cc85635.zip
crypto: rsa - comply with crypto_akcipher_maxsize()
crypto_akcipher_maxsize() asks for the output buffer size without caring for errors. It allways assume that will be called after a valid setkey. Comply with it and return what he wants. Signed-off-by: Tudor Ambarus <tudor.ambarus@microchip.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/rsa.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/rsa.c b/crypto/rsa.c
index 4c280b6a3ea9..b067f3a93880 100644
--- a/crypto/rsa.c
+++ b/crypto/rsa.c
@@ -337,11 +337,11 @@ err:
return -ENOMEM;
}
-static int rsa_max_size(struct crypto_akcipher *tfm)
+static unsigned int rsa_max_size(struct crypto_akcipher *tfm)
{
struct rsa_mpi_key *pkey = akcipher_tfm_ctx(tfm);
- return pkey->n ? mpi_get_size(pkey->n) : -EINVAL;
+ return mpi_get_size(pkey->n);
}
static void rsa_exit_tfm(struct crypto_akcipher *tfm)