summaryrefslogtreecommitdiffstats
path: root/crypto/rsa-pkcs1pad.c
diff options
context:
space:
mode:
authorGilad Ben-Yossef <gilad@benyossef.com>2017-10-18 03:00:36 -0400
committerHerbert Xu <herbert@gondor.apana.org.au>2017-11-03 10:11:17 -0400
commit4e5b0ad5827163bd8e57ea595be2681cad12e5c2 (patch)
tree4c1679e33ba5755b5cb798870b45eee95303acd2 /crypto/rsa-pkcs1pad.c
parent068c2e703577dca8cd634421f14b90959589ec85 (diff)
crypto: remove redundant backlog checks on EBUSY
Now that -EBUSY return code only indicates backlog queueing we can safely remove the now redundant check for the CRYPTO_TFM_REQ_MAY_BACKLOG flag when -EBUSY is returned. Signed-off-by: Gilad Ben-Yossef <gilad@benyossef.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/rsa-pkcs1pad.c')
-rw-r--r--crypto/rsa-pkcs1pad.c16
1 files changed, 4 insertions, 12 deletions
diff --git a/crypto/rsa-pkcs1pad.c b/crypto/rsa-pkcs1pad.c
index 407c64bdcdd9..2908f93c3e55 100644
--- a/crypto/rsa-pkcs1pad.c
+++ b/crypto/rsa-pkcs1pad.c
@@ -279,9 +279,7 @@ static int pkcs1pad_encrypt(struct akcipher_request *req)
279 req->dst, ctx->key_size - 1, req->dst_len); 279 req->dst, ctx->key_size - 1, req->dst_len);
280 280
281 err = crypto_akcipher_encrypt(&req_ctx->child_req); 281 err = crypto_akcipher_encrypt(&req_ctx->child_req);
282 if (err != -EINPROGRESS && 282 if (err != -EINPROGRESS && err != -EBUSY)
283 (err != -EBUSY ||
284 !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)))
285 return pkcs1pad_encrypt_sign_complete(req, err); 283 return pkcs1pad_encrypt_sign_complete(req, err);
286 284
287 return err; 285 return err;
@@ -383,9 +381,7 @@ static int pkcs1pad_decrypt(struct akcipher_request *req)
383 ctx->key_size); 381 ctx->key_size);
384 382
385 err = crypto_akcipher_decrypt(&req_ctx->child_req); 383 err = crypto_akcipher_decrypt(&req_ctx->child_req);
386 if (err != -EINPROGRESS && 384 if (err != -EINPROGRESS && err != -EBUSY)
387 (err != -EBUSY ||
388 !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)))
389 return pkcs1pad_decrypt_complete(req, err); 385 return pkcs1pad_decrypt_complete(req, err);
390 386
391 return err; 387 return err;
@@ -440,9 +436,7 @@ static int pkcs1pad_sign(struct akcipher_request *req)
440 req->dst, ctx->key_size - 1, req->dst_len); 436 req->dst, ctx->key_size - 1, req->dst_len);
441 437
442 err = crypto_akcipher_sign(&req_ctx->child_req); 438 err = crypto_akcipher_sign(&req_ctx->child_req);
443 if (err != -EINPROGRESS && 439 if (err != -EINPROGRESS && err != -EBUSY)
444 (err != -EBUSY ||
445 !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)))
446 return pkcs1pad_encrypt_sign_complete(req, err); 440 return pkcs1pad_encrypt_sign_complete(req, err);
447 441
448 return err; 442 return err;
@@ -561,9 +555,7 @@ static int pkcs1pad_verify(struct akcipher_request *req)
561 ctx->key_size); 555 ctx->key_size);
562 556
563 err = crypto_akcipher_verify(&req_ctx->child_req); 557 err = crypto_akcipher_verify(&req_ctx->child_req);
564 if (err != -EINPROGRESS && 558 if (err != -EINPROGRESS && err != -EBUSY)
565 (err != -EBUSY ||
566 !(req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)))
567 return pkcs1pad_verify_complete(req, err); 559 return pkcs1pad_verify_complete(req, err);
568 560
569 return err; 561 return err;