diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2010-11-30 12:04:31 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2010-11-30 12:04:31 +0300 |
commit | bc97e57eb21f8db55bf0e1f182d384e75b2e3c99 (patch) | |
tree | 470a1564aaa3d36f545bb7b4d25e853a38617f01 /include/crypto/ctr.h | |
parent | 0f6bb83cb12e4617e696ffa566f3fc6c092686e2 (diff) | |
download | linux-bc97e57eb21f8db55bf0e1f182d384e75b2e3c99.tar.xz |
crypto: algif_skcipher - Handle unaligned receive buffer
As it is if user-space passes through a receive buffer that's not
aligned to to the cipher block size, we'll end up encrypting or
decrypting a partial block which causes a spurious EINVAL to be
returned.
This patch fixes this by moving the partial block test after the
af_alg_make_sg call.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'include/crypto/ctr.h')
0 files changed, 0 insertions, 0 deletions