diff options
author | Ard Biesheuvel <ardb@kernel.org> | 2020-12-08 15:34:41 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2021-03-07 12:20:46 +0100 |
commit | be7b2eb2e18864d3c6f8c26519518ff6c56d07cf (patch) | |
tree | 7992c1bfd4651ae66582a4fd621a2eb4f39e0cba /crypto/nhpoly1305.c | |
parent | 27d3234d07268f255a3e99cde5d4bd54d54da8a9 (diff) | |
download | linux-crypto-be7b2eb2e18864d3c6f8c26519518ff6c56d07cf.tar.gz linux-crypto-be7b2eb2e18864d3c6f8c26519518ff6c56d07cf.zip |
crypto: tcrypt - avoid signed overflow in byte count
[ Upstream commit cbebe807d8465ef8f541a57c12ed6a3b55f73629 ]
The signed long type used for printing the number of bytes processed in
tcrypt benchmarks limits the range to -/+ 2 GiB, which is not sufficient
to cover the performance of common accelerated ciphers such as AES-NI
when benchmarked with sec=1. So switch to u64 instead.
While at it, fix up a missing printk->pr_cont conversion in the AEAD
benchmark.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'crypto/nhpoly1305.c')
0 files changed, 0 insertions, 0 deletions