diff options
author | Gilad Ben-Yossef <gilad@benyossef.com> | 2017-10-18 03:00:36 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-03 10:11:17 -0400 |
commit | 4e5b0ad5827163bd8e57ea595be2681cad12e5c2 (patch) | |
tree | 4c1679e33ba5755b5cb798870b45eee95303acd2 /crypto/rsa-pkcs1pad.c | |
parent | 068c2e703577dca8cd634421f14b90959589ec85 (diff) |
crypto: remove redundant backlog checks on EBUSY
Now that -EBUSY return code only indicates backlog queueing
we can safely remove the now redundant check for the
CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned.
Signed-off-by: Gilad Ben-Yossef <gilad@benyossef.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/rsa-pkcs1pad.c')
-rw-r--r-- | crypto/rsa-pkcs1pad.c | 16 |
1 files changed, 4 insertions, 12 deletions
diff --git a/crypto/rsa-pkcs1pad.c b/crypto/rsa-pkcs1pad.c index 407c64bdcdd9..2908f93c3e55 100644 --- a/crypto/rsa-pkcs1pad.c +++ b/crypto/rsa-pkcs1pad.c | |||
@@ -279,9 +279,7 @@ static int pkcs1pad_encrypt(struct akcipher_request *req) | |||
279 | req->dst, ctx->key_size - 1, req->dst_len); | 279 | req->dst, ctx->key_size - 1, req->dst_len); |
280 | 280 | ||
281 | err = crypto_akcipher_encrypt(&req_ctx->child_req); | 281 | err = crypto_akcipher_encrypt(&req_ctx->child_req); |
282 | if (err != -EINPROGRESS && | 282 | if (err != -EINPROGRESS && err != -EBUSY) |
283 | (err != -EBUSY || | ||
284 | !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG))) | ||
285 | return pkcs1pad_encrypt_sign_complete(req, err); | 283 | return pkcs1pad_encrypt_sign_complete(req, err); |
286 | 284 | ||
287 | return err; | 285 | return err; |
@@ -383,9 +381,7 @@ static int pkcs1pad_decrypt(struct akcipher_request *req) | |||
383 | ctx->key_size); | 381 | ctx->key_size); |
384 | 382 | ||
385 | err = crypto_akcipher_decrypt(&req_ctx->child_req); | 383 | err = crypto_akcipher_decrypt(&req_ctx->child_req); |
386 | if (err != -EINPROGRESS && | 384 | if (err != -EINPROGRESS && err != -EBUSY) |
387 | (err != -EBUSY || | ||
388 | !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG))) | ||
389 | return pkcs1pad_decrypt_complete(req, err); | 385 | return pkcs1pad_decrypt_complete(req, err); |
390 | 386 | ||
391 | return err; | 387 | return err; |
@@ -440,9 +436,7 @@ static int pkcs1pad_sign(struct akcipher_request *req) | |||
440 | req->dst, ctx->key_size - 1, req->dst_len); | 436 | req->dst, ctx->key_size - 1, req->dst_len); |
441 | 437 | ||
442 | err = crypto_akcipher_sign(&req_ctx->child_req); | 438 | err = crypto_akcipher_sign(&req_ctx->child_req); |
443 | if (err != -EINPROGRESS && | 439 | if (err != -EINPROGRESS && err != -EBUSY) |
444 | (err != -EBUSY || | ||
445 | !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG))) | ||
446 | return pkcs1pad_encrypt_sign_complete(req, err); | 440 | return pkcs1pad_encrypt_sign_complete(req, err); |
447 | 441 | ||
448 | return err; | 442 | return err; |
@@ -561,9 +555,7 @@ static int pkcs1pad_verify(struct akcipher_request *req) | |||
561 | ctx->key_size); | 555 | ctx->key_size); |
562 | 556 | ||
563 | err = crypto_akcipher_verify(&req_ctx->child_req); | 557 | err = crypto_akcipher_verify(&req_ctx->child_req); |
564 | if (err != -EINPROGRESS && | 558 | if (err != -EINPROGRESS && err != -EBUSY) |
565 | (err != -EBUSY || | ||
566 | !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG))) | ||
567 | return pkcs1pad_verify_complete(req, err); | 559 | return pkcs1pad_verify_complete(req, err); |
568 | 560 | ||
569 | return err; | 561 | return err; |