diff options
author | Horia Geanta <horia.geanta@freescale.com> | 2014-04-18 14:01:41 +0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2014-04-28 14:21:16 +0400 |
commit | 3d67be2761dc4b5b792037f296f3394a29581efc (patch) | |
tree | 6ac408e5c5cf51711740af0cafb7fd1b8e1169b1 /crypto | |
parent | f51f593b3eb194d01d8980316e6bb1f7d72f567a (diff) | |
download | linux-3d67be2761dc4b5b792037f296f3394a29581efc.tar.xz |
crypto: caam - fix mem leak in ahash_setkey
In case hash key is bigger than algorithm block size, it is hashed.
In this case, memory is allocated to keep this hash in hashed_key.
hashed_key has to be freed on the key_dma dma mapping error path.
Signed-off-by: Horia Geanta <horia.geanta@freescale.com>
Reviewed-by: Marek Vasut <marex@denx.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
0 files changed, 0 insertions, 0 deletions