diff options
author | Iuliana Prodan <iuliana.prodan@nxp.com> | 2019-05-28 11:52:10 +0200 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2019-06-06 08:38:56 +0200 |
commit | c3725f7ccc8cae1fb71e97768f03bfbd846f7827 (patch) | |
tree | 6ebe0b7648ffa47cc5d266754e9bddfdad848def /drivers/spmi | |
parent | crypto: inside-secure - do not rely on the hardware last bit for result descr... (diff) | |
download | linux-c3725f7ccc8cae1fb71e97768f03bfbd846f7827.tar.xz linux-c3725f7ccc8cae1fb71e97768f03bfbd846f7827.zip |
crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
The problem is with the input data size sent to CAAM for encrypt/decrypt.
Pkcs1pad is failing due to pkcs1 padding done in SW starting with0x01
instead of 0x00 0x01.
CAAM expects an input of modulus size. For this we strip the leading
zeros in case the size is more than modulus or pad the input with zeros
until the modulus size is reached.
Signed-off-by: Iuliana Prodan <iuliana.prodan@nxp.com>
Reviewed-by: Horia Geantă <horia.geanta@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'drivers/spmi')
0 files changed, 0 insertions, 0 deletions