crypto: inside-secure - fix the extra cache computation
authorAntoine Tenart <antoine.tenart@bootlin.com>
Tue, 13 Feb 2018 08:26:52 +0000 (09:26 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 25 May 2018 14:17:45 +0000 (16:17 +0200)
[ Upstream commit c1a8fa6e240ed4b99778d48ab790743565cb61c8 ]

This patch fixes the extra cache computation when the queued data is a
multiple of a block size. This fixes the hash support in some cases.

Fixes: 809778e02cd4 ("crypto: inside-secure - fix hash when length is a multiple of a block")
Signed-off-by: Antoine Tenart <antoine.tenart@bootlin.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/crypto/inside-secure/safexcel_hash.c

index 861e31c..ca84d82 100644 (file)
@@ -199,7 +199,7 @@ static int safexcel_ahash_send_req(struct crypto_async_request *async, int ring,
                        /* If this is not the last request and the queued data
                         * is a multiple of a block, cache the last one for now.
                         */
-                       extra = queued - crypto_ahash_blocksize(ahash);
+                       extra = crypto_ahash_blocksize(ahash);
 
                if (extra) {
                        sg_pcopy_to_buffer(areq->src, sg_nents(areq->src),