crypto: fix a memory leak in rsa-kcs1pad's encryption mode
authorDan Aloni <dan@kernelim.com>
Mon, 17 Sep 2018 17:24:32 +0000 (20:24 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 20 Nov 2019 17:47:44 +0000 (18:47 +0100)
commit98ca4f397febb86b9dd81232df5db95ec5378ad4
tree2b64f199ac97ca47a371b7986cc2ab14745f2abc
parent975b3c8dd182dfae77ea3ceaa8ad7c51a396b0e7
crypto: fix a memory leak in rsa-kcs1pad's encryption mode

[ Upstream commit 3944f139d5592790b70bc64f197162e643a8512b ]

The encryption mode of pkcs1pad never uses out_sg and out_buf, so
there's no need to allocate the buffer, which presently is not even
being freed.

CC: Herbert Xu <herbert@gondor.apana.org.au>
CC: linux-crypto@vger.kernel.org
CC: "David S. Miller" <davem@davemloft.net>
Signed-off-by: Dan Aloni <dan@kernelim.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
crypto/rsa-pkcs1pad.c