crypto: rsa-pkcs1pad - don't allocate buffer on stack
authorAndrzej Zaborowski <andrew.zaborowski@intel.com>
Sat, 12 Dec 2015 05:03:51 +0000 (00:03 -0500)
committerHerbert Xu <herbert@gondor.apana.org.au>
Tue, 22 Dec 2015 12:43:24 +0000 (20:43 +0800)
commit5319216dcfee14886abb2b7090e8fcf2e2d8a611
tree16befddf660d00d6aea8c5c9acc4061c61e982ce
parent16f080aaadcb912c9a47c8603a38ccad87da38ea
crypto: rsa-pkcs1pad - don't allocate buffer on stack

Avoid the s390 compile "warning: 'pkcs1pad_encrypt_sign_complete'
uses dynamic stack allocation" reported by kbuild test robot.  Don't
use a flat zero-filled buffer, instead zero the contents of the SGL.

Signed-off-by: Andrew Zaborowski <andrew.zaborowski@intel.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
crypto/rsa-pkcs1pad.c
This page took 0.026487 seconds and 5 git commands to generate.