If a zero length request is submitted through the skcipher api,
do not offload it and return success.

Reviewed-by: Conor Mcloughlin <conor.mclough...@intel.com>
Tested-by: Sergey Portnoy <sergey.port...@intel.com>
Signed-off-by: Giovanni Cabiddu <giovanni.cabi...@intel.com>
---
 drivers/crypto/qat/qat_common/qat_algs.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/drivers/crypto/qat/qat_common/qat_algs.c 
b/drivers/crypto/qat/qat_common/qat_algs.c
index 868fefa9bb65..2842b2cdaa90 100644
--- a/drivers/crypto/qat/qat_common/qat_algs.c
+++ b/drivers/crypto/qat/qat_common/qat_algs.c
@@ -1058,6 +1058,9 @@ static int qat_alg_ablkcipher_encrypt(struct 
ablkcipher_request *req)
        struct device *dev = &GET_DEV(ctx->inst->accel_dev);
        int ret, ctr = 0;
 
+       if (req->nbytes == 0)
+               return 0;
+
        qat_req->iv = dma_alloc_coherent(dev, AES_BLOCK_SIZE,
                                         &qat_req->iv_paddr, GFP_ATOMIC);
        if (!qat_req->iv)
@@ -1115,6 +1118,9 @@ static int qat_alg_ablkcipher_decrypt(struct 
ablkcipher_request *req)
        struct device *dev = &GET_DEV(ctx->inst->accel_dev);
        int ret, ctr = 0;
 
+       if (req->nbytes == 0)
+               return 0;
+
        qat_req->iv = dma_alloc_coherent(dev, AES_BLOCK_SIZE,
                                         &qat_req->iv_paddr, GFP_ATOMIC);
        if (!qat_req->iv)
-- 
2.20.1

Reply via email to