crypto: rsa-pkcs1pad - Always use GFP_KERNEL
authorHerbert Xu <herbert@gondor.apana.org.au>
Wed, 29 Jun 2016 11:32:26 +0000 (19:32 +0800)
committerHerbert Xu <herbert@gondor.apana.org.au>
Fri, 1 Jul 2016 15:45:19 +0000 (23:45 +0800)
We don't currently support using akcipher in atomic contexts,
so GFP_KERNEL should always be used.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
crypto/rsa-pkcs1pad.c

index d9baefb7d5d1ad58d19e7ba9ed3be057af7a6304..db19284f2e2be225959f4311cd96039c1ba9ccce 100644 (file)
@@ -260,8 +260,7 @@ static int pkcs1pad_encrypt(struct akcipher_request *req)
        req_ctx->child_req.dst_len = ctx->key_size;
 
        req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+                                 GFP_KERNEL);
        if (!req_ctx->in_buf)
                return -ENOMEM;
 
@@ -274,9 +273,7 @@ static int pkcs1pad_encrypt(struct akcipher_request *req)
        pkcs1pad_sg_set_buf(req_ctx->in_sg, req_ctx->in_buf,
                        ctx->key_size - 1 - req->src_len, req->src);
 
-       req_ctx->out_buf = kmalloc(ctx->key_size,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+       req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL);
        if (!req_ctx->out_buf) {
                kfree(req_ctx->in_buf);
                return -ENOMEM;
@@ -379,9 +376,7 @@ static int pkcs1pad_decrypt(struct akcipher_request *req)
        req_ctx->child_req.dst = req_ctx->out_sg;
        req_ctx->child_req.dst_len = ctx->key_size ;
 
-       req_ctx->out_buf = kmalloc(ctx->key_size,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+       req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL);
        if (!req_ctx->out_buf)
                return -ENOMEM;
 
@@ -438,8 +433,7 @@ static int pkcs1pad_sign(struct akcipher_request *req)
        req_ctx->child_req.dst_len = ctx->key_size;
 
        req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+                                 GFP_KERNEL);
        if (!req_ctx->in_buf)
                return -ENOMEM;
 
@@ -454,9 +448,7 @@ static int pkcs1pad_sign(struct akcipher_request *req)
        pkcs1pad_sg_set_buf(req_ctx->in_sg, req_ctx->in_buf,
                        ctx->key_size - 1 - req->src_len, req->src);
 
-       req_ctx->out_buf = kmalloc(ctx->key_size,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+       req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL);
        if (!req_ctx->out_buf) {
                kfree(req_ctx->in_buf);
                return -ENOMEM;
@@ -577,9 +569,7 @@ static int pkcs1pad_verify(struct akcipher_request *req)
        req_ctx->child_req.dst = req_ctx->out_sg;
        req_ctx->child_req.dst_len = ctx->key_size;
 
-       req_ctx->out_buf = kmalloc(ctx->key_size,
-                       (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
-                       GFP_KERNEL : GFP_ATOMIC);
+       req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL);
        if (!req_ctx->out_buf)
                return -ENOMEM;