diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2010-11-30 17:04:31 +0800 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2010-11-30 17:04:31 +0800 |
commit | a27d6a75587a85af4cc409f189af75ec8855a5fd (patch) | |
tree | e411ba2243dbf0a248033240b59a67a8d58df021 /crypto/scatterwalk.c | |
parent | 8e8a224c5b9ab8e3b04a98a99e7cc72bcc9b5184 (diff) | |
download | linux-crypto-a27d6a75587a85af4cc409f189af75ec8855a5fd.tar.gz linux-crypto-a27d6a75587a85af4cc409f189af75ec8855a5fd.zip |
crypto: algif_skcipher - Handle unaligned receive buffer
As it is if user-space passes through a receive buffer that's not
aligned to to the cipher block size, we'll end up encrypting or
decrypting a partial block which causes a spurious EINVAL to be
returned.
This patch fixes this by moving the partial block test after the
af_alg_make_sg call.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions