|
@@ -91,12 +91,6 @@ static int rsa_enc(struct akcipher_request *req)
|
|
goto err_free_c;
|
|
goto err_free_c;
|
|
}
|
|
}
|
|
|
|
|
|
- if (req->dst_len < mpi_get_size(pkey->n)) {
|
|
|
|
- req->dst_len = mpi_get_size(pkey->n);
|
|
|
|
- ret = -EOVERFLOW;
|
|
|
|
- goto err_free_c;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
ret = -ENOMEM;
|
|
ret = -ENOMEM;
|
|
m = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
m = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
if (!m)
|
|
if (!m)
|
|
@@ -136,12 +130,6 @@ static int rsa_dec(struct akcipher_request *req)
|
|
goto err_free_m;
|
|
goto err_free_m;
|
|
}
|
|
}
|
|
|
|
|
|
- if (req->dst_len < mpi_get_size(pkey->n)) {
|
|
|
|
- req->dst_len = mpi_get_size(pkey->n);
|
|
|
|
- ret = -EOVERFLOW;
|
|
|
|
- goto err_free_m;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
ret = -ENOMEM;
|
|
ret = -ENOMEM;
|
|
c = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
c = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
if (!c)
|
|
if (!c)
|
|
@@ -180,12 +168,6 @@ static int rsa_sign(struct akcipher_request *req)
|
|
goto err_free_s;
|
|
goto err_free_s;
|
|
}
|
|
}
|
|
|
|
|
|
- if (req->dst_len < mpi_get_size(pkey->n)) {
|
|
|
|
- req->dst_len = mpi_get_size(pkey->n);
|
|
|
|
- ret = -EOVERFLOW;
|
|
|
|
- goto err_free_s;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
ret = -ENOMEM;
|
|
ret = -ENOMEM;
|
|
m = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
m = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
if (!m)
|
|
if (!m)
|
|
@@ -225,12 +207,6 @@ static int rsa_verify(struct akcipher_request *req)
|
|
goto err_free_m;
|
|
goto err_free_m;
|
|
}
|
|
}
|
|
|
|
|
|
- if (req->dst_len < mpi_get_size(pkey->n)) {
|
|
|
|
- req->dst_len = mpi_get_size(pkey->n);
|
|
|
|
- ret = -EOVERFLOW;
|
|
|
|
- goto err_free_m;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
ret = -ENOMEM;
|
|
ret = -ENOMEM;
|
|
s = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
s = mpi_read_raw_from_sgl(req->src, req->src_len);
|
|
if (!s) {
|
|
if (!s) {
|