diff options
author | Ard Biesheuvel <ardb@kernel.org> | 2019-11-05 17:01:00 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2019-12-11 11:36:59 +0300 |
commit | dbb326fd009346061e5083c3a0d2d1a2fa348e04 (patch) | |
tree | a093c3f708d3f2a7dcf388bc693c4d0c4056a66e /Documentation/speculation.txt | |
parent | 6585cd3683c624d9cbe5cbc480f870b2d1df47db (diff) | |
download | linux-dbb326fd009346061e5083c3a0d2d1a2fa348e04.tar.xz |
crypto: omap-aes - reject invalid input sizes for block modes
Block modes such as ECB and CBC only support input sizes that are
a round multiple of the block size, so align with the generic code
which returns -EINVAL when encountering inputs that violate this
rule.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Reviewed-by: Tero Kristo <t-kristo@ti.com>
Tested-by: Tero Kristo <t-kristo@ti.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'Documentation/speculation.txt')
0 files changed, 0 insertions, 0 deletions