On Fri, Jul 10, 2015 at 10:06:32AM -0700, Tadeusz Struk wrote:
>
> +     ctx->key_sz = mpi_get_size(pkey->n);
> +     if (!qat_rsa_enc_fn_id(ctx->key_sz)) {
> +             /* invalid key size provided */
> +             rsa_free_key(pkey);
> +             ctx->key_sz = 0;
> +             return -EINVAL;
> +     }

As we discussed a while ago, the hardware implementation must not
support a smaller feature set than the software implementation.

So please either add a software fallback for unsupported key sizes,
or ensure that the software implementation also rejects these key
sizes.

Thanks,
-- 
Email: Herbert Xu <herb...@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to