Commit d0efb48b authored by Tudor-Dan Ambarus's avatar Tudor-Dan Ambarus Committed by Herbert Xu

crypto: ecdh - comply with crypto_kpp_maxsize()

crypto_kpp_maxsize() asks for the output buffer size without
caring for errors. It allways assume that will be called after
a valid setkey. Comply with it and return what he wants.

nbytes has no sense now, remove it and directly return the maxsize.
Signed-off-by: default avatarTudor Ambarus <tudor.ambarus@microchip.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 7f691050
...@@ -104,13 +104,12 @@ static int ecdh_compute_value(struct kpp_request *req) ...@@ -104,13 +104,12 @@ static int ecdh_compute_value(struct kpp_request *req)
return ret; return ret;
} }
static int ecdh_max_size(struct crypto_kpp *tfm) static unsigned int ecdh_max_size(struct crypto_kpp *tfm)
{ {
struct ecdh_ctx *ctx = ecdh_get_ctx(tfm); struct ecdh_ctx *ctx = ecdh_get_ctx(tfm);
int nbytes = ctx->ndigits << ECC_DIGITS_TO_BYTES_SHIFT;
/* Public key is made of two coordinates */ /* Public key is made of two coordinates, add one to the left shift */
return 2 * nbytes; return ctx->ndigits << (ECC_DIGITS_TO_BYTES_SHIFT + 1);
} }
static void no_exit_tfm(struct crypto_kpp *tfm) static void no_exit_tfm(struct crypto_kpp *tfm)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment